scholarly journals A Spectrum-Efficient Cross-Layer RF Distance Bounding Scheme

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Yihang Song ◽  
Songfan Li ◽  
Chong Zhang ◽  
Li Lu

Distance bounding protocols guarantee a credible distance upper bound between the devices which require the spatial distance as a security parameter to defend Mafia Fraud attacks. However, in RF systems, the realization of distance bounding protocol faces obstacles due to low spectrum efficiency, since the distance bound estimation consumes a significant amount of frequency band in existing schemes. This hinders RF distance bounding from being practically deployed, especially in commonly used ISM bands. In this work, we propose an alternative, spectrum-efficient scheme for RF distance bounding. We build the physical layer as well as a protocol design based on SFCW signal and SFCW ranging. Thus, comparing existing schemes that consume many frequency bands, our scheme frees many spectrum resources. We propose solutions to the unique challenges facing such an SFCW-based scheme design, namely, data communication over unintelligent SFCW signals, and secure synchronization in the SFCW-based challenge-response exchange. We evaluate our scheme via the security analysis and physical layer simulations. The results show (i) its resistance to attacks commonly concerned in distance bounding, (ii) the feasibility of the physical layer design such as accurate ranging and data communication function, and (iii) the communication noise tolerance and the ability of multipath signal discrimination.

2022 ◽  
Vol 16 (1) ◽  
pp. 0-0

Secure and efficient authentication mechanism becomes a major concern in cloud computing due to the data sharing among cloud server and user through internet. This paper proposed an efficient Hashing, Encryption and Chebyshev HEC-based authentication in order to provide security among data communication. With the formal and the informal security analysis, it has been demonstrated that the proposed HEC-based authentication approach provides data security more efficiently in cloud. The proposed approach amplifies the security issues and ensures the privacy and data security to the cloud user. Moreover, the proposed HEC-based authentication approach makes the system more robust and secured and has been verified with multiple scenarios. However, the proposed authentication approach requires less computational time and memory than the existing authentication techniques. The performance revealed by the proposed HEC-based authentication approach is measured in terms of computation time and memory as 26ms, and 1878bytes for 100Kb data size, respectively.


2018 ◽  
Vol 29 (07) ◽  
pp. 1850058 ◽  
Author(s):  
Nabil Ben Slimane ◽  
Nahed Aouf ◽  
Kais Bouallegue ◽  
Mohsen Machhout

In this paper, an efficient scheme for image encryption based on the nested chaotic map and deoxyribonucleic acid (DNA) is introduced. In order to generate the initial condition values of the nested chaotic system, the Secure Hash Algorithm SHA-256 is used. The algorithm consists of two main layers: confusion and diffusion. In the first layer, the nested chaotic map is employed to create the scrambled image. The scrambled image is obtained through the ascending sorting of the first component of the nested chaotic index sequence. To ensure higher sensitivity, higher complexity and higher security, DNA sequence and DNA operator are employed additionally with the nested chaotic map and hash algorithm to modify the pixel values. The important advantages of our algorithm are the improvement of Number of Pixel Change Rate (NPCR), Unified Average Changing Intensity (UACI) and entropy, which improve resistivity against several attacks. Experimental results and relevant security analysis demonstrated that our proposed encryption scheme has the highest security level because it is more complicated, and it has a sufficiently large key space. The proposed method is compared to other recent image encryption schemes using different security analysis factors, including NPCR, UACI, correlation coefficients (CCs), encryption quality (EQ) and entropy. It is also resistant to noise (Salt and Pepper, Gaussian and speckle) and data loss attacks. The illustrated results demonstrated that the proposed image encryption scheme is efficient, and can be adopted for image encryption and transmission.


Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 1045 ◽  
Author(s):  
Pere Tuset-Peiró ◽  
Francisco Vázquez-Gallego ◽  
Jonathan Muñoz ◽  
Thomas Watteyne ◽  
Jesus Alonso-Zarate ◽  
...  

