This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information...
详细信息
This is Part II in a two-part series discussing the development of investigative support for information confidentiality. In Part I, we proposed a technique based on relation algebra to detect confidential information leakage via protocol-based covert channels. In this paper, we continue developing investigative support for information confidentiality. We examine the application of the technique for detecting confidential information leakage proposed in Part I in cryptanalysis and digital forensics to highlight its usefulness beyond the scope of covert channel analysis. By way of a short case study, we show the automation of the cryptanalysis application of the technique for detecting confidential information leakage using a prototype tool and a known-plaintext attack.
This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-ba...
详细信息
This is Part I in a two-part series discussing the development of investigative support for information confidentiality. In this paper, we propose a technique to detect confidential information leakage via protocol-based covert channels based on relation algebra. It provides tests to verify the existence of an information leakage via a monitored covert channel as well as computations which show how the information was leaked if a leakage exists. We also report on a prototype tool that allows for the automation of the proposed technique. Our focus is limited to protocol-based covert channels and instances where covert channel users modulate the sent information by some form of encoding such as encryption.
We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity...
详细信息
We consider secret-key agreement with public discussion over Rayleigh fading quasi-static channels. First, the secret-key diversity gain and the secret-key multiplexing gain are defined. Then, the secret-key diversity multiplexing tradeoff (DMT) is established. The eavesdropper is shown to “steal” only transmit antennas. We show that likewise the DMT without secrecy constraint, the secret-key DMT is the same either with or without full channel state information (CSI) at the transmitter (CSI-T). This insensitivity of secret-key DMT toward CSI-T highlights a fundamental difference between secret-key agreement and the wiretap channel whose secret DMT depends crucially on CSI-T. Several secret-key DMT-achieving schemes are presented in case of full CSI-T.
In this work, we present the performance analysis of a dual-hop transmission system composed of asymmetric radio frequency (RF) and free-space optical (FSO) links in underlay cognitive networks. For the RF link, we co...
详细信息
In this work, we present the performance analysis of a dual-hop transmission system composed of asymmetric radio frequency (RF) and free-space optical (FSO) links in underlay cognitive networks. For the RF link, we consider an underlay cognitive network where the secondary users share the spectrum with licensed primary users, where indoor femtocells act as a practical example for such networks. More specifically, we assume that the RF link is subject to an interference constraint. The FSO link accounts for pointing errors and both types of detection techniques (i.e. intensity modulation/direct detection (IM/DD) as well as heterodyne detection). On the other hand, RF link is modeled by the Rayleigh fading distribution that applies power control to maintain the interference at the primary network below a specific threshold whereas the FSO link is modeled by a unified Gamma-Gamma fading distribution. With this model, we derive new exact closed-form expressions for the cumulative distribution function, the probability density function, the moment generating function, and the moments of the end-to-end signal-to-interference plus noise ratio of these systems in terms of the Meijer's G functions. We then capitalize on these results to offer new exact closed-form expressions for the outage probability, the higher-order amount of fading, and the average error rate for binary and Mary modulation schemes, all in terms of Meijer's G functions. All our new analytical results are verified via computer-based Monte-Carlo simulations and are illustrated by some selected numerical results.
High-speed railway system equipped with moving relay stations placed on the middle of the ceiling of each train wagon is investigated. The users inside the train are served in two hops via the 3GPP Long Term Evolution...
详细信息
ISBN:
(纸本)9781479953059
High-speed railway system equipped with moving relay stations placed on the middle of the ceiling of each train wagon is investigated. The users inside the train are served in two hops via the 3GPP Long Term Evolution (LTE) technology. The objective of this work is to maximize the number of served users by respecting a specific quality-of-service constraint while minimizing the total power consumption of the eNodeB and the moving relays. We propose an efficient algorithm based on the Hungarian method to find the optimal resource allocation over the LTE resource blocks in order to serve the maximum number of users with the minimum power consumption. Moreover, we derive a closed-form expression for the power allocation problem. Our simulation results illustrate the performance of the proposed scheme and compare it with various previously developed algorithms as well as with the direct transmission scenario.
