Filters








21 Hits in 10.7 sec

Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality

Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
2010 International Journal of Applied Cryptography  
We study the interplay of network connectivity and the issues related to the possibility, feasibility and optimality for unconditionally reliable message transmission (URMT) and unconditionally secure  ...  of both reliable and secure message transmission protocols.  ...  We name the probabilistic PRMT and PSMT as unconditionally reliable message transmission (URMT) and unconditionally secure message transmission (USMT) respectively.  ... 
doi:10.1504/ijact.2010.038309 fatcat:5kvc26eb5vfujbt2x6vy5swo5u

Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited [chapter]

Arpita Patra, Ashish Choudhary, C. Pandu Rangan
2008 Lecture Notes in Computer Science  
This problem is called as statistically reliable message transmission (SRMT).  ...  In this paper, we study the above issues in the context of statistical RMT and SMT in directed synchronous network. We call statistical RMT and SMT as SRMT and SSMT respectively.  ...  Also, the issues related to the possibility, feasibility and optimality have been completely resolved for SRMT and SSMT in undirected synchronous network model tolerating threshold static Byzantine adversary  ... 
doi:10.1007/978-3-540-85855-3_21 fatcat:mxb6boihl5gtlbs4wv6q6mab2e

Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks

Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran
2010 IEEE Transactions on Mobile Computing  
The jammer controls the probability of jamming and the transmission range in order to cause maximal damage to the network in terms of corrupted communication links.  ...  The necessary knowledge of the jammer in order to optimize its benefit consists of knowledge about the network channel access probability and the number of neighbors of the monitor node.  ...  A sequential decision rule is efficient if it can provide reliable decision as fast as possible.  ... 
doi:10.1109/tmc.2010.75 fatcat:vhm7hgarnzdn3fiyt6adj6sgwa

Quality of Service Support for Event Detection in Wireless Sensor Networks

Fu Lin, Fei Pei, Dengyi Zhang, Wenhai Li
2011 2011 7th International Conference on Wireless Communications, Networking and Mobile Computing  
I am not sure I possess either of those qualities in  ...  Remerciements It takes a tremendous amount of dedication and perseverance to complete a doctoral dissertation. At least that is what I have been told.  ...  In [17] , attacks in the network layer and secure routings as countermeasures are discussed in detail.  ... 
doi:10.1109/wicom.2011.6040377 fatcat:zev7qydmkjgddjagqorodgdyua

Efficient and fault-diagnosable authentication architecture for AMI in smart grid

Depeng Li, Zeyar Aung, John R. Williams, Abel Sanchez
2014 Security and Communication Networks  
Performance evaluation and experimental results on a simulated AMI platform show that the efficiency is achieved. Security Comm. Networks (2014)  ...  Typically, these data are collected at high speed, like at ≤ 2 s intervals [20], but they can typically tolerate the delay in transmission up to hours [11] .  ...  Second, a number of key pairs should be managed in a large AMI network that results in the mandatory deployment of an unconditionally TTP [7] .  ... 
doi:10.1002/sec.1006 fatcat:w2xt7lukl5ccnemt6v6oqyvdu4

Security and cooperation in wireless networks: thwarting malicious and selfish behavior in the age of ubiquitous computing

2008 ChoiceReviews  
An additional problem is that the frenzy to commercialize quickly new products and new services is in contradiction with the design of a well-thought (and possibly standardized) secure architecture.  ...  We believe this textbook to be the first of its kind regarding the treatment of security and cooperation in wireless networks.  ...  research carried out by Maxim Raya, Imad Aad, and Alaeddine El Fawal; Maxim again, along with Panos Papadimitratos, whose research in the security of vehicular networks proved to be very useful in several  ... 
doi:10.5860/choice.46-1524 fatcat:3bkyxjix2vcabcn3f45pqd4vn4

A Survey on Perfectly-Secure Verifiable Secret-Sharing [article]

Anirudh Chandramouli, Ashish Choudhury, Arpita Patra
2022 arXiv   pre-print
We comprehensively survey the existing perfectly-secure VSS schemes in three different communication settings, namely synchronous, asynchronous and hybrid setting and provide full details of the existing  ...  It is used as a building block in several distributed computing tasks, such as Byzantine agreement and secure multi-party computation.  ...  Theorem 3.1 is first proved formally by Dolev, Dwork, Waarts and Yung in [29] by relating VSS with the problem of 1-way perfectly-secure message transmission (1-way PSMT) [29] .  ... 
arXiv:2112.11393v3 fatcat:qpe7blq3cjbzri2ivt6i2nimti

