Sorry, you need to enable JavaScript to visit this website.

Communications and Network Security

On the Computability of the Secret Key Capacity Under Rate Constraints


Secret key generation refers to the problem of generating a common secret key without revealing any information about it to an eavesdropper. All users observe correlated components of a common source and can further use a rate-limited public channel for discussion which is open to eavesdroppers. This paper studies the Turing computability of the secret key capacity with a single rate-limited public forward transmission. Turing computability provides fundamental performance limits for today’s digital computers.

Paper Details

Authors:
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor
Submitted On:
16 May 2019 - 4:42am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

icassp19_skg_talk.pdf

(3)

Subscribe

[1] Holger Boche, Rafael F. Schaefer, and H. Vincent Poor, "On the Computability of the Secret Key Capacity Under Rate Constraints", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4537. Accessed: May. 20, 2019.
@article{4537-19,
url = {http://sigport.org/4537},
author = {Holger Boche; Rafael F. Schaefer; and H. Vincent Poor },
publisher = {IEEE SigPort},
title = {On the Computability of the Secret Key Capacity Under Rate Constraints},
year = {2019} }
TY - EJOUR
T1 - On the Computability of the Secret Key Capacity Under Rate Constraints
AU - Holger Boche; Rafael F. Schaefer; and H. Vincent Poor
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4537
ER -
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor. (2019). On the Computability of the Secret Key Capacity Under Rate Constraints. IEEE SigPort. http://sigport.org/4537
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor, 2019. On the Computability of the Secret Key Capacity Under Rate Constraints. Available at: http://sigport.org/4537.
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor. (2019). "On the Computability of the Secret Key Capacity Under Rate Constraints." Web.
1. Holger Boche, Rafael F. Schaefer, and H. Vincent Poor. On the Computability of the Secret Key Capacity Under Rate Constraints [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4537

Detectability of Denial-of-Service Attacks on Communication Systems


Wireless communication systems are inherently vulnerable to adversarial attacks since malevolent jammers might jam and disrupt the legitimate transmission intentionally. Accordingly it is of crucial interest for the legitimate users to detect such adversarial attacks. This paper develops a detection framework based on Turing machines and studies the detectability of adversarial attacks. Of particular interest are so-called denial-of-service attacks in which the jammer is able to completely prevent any transmission.

Paper Details

Authors:
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor
Submitted On:
16 May 2019 - 4:44am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

icassp19_dos_poster.pdf

(4)

Subscribe

[1] Holger Boche, Rafael F. Schaefer, and H. Vincent Poor, "Detectability of Denial-of-Service Attacks on Communication Systems", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4453. Accessed: May. 20, 2019.
@article{4453-19,
url = {http://sigport.org/4453},
author = {Holger Boche; Rafael F. Schaefer; and H. Vincent Poor },
publisher = {IEEE SigPort},
title = {Detectability of Denial-of-Service Attacks on Communication Systems},
year = {2019} }
TY - EJOUR
T1 - Detectability of Denial-of-Service Attacks on Communication Systems
AU - Holger Boche; Rafael F. Schaefer; and H. Vincent Poor
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4453
ER -
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor. (2019). Detectability of Denial-of-Service Attacks on Communication Systems. IEEE SigPort. http://sigport.org/4453
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor, 2019. Detectability of Denial-of-Service Attacks on Communication Systems. Available at: http://sigport.org/4453.
Holger Boche, Rafael F. Schaefer, and H. Vincent Poor. (2019). "Detectability of Denial-of-Service Attacks on Communication Systems." Web.
1. Holger Boche, Rafael F. Schaefer, and H. Vincent Poor. Detectability of Denial-of-Service Attacks on Communication Systems [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4453

Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT


Slide of Presentation in ICASSP 2019

Paper Details

Authors:
Tong Zhang, P. C. Ching
Submitted On:
10 May 2019 - 9:16am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

ICASSP 2019 Slide.pdf

(7)