The combination of the high-order accurate spectral difference discretization on unstructured grids with subgrid-scale modelling is investigated for large eddy simulation of a muffler at Re = 4:64 104 and M = 0:05. Th...
详细信息
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significant...
We present a homogenization scheme for acoustic metamaterials that is based on reproducing the lowest orders of scattering amplitudes from a finite volume of metamaterials. This approach is noted to differ significantly from that of coherent potential approximation, which is based on adjusting the effective-medium parameters to minimize scatterings in the long-wavelength limit. With the aid of metamaterials’ eigenstates, the effective parameters, such as mass density and elastic modulus can be obtained by matching the surface responses of a metamaterial's structural unit cell with a piece of homogenized material. From the Green's theorem applied to the exterior domain problem, matching the surface responses is noted to be the same as reproducing the scattering amplitudes. We verify our scheme by applying it to three different examples: a layered lattice, a two-dimensional hexagonal lattice, and a decorated-membrane system. It is shown that the predicted characteristics and wave fields agree almost exactly with numerical simulations and experiments and the scheme's validity is constrained by the number of dominant surface multipoles instead of the usual long-wavelength assumption. In particular, the validity extends to the full band in one dimension and to regimes near the boundaries of the Brillouin zone in two dimensions.
作者:
Xin GaoComputer
Electrical and Mathematical Sciences and Engineering DivisionKing Abdullah University of Science and Technology (KAUST)
Although three-dimensional protein structure determination using nuclear magnetic res- onance (NMR) spectroscopy is a computationally costly and tedious process that would benefit from advanced computational techniq...
详细信息
Although three-dimensional protein structure determination using nuclear magnetic res- onance (NMR) spectroscopy is a computationally costly and tedious process that would benefit from advanced computational techniques, it has not garnered much research attention from special- ists in bioinformatics and computational biology. In this paper, we review recent advances in com- putational methods for NMR protein structure determination. We summarize the advantages of and bottlenecks in the existing methods and outline some open problems in the field. We also dis- cuss current trends in NMR technology development and suggest directions for research on future computational methods for NMR.
The main idea in the moment generating function (MGF) approach is to alternatively express the conditional bit error probability (BEP) in a desired exponential form so that possibly multi-fold performance averaging is...
详细信息
ISBN:
(纸本)9781479930845
The main idea in the moment generating function (MGF) approach is to alternatively express the conditional bit error probability (BEP) in a desired exponential form so that possibly multi-fold performance averaging is readily converted into a computationally efficient single-fold averaging - sometimes into a closed-form - by means of using the MGF of the signal-to-noise ratio. However, as presented in [1] and specifically indicated in [2] and also to the best of our knowledge, there does not exist an MGF-based approach in the literature to represent Wojnar's generic BEP expression in a desired exponential form. This paper presents novel MGF-based expressions for calculating the average BEP of binary signalling over generalized fading channels, specifically by expressing Wojnar's generic BEP expression in a desirable exponential form. We also propose MGF-based expressions to explore the amount of dispersion in the BEP for binary signalling over generalized fading channels.
In this paper, we address a special case of state and parameter estimation, where the system can be put on a cascade form allowing to estimate the state components and the set of unknown parameters separately. Inspire...
详细信息
In this paper, we address a special case of state and parameter estimation, where the system can be put on a cascade form allowing to estimate the state components and the set of unknown parameters separately. Inspired by the nonlinear Balloon hemodynamic model for functional Magnetic Resonance Imaging problem, we propose a hierarchical approach. The system is divided into two subsystems in cascade. The state and input are first estimated from a noisy measured signal using an adaptive observer. The obtained input is then used to estimate the parameters of a linear system using the modulating functions method. Some numerical results are presented to illustrate the efficiency of the proposed method.
暂无评论