Sorry, you need to enable JavaScript to visit this website.

Communications and Network Security

Covert Communications in a Dynamic Interference Environment


Much of security research focuses on preventing an adversary from deciphering a message's content, but there are a number of applications that motivate the more challenging goal of ``covert'' communications: transmitter Alice conveying information to legitimate receiver Bob while preventing a capable and attentive adversary Willie from detecting the presence of the message.

Paper Details

Authors:
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha
Submitted On:
22 June 2018 - 1:33pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

SPAWC_poster_goeckel.pdf

(10 downloads)

Keywords

Subscribe

[1] Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha, "Covert Communications in a Dynamic Interference Environment", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3297. Accessed: Jul. 17, 2018.
@article{3297-18,
url = {http://sigport.org/3297},
author = {Azadeh Sheikholeslami; Tamara Sobers; Boulat Bash; Donald Towsley; and Saikat Guha },
publisher = {IEEE SigPort},
title = {Covert Communications in a Dynamic Interference Environment},
year = {2018} }
TY - EJOUR
T1 - Covert Communications in a Dynamic Interference Environment
AU - Azadeh Sheikholeslami; Tamara Sobers; Boulat Bash; Donald Towsley; and Saikat Guha
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3297
ER -
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. (2018). Covert Communications in a Dynamic Interference Environment. IEEE SigPort. http://sigport.org/3297
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha, 2018. Covert Communications in a Dynamic Interference Environment. Available at: http://sigport.org/3297.
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. (2018). "Covert Communications in a Dynamic Interference Environment." Web.
1. Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. Covert Communications in a Dynamic Interference Environment [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3297

Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO

Paper Details

Authors:
Amr Abdelaziz, C. Emre Koksal
Submitted On:
21 June 2018 - 12:27pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

spawc_18.pdf

(12 downloads)

Keywords

Subscribe

[1] Amr Abdelaziz, C. Emre Koksal, "Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3287. Accessed: Jul. 17, 2018.
@article{3287-18,
url = {http://sigport.org/3287},
author = {Amr Abdelaziz; C. Emre Koksal },
publisher = {IEEE SigPort},
title = {Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO},
year = {2018} }
TY - EJOUR
T1 - Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO
AU - Amr Abdelaziz; C. Emre Koksal
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3287
ER -
Amr Abdelaziz, C. Emre Koksal. (2018). Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO. IEEE SigPort. http://sigport.org/3287
Amr Abdelaziz, C. Emre Koksal, 2018. Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO. Available at: http://sigport.org/3287.
Amr Abdelaziz, C. Emre Koksal. (2018). "Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO." Web.
1. Amr Abdelaziz, C. Emre Koksal. Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3287

Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer

Paper Details

Authors:
Submitted On:
19 April 2018 - 3:32pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Presentation.pdf

(224 downloads)

Keywords

Subscribe

[1] , "Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3011. Accessed: Jul. 17, 2018.
@article{3011-18,
url = {http://sigport.org/3011},
author = { },
publisher = {IEEE SigPort},
title = {Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer},
year = {2018} }
TY - EJOUR
T1 - Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer
AU -
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3011
ER -
. (2018). Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer. IEEE SigPort. http://sigport.org/3011
, 2018. Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer. Available at: http://sigport.org/3011.
. (2018). "Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer." Web.
1. . Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3011

QoI: Assessing Participation in Threat Information Sharing


We introduce the notion of Quality of Indicator (QoI) to assess the level of contribution by participants in threat intelligence sharing. We exemplify QoI by metrics of the correctness, relevance, utility, and uniqueness of indicators. We build a system that extrapolates the metrics using a machine learning process over a reference set of indicators.