Advances in Quantum Cryptography

Stefano Pirandola, Ulrik Andersen, Leonardo Banchi, Mario Berta, Darius Bunandar, Roger Colbeck, Dirk Englund, Tobias Gehring, Cosmo Lupo, Carlo Ottaviani, Jason Pereira, Mohsen Razavi (+6 others)
2020 Advances in Optics and Photonics  
General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications  ...  or research.  You may not further distribute the material or use it for any profit-making activity or commercial gain  You may freely distribute the URL identifying the publication in the public portal  ...  We may represent a quantum communication network as an undirected finite graph N = (P, E), where P is the set of points and E is the set of edges.  ... 
doi:10.1364/aop.361502 fatcat:7xp7i42fjffpblk6g4fhlpgg6m

Network and service monitoring in heterogeneous home networks [article]

Delphinanto, A (Archi), Koonen, AMJ (Ton), Liotta, A (Antonio), Hartog, FTH (Frank) Den
2012
Acknowledgments One who seeks the unseekable cannot subsequently be accused of negligence in seeking what is seekable (the Proof of Islam, Imam Al-Ghazali).  ...  Thus, it is theoretically possible to realize network optimizations and QoS control inside the home network without requiring intensive monitoring activities.  ...  In other words, instead of trying to make the network application-and content-aware, it seems more feasible to make the applications network aware, real-time.  ... 
doi:10.6100/ir724594 fatcat:5svhiyt4d5gfpi4vxloppj7lbm

Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary [chapter]

Ashish Choudhary, Arpita Patra, B. V. Ashwinkumar, K. Srinathan, C. Pandu Rangan
Lecture Notes in Computer Science  
In this paper, we study the issues related to the possibility, feasibility and optimality for perfectly secure message transmission (PSMT) in an undirected synchronous network, under the influence of a  ...  Dolev et.al considered an undirected synchronous network and assumed that the adversary can corrupt t b nodes in the network in Byzantine fashion.  ...  Our Motivation The issue of possibility, feasibility and optimality in the context of PSMT in undirected synchronous networks has been completely resolved in [14, 45, 50, 1, 16, 53, 25, 35] .  ... 
doi:10.1007/978-3-540-85093-9_15 fatcat:bgzagvzwtjhrjgghtkhopkndeu

Multi-Agent System Control and Coordination of Distributed Energy Resources in Electrical Power Networks

Mark Collins, Timothy Green, Engineering And Physical Sciences Research Council, Research Councils UK
2015
These agents are all peers and use message propagation so voltage approximations can be calculated and DER corrective actions shared without the need for a complete, central network model to exist.  ...  However, present MAS ANM approaches raise concerns with regards to their operation on realistic networks, the communication burden they create, the safety and security of their operation and the economic  ...  These toolkits offer a range of abilities in areas such as synchronous and asynchronous communication, message protocols, cost, scalability, security and GUI tools.  ... 
doi:10.25560/24735 fatcat:2ocp5b7y4fb7hpuzfbjg2q4ifu

Scalable computer network emulation using node virtualization and resource monitoring [article]

Steffen Dirk Maier, Universität Stuttgart, Universität Stuttgart
2011
Since network properties are reproduced synthetically, emulation supports reproducible measurement results for wired and wireless networks.  ...  To scale the number of nodes in an emulation scenario beyond the available computers, we discuss approaches to virtualization and operating system partitioning.  ...  Reliability takes care of transmission errors and packet drops by retransmitting messages and it takes care of packet reordering by resorting messages before delivery.  ... 
doi:10.18419/opus-2698 fatcat:6sutyw6tmjd2pbf6o5alosnhjy

International Zurich Seminar on Communications: proceedings

Institute Of Electrical
2010
ACKNOWLEDGMENT The work was supported by the European Commission in the framework of the FP7 Network of Excellence in Wireless in Communications NEWCOM++, and the Israel Science Foundation.  ...  Technology and Electrical Engineering of ETH Zurich.  ...  It is possible to interpret the secret message generated as secret key generation, and therefore we can use the techniques outlined in this paper to generate an unconditionally (strongly) secure key.  ... 
doi:10.3929/ethz-a-005994249 fatcat:uszmfebk7jg5hn4fpdgdklbwhm

Distributed Resource Management with Monetary Incentives [article]

Andreas Tanner, Technische Universität Berlin, Technische Universität Berlin, Hans-Ulrich Heiß
2005
We suggets a new bid synchronization rule and give an application to unicast bandwidth allocation.  ...  We propose market mechanisms for resource allocation in distributed computer systems.  ...  Communication between clients and their local brokers, and inter-broker communication is based on messages. We assume that message transmission is reliable first-in-first-out.  ... 
doi:10.14279/depositonce-1178 fatcat:h6ils53x5zdodlf5r2qtfa4dz4

Tunable Security for Deployable Data Outsourcing

Jens Köhler
2015
The book shows how the proposed methodology can be applied in the domains of database outsourcing, identity management, and credential management.  ...  Security mechanisms like encryption negatively affect other software quality characteristics like efficiency.  ...  This process induces a high efficiency overhead in terms of query latency and network transmission.  ... 
doi:10.5445/ksp/1000048084 fatcat:vv2royigmbe2vhvp4muklxnchm
« Previous Showing results 1 — 15 out of 21 results