Subscribe

[1] Tong Zhang, P. C. Ching, "Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT", IEEE SigPort, 2019. [Online]. Available: http://sigport.org/4325. Accessed: May. 20, 2019.
@article{4325-19,
url = {http://sigport.org/4325},
author = {Tong Zhang; P. C. Ching },
publisher = {IEEE SigPort},
title = {Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT},
year = {2019} }
TY - EJOUR
T1 - Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT
AU - Tong Zhang; P. C. Ching
PY - 2019
PB - IEEE SigPort
UR - http://sigport.org/4325
ER -
Tong Zhang, P. C. Ching. (2019). Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT. IEEE SigPort. http://sigport.org/4325
Tong Zhang, P. C. Ching, 2019. Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT. Available at: http://sigport.org/4325.
Tong Zhang, P. C. Ching. (2019). "Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT." Web.
1. Tong Zhang, P. C. Ching. Secure MIMO Interference Channel with Con dential Messages and Delayed CSIT [Internet]. IEEE SigPort; 2019. Available from : http://sigport.org/4325

Covert Communications in a Dynamic Interference Environment


Much of security research focuses on preventing an adversary from deciphering a message's content, but there are a number of applications that motivate the more challenging goal of ``covert'' communications: transmitter Alice conveying information to legitimate receiver Bob while preventing a capable and attentive adversary Willie from detecting the presence of the message.

Paper Details

Authors:
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha
Submitted On:
22 June 2018 - 1:33pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

SPAWC_poster_goeckel.pdf

(154)

Subscribe

[1] Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha, "Covert Communications in a Dynamic Interference Environment", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3297. Accessed: May. 20, 2019.
@article{3297-18,
url = {http://sigport.org/3297},
author = {Azadeh Sheikholeslami; Tamara Sobers; Boulat Bash; Donald Towsley; and Saikat Guha },
publisher = {IEEE SigPort},
title = {Covert Communications in a Dynamic Interference Environment},
year = {2018} }
TY - EJOUR
T1 - Covert Communications in a Dynamic Interference Environment
AU - Azadeh Sheikholeslami; Tamara Sobers; Boulat Bash; Donald Towsley; and Saikat Guha
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3297
ER -
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. (2018). Covert Communications in a Dynamic Interference Environment. IEEE SigPort. http://sigport.org/3297
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha, 2018. Covert Communications in a Dynamic Interference Environment. Available at: http://sigport.org/3297.
Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. (2018). "Covert Communications in a Dynamic Interference Environment." Web.
1. Azadeh Sheikholeslami, Tamara Sobers, Boulat Bash, Donald Towsley, and Saikat Guha. Covert Communications in a Dynamic Interference Environment [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3297

Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO

Paper Details

Authors:
Amr Abdelaziz, C. Emre Koksal
Submitted On:
21 June 2018 - 12:27pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

spawc_18.pdf

(72)

Subscribe

[1] Amr Abdelaziz, C. Emre Koksal, "Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3287. Accessed: May. 20, 2019.
@article{3287-18,
url = {http://sigport.org/3287},
author = {Amr Abdelaziz; C. Emre Koksal },
publisher = {IEEE SigPort},
title = {Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO},
year = {2018} }
TY - EJOUR
T1 - Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO
AU - Amr Abdelaziz; C. Emre Koksal
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3287
ER -
Amr Abdelaziz, C. Emre Koksal. (2018). Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO. IEEE SigPort. http://sigport.org/3287
Amr Abdelaziz, C. Emre Koksal, 2018. Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO. Available at: http://sigport.org/3287.
Amr Abdelaziz, C. Emre Koksal. (2018). "Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO." Web.
1. Amr Abdelaziz, C. Emre Koksal. Beyond PKI: Enhanced Authentication in Vehicular Networks via MIMO [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3287

Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer

Paper Details

Authors:
Submitted On:
19 April 2018 - 3:32pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Presentation.pdf

(490)

