Filters








248 Hits in 6.2 sec

Wiretap: an experimental multiple-path routing algorithm

David L. Mills
1989 Computer communication review  
This paper introduces Wiretap, an experimental routing algorithm which computes maximum-likelihood diversity routes for packet-radio stations sharing a common broadcast channel, but with some stations  ...  The algorithm is presented as an example of maximum-likelihood routing and database management techniques useful for richly connected networks of mobile stations.  ...  The Wiretap algorithm is similar in function to the shortest-path-first (SPF) routing algorithms used in the ARPANET and NSFNET backbone networks [4] and to the routing algorithms used in other packet-radio  ... 
doi:10.1145/66093.66098 fatcat:jgf765mgsjfghddqxid7r4eyoi

Nation-State Routing: Censorship, Wiretapping, and BGP [article]

Josh Karlin, Stephanie Forrest (University of New Mexico and the Santa Fe Institute), Jennifer Rexford (Princeton University)
2009 arXiv   pre-print
Examples include government enforced censorship, wiretapping, and protocol deployment mandates for IPv6 and DNSSEC.  ...  If an entire nation's worth of ISPs apply common policies to Internet traffic, the global implications could be significant.  ...  BGP routers typically have multiple available routes to select from for each destination. Therefore, it is possible that a country in the best path could be avoided by using an alternate path.  ... 
arXiv:0903.3218v1 fatcat:nuvg7a2y7bcyjaeqb3bf5u7ujy

A Numerical Study on the Wiretap Network with a Simple Network Topology [article]

Fan Cheng, Vincent Y. F. Tan
2016 arXiv   pre-print
In this paper, we study a security problem on a simple wiretap network, consisting of a source node S, a destination node D, and an intermediate node R.  ...  The objective is to minimize H(K)/H(M) for a given wiretap pattern under the perfect secrecy constraint. The first question we address is whether routing is optimal on this simple network.  ...  ACKNOWLEDGEMENTS The authors are supported by NUS grants R-263-000-A98-750/133 and an NUS Young Investigator Award R-263-000-B37-133.  ... 
arXiv:1505.02862v3 fatcat:4ydox6wn3jeghkls75zhbuurgq

Signaling Vulnerabilities in Wiretapping Systems

M. Sherr, E. Cronin, S. Clark, M. Blaze
2005 IEEE Security and Privacy  
Despite law enforcement's growing reliance on wiretaps, little attention has been paid in the open literature to their reliability.  ...  Telephone wiretap and dialed number recording systems are used by law enforcement and national security agencies to collect investigative intelligence and legal evidence.  ...  To route a long distance call, a switch would select an idle trunk to the next switch in the path, remove the idle tone, transmit the desired number, and connect the calling subscriber's local loop to  ... 
doi:10.1109/msp.2005.160 fatcat:khpu74wopbfpdnfl75njpqjn24

[Preprint] A Survey of Voice and Communication Protection Solutions Against Wiretapping

Ntantogian Christoforos, Veroni Eleni, Karopoulos Georgios, Xenakis Christos
2019 Zenodo  
The above proposed solutions do not actually deploy an encryption algorithm in their scheme for evaluation.  ...  The server can be a single entity or split across multiple 12 actual computers.  ... 
doi:10.5281/zenodo.3237476 fatcat:26x4uohgznbsnjq2lxkwwwbsdi

Discovering records of private VoIP calls without wiretapping

Chang-Han Jong, Virgil D. Gligor
2012 Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security - ASIACCS '12  
We conducted this privacy attack in an experimental setting using three types of commercially available closed-source phones that implement the standard IETF Session Initiation Protocol (SIP) in hardware  ...  ., wiretapping), can discover calls between two targeted individuals, with high probability.  ...  An OPTIONS request is used to query the protocol capability of a SIP device, and can be used as a trace route tool.  ... 
doi:10.1145/2414456.2414495 dblp:conf/ccs/JongG12 fatcat:ph6xlrz2fnghxlbmnttt3hltg4

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
Detection of mass concentrations from their gravitational effects is in an experimental stage.  ...  Under these circumstances, it appears that an opponent who knows the Skipjack algorithm, the LEAF creation method, and the escrow authenticator can recover the device-unique key in at most a small multiple  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Adaptive limited feedback for MISO wiretap channels with cooperative jamming

Minyan Pei, Dongtang Ma, Jibo Wei
2013 2013 IEEE 14th Workshop on Signal Processing Advances in Wireless Communications (SPAWC)  
We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference  ...  The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security.  ...  The ciphertext is decoded by multiplications with the inverses of the permutation and non-singular matrices interspersed with the code decoding algorithm.  ... 
doi:10.1109/spawc.2013.6612057 dblp:conf/spawc/PeiMW13 fatcat:gjn4o2l4qjae5ipsr6zfjo35yu