Paper Details

Authors:
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen
Submitted On:
19 April 2018 - 1:10pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

JemanPark_ICASSP_QoI.pptx

(40 downloads)

Keywords

Subscribe

[1] Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen, "QoI: Assessing Participation in Threat Information Sharing", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2985. Accessed: Jul. 17, 2018.
@article{2985-18,
url = {http://sigport.org/2985},
author = {Jeman Park; Hisham Alasmary; Omar Al-Ibrahim; Charles Kamhoua; Kevin Kwiat; Laurent Njilla; Aziz Mohaisen },
publisher = {IEEE SigPort},
title = {QoI: Assessing Participation in Threat Information Sharing},
year = {2018} }
TY - EJOUR
T1 - QoI: Assessing Participation in Threat Information Sharing
AU - Jeman Park; Hisham Alasmary; Omar Al-Ibrahim; Charles Kamhoua; Kevin Kwiat; Laurent Njilla; Aziz Mohaisen
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2985
ER -
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. (2018). QoI: Assessing Participation in Threat Information Sharing. IEEE SigPort. http://sigport.org/2985
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen, 2018. QoI: Assessing Participation in Threat Information Sharing. Available at: http://sigport.org/2985.
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. (2018). "QoI: Assessing Participation in Threat Information Sharing." Web.
1. Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. QoI: Assessing Participation in Threat Information Sharing [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2985

DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS


Motivated by privacy issues in the Internet of Things systems, we generalize a proposed privacy-preserving packet obfuscation scheme to guarantee differential privacy. We propose a locally differentially private packet obfuscation mechanism as a defense against packet-size side-channel attacks in IoT networks. We formulate the problem as an optimization over a conditional probability distribution (channel) between the original and obfuscated packet sizes and show that the optimal set of obfuscated packet sizes is a strict subset of the set of original packet sizes.

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
14 April 2018 - 3:11pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

IEEE_ICASSP2018_POSTER

(67 downloads)

Keywords

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2769. Accessed: Jul. 17, 2018.
@article{2769-18,
url = {http://sigport.org/2769},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS},
year = {2018} }
TY - EJOUR
T1 - DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2769
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2018). DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS. IEEE SigPort. http://sigport.org/2769
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2018. DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS. Available at: http://sigport.org/2769.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2018). "DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2769

Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach

Paper Details

Authors:
Submitted On:
13 November 2017 - 1:21pm
Short Link:
Type:
Event:

Document Files

Conference Paper

(99 downloads)

Keywords

Subscribe

[1] , "Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/2340. Accessed: Jul. 17, 2018.
@article{2340-17,
url = {http://sigport.org/2340},
author = { },
publisher = {IEEE SigPort},
title = {Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach},
year = {2017} }
TY - EJOUR
T1 - Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach
AU -
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/2340
ER -
. (2017). Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach. IEEE SigPort. http://sigport.org/2340
, 2017. Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach. Available at: http://sigport.org/2340.
. (2017). "Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach." Web.
1. . Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/2340

DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION


The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmit one classical bit.

Paper Details

Authors:
Khaled Elleithy
Submitted On:
15 March 2017 - 11:03am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Alshowkan_Elleithy_ICASSP2017.pdf

(145 downloads)

Keywords

Subscribe

[1] Khaled Elleithy, "DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1768. Accessed: Jul. 17, 2018.
@article{1768-17,
url = {http://sigport.org/1768},
author = {Khaled Elleithy },
publisher = {IEEE SigPort},
title = {DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION},
year = {2017} }
TY - EJOUR
T1 - DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION
AU - Khaled Elleithy
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1768
ER -
Khaled Elleithy. (2017). DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION. IEEE SigPort. http://sigport.org/1768
Khaled Elleithy, 2017. DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION. Available at: http://sigport.org/1768.
Khaled Elleithy. (2017). "DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION." Web.
1. Khaled Elleithy. DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1768

TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING

Paper Details

Authors:
Guo An Han, Liang Xiao, H.Vincent Poor
Submitted On:
27 February 2017 - 10:29pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

poster_ICASSP17_paper1551.pdf

(236 downloads)

