The IEEE 802.11b security problem. I

2001 ◽  
Vol 3 (6) ◽  
pp. 96-95 ◽  
Author(s):  
J. Williams
Author(s):  
Yong Jin ◽  
Zhentao Hu ◽  
Dongdong Xie ◽  
Guodong Wu ◽  
Lin Zhou

AbstractAiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting (EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation (SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise (AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation (SDR) method and successive convex approximation (SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.


2021 ◽  
Vol 13 (2) ◽  
pp. 741
Author(s):  
Wirat Krasachat ◽  
Suthathip Yaisawarng

To overcome the challenging food safety and security problem, in 2003, the Thai government initiated ‘Good Agricultural Practices’ (GAP) technology. This paper used a sample of 107 small chili farms from the Chiyaphoom province for the 2012 crop year, and data envelopment analysis (DEA) meta-frontier directional distance function technique to answer two questions: (1) Are GAP-adopting farms, on average, more efficient than conventional farms? (2) Does access to GAP technology affect farmers’ decisions to adopt GAP technology? We also developed an ‘indirect’ approach to reduce the potential sample selection bias for small samples. For the dry-season subsample, GAP farms were more technically efficient when compared with non-GAP farms. These dry-season non-GAP farms may not adopt the GAP method because they have limited access to GAP technology. For the rainy-season subsample, on average, GAP farms were more efficient than non-GAP farms at the 5% level. Access to the GAP technology is not a possible reason for non-GAP rainy season farms to not adopt the GAP technology. To enable sustainable development, government agencies and nongovernmental organizations (NGOs) must develop and implement appropriate educational and training workshops to promote and assist GAP technology adoption for chili farms in Thailand.


2011 ◽  
Author(s):  
Deepak Malik ◽  
Ankur Singhal ◽  
R. B. Patel ◽  
B. P. Singh

2013 ◽  
Vol 846-847 ◽  
pp. 1628-1631
Author(s):  
Song Jie Gong ◽  
Lin Di Jin

With the rapid development of electronic commerce, payment is becoming the focus problem of electronic commerce. Electronic cash has become the ideal method of electronic payment for it is able to realize fair, secure, effect electronic transacts. Along with electronic commerce development, electronic cash payment systems are also gradually developing. However, most electronic cashes are facing the security issues. Moreover, the amount of money each electronic cash card contains is fixed at issuance and is available only within a specified system. The key technology is digital signature technology, including blind signature, group signature, and ring signature. The paper researches the security problems of electronic cash in information safety and e-commerce, and discusses the electronic payment and the security problem, which is regarded as the foundation of electronic commerce. The main factors are given that causes security problems of electronic payment, and suggests corresponding precautionary measures.


2014 ◽  
Vol 707 ◽  
pp. 458-461 ◽  
Author(s):  
Dong Ming Zhao ◽  
Kai Feng Zhu

Internet technology as the cutting-edge of the current information technology, it has penetrated into every aspect of human life, more and more government agencies, enterprises are using Internet to improve their office efficiency and to establish new business operation model, in order to improve its reaction ability in fierce competition. Internet has brought convenience for people to work, while the security problem of network also will follow. The internal network not only needs to ensure the security of their data, but also needs to exchange data with the external network, then by adopting network security isolation system which takes gatekeeper technology as its core technology, so that we can ensure that internal network and external network will have physical isolation at any time, meanwhile, according to business needs, it also has multiple forms of information and data’s exchanges.


Sign in / Sign up

Export Citation Format

Share Document