Impact of Rushing attack on Multicast in Mobile Ad Hoc Network [article]

V. Palanisamy, P. Annadurai
2009 arXiv   pre-print
For many applications in wireless networks, multicasting is an important and frequent communication service.  ...  The security issue of MANETs in group communications is even more challenging because of involvement of multiple senders and multiple receivers.  ...  In a multicast routing tree, there is usually only one single path between a sender and a receiver, while in a routing mesh, there may be multiple paths between each sender receiver pair.  ... 
arXiv:0909.1402v1 fatcat:wybt6mkcxbcstdpmb7mutbjgaq

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead [article]

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 arXiv   pre-print
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter  ...  wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc.  ...  By exploiting the equivocation rate of eavesdropper's channel as an optimization criterion, M. Baldi et al. propose a code design algorithm in the finite codeword length regime [21] .  ... 
arXiv:1801.05227v1 fatcat:gktqlyt4wrfhnjdxfvl3vlmhau

A Survey of Physical Layer Security Techniques for 5G Wireless Networks and Challenges Ahead

Yongpeng Wu, Ashish Khisti, Chengshan Xiao, Giuseppe Caire, Kai-Kit Wong, Xiqi Gao
2018 IEEE Journal on Selected Areas in Communications  
This paper provides a latest survey of the physical layer security research on various promising 5G technologies, including physical layer security coding, massive multiple-input multiple-output, millimeter  ...  wave communications, heterogeneous networks, non-orthogonal multiple access, full duplex technology, etc.  ...  Experimental results extracted from [60] . IV.  ... 
doi:10.1109/jsac.2018.2825560 fatcat:nanjj67ilvdcfbmfpmo7zppqvy

Implementation of Physical Layer Key Distribution using Software Defined Radios

S. Kambala, R. Vaidyanathaswami, A. Thangaraj
2013 Defence Science Journal  
In this paper, we present a brief tutorial introduction to the Wiretap channel, followed by an application of the physical layer model to a class of Key Distribution protocols.  ...  THE WIRETAP CHANNEL Wyner 1 proposed a basic framework for secure communication in 1975 called the Wiretap channel.  ...  Next, we present the details and results of an experimental implementation of this key distribution protocol.  ... 
doi:10.14429/dsj.63.3758 fatcat:my4bslsjlbeink2enaehnerzxi

An Efficient Energy of Mobile Pattern Ad Hoc Networks in Reactive Routing Protocols

2019 VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE  
Routing Algorithm (TORA 1).  ...  The various ad hoc routing protocols have been recommended and fulfilled, which include Ad hoc On-Demand Distance Vector Routing (AODV1), NMDC1 (Node Mobility and Density Classifier 1) and Temporally Ordered  ...  MANET is having the objective of the routing method to find the optimum route to the destination in terms of minimum delay and shortest path.  ... 
doi:10.35940/ijitee.f3697.078919 fatcat:j3zqouk4hngflcgaumysheoenu

Implementation of Physical Layer Key Distribution using Software Defined Radios

S. Kambala, R. Vaidyanathaswami, A. Thangaraj
2013 Defence Science Journal  
In this paper, we present a brief tutorial introduction to the Wiretap channel, followed by an application of the physical layer model to a class of Key Distribution protocols.  ...  THE WIRETAP CHANNEL Wyner 1 proposed a basic framework for secure communication in 1975 called the Wiretap channel.  ...  Next, we present the details and results of an experimental implementation of this key distribution protocol.  ... 
doi:10.14429/dsj2013.6592 fatcat:cb2vfdq5a5cgjlefwphum74eui

Security Issues in VoIP Telecommunication Networks [chapter]

Xiaohui Yang, Ram Dantu, Duminda Wijesekera
2012 Handbook on Securing Cyber-Physical Critical Infrastructure  
Finally, we will summarize the different categories of security issues that are present in VoIP systems and provide an overview of the solutions detailed in the preceding sections.  ...  CONNECTION ESTABLISHMENT AND CALL ROUTING This section describes the main components of a SIP network, which work cohesively to form the communication bridge between the end terminals.  ...  So, the users will calculate the next best node for routing its service requests. Experimental Evaluation All algorithms were implemented and evaluated.  ... 
doi:10.1016/b978-0-12-415815-3.00030-3 fatcat:2tfkcsyugjhfjgijtzwqwmg7ia
« Previous Showing results 1 — 15 out of 248 results