Keywords

Subscribe

[1] Guo An Han, Liang Xiao, H.Vincent Poor, "TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1471. Accessed: Jul. 17, 2018.
@article{1471-17,
url = {http://sigport.org/1471},
author = {Guo An Han; Liang Xiao; H.Vincent Poor },
publisher = {IEEE SigPort},
title = {TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING},
year = {2017} }
TY - EJOUR
T1 - TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING
AU - Guo An Han; Liang Xiao; H.Vincent Poor
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1471
ER -
Guo An Han, Liang Xiao, H.Vincent Poor. (2017). TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING. IEEE SigPort. http://sigport.org/1471
Guo An Han, Liang Xiao, H.Vincent Poor, 2017. TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING. Available at: http://sigport.org/1471.
Guo An Han, Liang Xiao, H.Vincent Poor. (2017). "TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING." Web.
1. Guo An Han, Liang Xiao, H.Vincent Poor. TWO-DIMENTIONAL ANTI-JAMMING COMMUNICATION BASED ON DEEP REINFORCEMENT LEARNING [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1471

Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks


This paper considers asymptotic perfect secrecy and asymptotic perfect estimation in distributed estimation for large sensor networks under threat of an eavesdropper, which has access to all sensor outputs. To measure secrecy, we compare the estimation performance at the fusion center and at eavesdropper in terms of their respective Fisher Information. We analyze the Fisher Information ratio between the fusion center and eavesdropper and derive the maximum achievable ratio when the channels between sensors and eavesdropper are noisy binary symmetric channels.

Paper Details

Authors:
Jun Guo, Hao Chen, Uri Rogers
Submitted On:
27 February 2017 - 8:52pm
Short Link:
Type:

Document Files

icassp_2017.pdf

(203 downloads)

Keywords

Subscribe

[1] Jun Guo, Hao Chen, Uri Rogers, "Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1461. Accessed: Jul. 17, 2018.
@article{1461-17,
url = {http://sigport.org/1461},
author = {Jun Guo; Hao Chen; Uri Rogers },
publisher = {IEEE SigPort},
title = {Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks},
year = {2017} }
TY - EJOUR
T1 - Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks
AU - Jun Guo; Hao Chen; Uri Rogers
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1461
ER -
Jun Guo, Hao Chen, Uri Rogers. (2017). Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks. IEEE SigPort. http://sigport.org/1461
Jun Guo, Hao Chen, Uri Rogers, 2017. Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks. Available at: http://sigport.org/1461.
Jun Guo, Hao Chen, Uri Rogers. (2017). "Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks." Web.
1. Jun Guo, Hao Chen, Uri Rogers. Asymptotic Perfect Secrecy in Distributed Estimation for Large Sensor Networks [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1461

Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding


Different transforms are compared to extract bit sequences used in secret-key binding for highly-correlated physical-identifier outputs. A set of transforms that perform well in terms of decorrelation efficiency is applied to ring oscillator (RO) outputs to improve the reliability and uniqueness of the extracted sequence, information leakage to an eavesdropper about the secret key and RO outputs, secret-key length, and hardware cost.

Paper Details

Authors:
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer
Submitted On:
2 December 2016 - 7:00am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Poster_GlobalSIP.pdf

(248 downloads)

Keywords

Subscribe

[1] Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, "Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding", IEEE SigPort, 2016. [Online]. Available: http://sigport.org/1329. Accessed: Jul. 17, 2018.
@article{1329-16,
url = {http://sigport.org/1329},
author = {Onur Günlü; Onurcan Iscan; Vladimir Sidorenko; Gerhard Kramer },
publisher = {IEEE SigPort},
title = {Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding},
year = {2016} }
TY - EJOUR
T1 - Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding
AU - Onur Günlü; Onurcan Iscan; Vladimir Sidorenko; Gerhard Kramer
PY - 2016
PB - IEEE SigPort
UR - http://sigport.org/1329
ER -
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer. (2016). Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding. IEEE SigPort. http://sigport.org/1329
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer, 2016. Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding. Available at: http://sigport.org/1329.
Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer. (2016). "Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding." Web.
1. Onur Günlü, Onurcan Iscan, Vladimir Sidorenko, Gerhard Kramer. Reliable Secret-key Binding for Physical Unclonable Functions with Transform Coding [Internet]. IEEE SigPort; 2016. Available from : http://sigport.org/1329

Pages