In this paper, we experimentally evaluate and compare the robustness against interference of the OQPSK-DSSS (Offset Quadrature Phase Shift Keying-Direct Sequence Spread Spectrum) and the SUN-OFDM (Smart Utility Network-Orthogonal Frequency Division Multiplexing) physical layers, as defined in the IEEE 802.15.4-2015 standard. The objective of this study is to provide a comprehensive analysis of the impact that different levels of interference produce on these modulations, in terms of the resulting PDR (Packet Delivery Ratio) and depending on the length of the packet being transmitted. The results show that the SUN-OFDM physical layer provides significant benefits compared to the ubiquitous OQPSK-DSSS in terms of interference robustness, regardless of the interference type and the packet length. Overall, this demonstrates the suitability of choosing the SUN-OFDM physical layer when deploying low-power wireless networks in industrial scenarios, especially taking into consideration the possibility of trading-off robustness and spectrum efficiency depending on the application requirements.


PLoS ONE ◽  
2021 ◽  
Vol 16 (5) ◽  
pp. e0250992
Author(s):  
Kennedy Edemacu ◽  
Beakcheol Jang ◽  
Jong Wook Kim

With the rapid advancement of information and communication technologies, there is a growing transformation of healthcare systems. A patient’s health data can now be centrally stored in the cloud and be shared with multiple healthcare stakeholders, enabling the patient to be collaboratively treated by more than one healthcare institution. However, several issues, including data security and privacy concerns still remain unresolved. Ciphertext-policy attribute-based encryption (CP-ABE) has shown promising potential in providing data security and privacy in cloud-based systems. Nevertheless, the conventional CP-ABE scheme is inadequate for direct adoption in a collaborative ehealth system. For one, its expressiveness is limited as it is based on a monotonic access structure. Second, it lacks an attribute/user revocation mechanism. Third, the computational burden on both the data owner and data users is linear with the number of attributes in the ciphertext. To address these inadequacies, we propose CESCR, a CP-ABE for efficient and secure sharing of health data in collaborative ehealth systems with immediate and efficient attribute/user revocation. The CESCR scheme is unbounded, i.e., it does not bind the size of the attribute universe to the security parameter, it is based on the expressive and non-restrictive ordered binary decision diagram (OBDD) access structure, and it securely outsources the computationally demanding attribute operations of both encryption and decryption processes without requiring a dummy attribute. Security analysis shows that the CESCR scheme is secure in the selective model. Simulation and performance comparisons with related schemes also demonstrate that the CESCR scheme is expressive and efficient.


2020 ◽  
Vol 24 (8) ◽  
pp. 1626-1630 ◽  
Author(s):  
Sai Li ◽  
Liang Yang ◽  
Mazen O. Hasna ◽  
Mohamed-Slim Alouini ◽  
Jiayi Zhang

Author(s):  
Rajarshi Sanyal ◽  
Ernestina Cianca ◽  
Ramjee Prasad

Intelligent Vehicle communication is the keyword for the emerging vehicular technologies such as group cooperative driving, real time Engine Operating parameters (EOP) monitoring, collision warning, geo location based mobility applications, and classical voice and data conveyance. The technologies require extensive interaction between the peers which mostly use the framework of the state of the art cellular or radio trunking networks. This may vitiate the network performance due to the surge in mobility management messages originated by the devices plugged in the vehicles. The performance may be severely impacted due to the unique characteristics of vehicular networks e.g., high mobility. Due to the high proliferation of these Machine to Machine (M2M) and Machine to Application (M2A) devices in near future, the cell sizes will shrink, resulting in more signalling messages in the network. Considering classical voice communication services for typical car fleet implementations, the radio trunking networks have capacity constrains due to inability of frequency reuse and absence of mobility management techniques. The alternative is to seek out an access technology considering the fact that a more intelligent physical layer can be employed directly for addressing and mobility management. In this paper the authors address a Closed User Group network implementation for Vehicle to Vehicle/central office communication which can actuate voice and data communication without incorporating any application layer.


Sign in / Sign up

Export Citation Format

Share Document