Subscribe

[1] , "Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/3011. Accessed: May. 20, 2019.
@article{3011-18,
url = {http://sigport.org/3011},
author = { },
publisher = {IEEE SigPort},
title = {Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer},
year = {2018} }
TY - EJOUR
T1 - Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer
AU -
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/3011
ER -
. (2018). Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer. IEEE SigPort. http://sigport.org/3011
, 2018. Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer. Available at: http://sigport.org/3011.
. (2018). "Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer." Web.
1. . Secrecy Capacity Under List Decoding for a Channel With a Passive Eavesdropper and an Active Jammer [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/3011

QoI: Assessing Participation in Threat Information Sharing


We introduce the notion of Quality of Indicator (QoI) to assess the level of contribution by participants in threat intelligence sharing. We exemplify QoI by metrics of the correctness, relevance, utility, and uniqueness of indicators. We build a system that extrapolates the metrics using a machine learning process over a reference set of indicators.

Paper Details

Authors:
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen
Submitted On:
19 April 2018 - 1:10pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

JemanPark_ICASSP_QoI.pptx

(104)

Subscribe

[1] Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen, "QoI: Assessing Participation in Threat Information Sharing", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2985. Accessed: May. 20, 2019.
@article{2985-18,
url = {http://sigport.org/2985},
author = {Jeman Park; Hisham Alasmary; Omar Al-Ibrahim; Charles Kamhoua; Kevin Kwiat; Laurent Njilla; Aziz Mohaisen },
publisher = {IEEE SigPort},
title = {QoI: Assessing Participation in Threat Information Sharing},
year = {2018} }
TY - EJOUR
T1 - QoI: Assessing Participation in Threat Information Sharing
AU - Jeman Park; Hisham Alasmary; Omar Al-Ibrahim; Charles Kamhoua; Kevin Kwiat; Laurent Njilla; Aziz Mohaisen
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2985
ER -
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. (2018). QoI: Assessing Participation in Threat Information Sharing. IEEE SigPort. http://sigport.org/2985
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen, 2018. QoI: Assessing Participation in Threat Information Sharing. Available at: http://sigport.org/2985.
Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. (2018). "QoI: Assessing Participation in Threat Information Sharing." Web.
1. Jeman Park, Hisham Alasmary, Omar Al-Ibrahim, Charles Kamhoua, Kevin Kwiat, Laurent Njilla, Aziz Mohaisen. QoI: Assessing Participation in Threat Information Sharing [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2985

DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS


Motivated by privacy issues in the Internet of Things systems, we generalize a proposed privacy-preserving packet obfuscation scheme to guarantee differential privacy. We propose a locally differentially private packet obfuscation mechanism as a defense against packet-size side-channel attacks in IoT networks. We formulate the problem as an optimization over a conditional probability distribution (channel) between the original and obfuscated packet sizes and show that the optimal set of obfuscated packet sizes is a strict subset of the set of original packet sizes.

Paper Details

Authors:
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam
Submitted On:
14 April 2018 - 3:11pm
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

IEEE_ICASSP2018_POSTER

(239)

Subscribe

[1] Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, "DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS", IEEE SigPort, 2018. [Online]. Available: http://sigport.org/2769. Accessed: May. 20, 2019.
@article{2769-18,
url = {http://sigport.org/2769},
author = {Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam },
publisher = {IEEE SigPort},
title = {DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS},
year = {2018} }
TY - EJOUR
T1 - DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS
AU - Sijie Xiong; Anand D. Sarwate; Narayan B. Mandayam
PY - 2018
PB - IEEE SigPort
UR - http://sigport.org/2769
ER -
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2018). DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS. IEEE SigPort. http://sigport.org/2769
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam, 2018. DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS. Available at: http://sigport.org/2769.
Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. (2018). "DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS." Web.
1. Sijie Xiong, Anand D. Sarwate, Narayan B. Mandayam. DEFENDING AGAINST PACKET-SIZE SIDE-CHANNEL ATTACKS IN IOT NETWORKS [Internet]. IEEE SigPort; 2018. Available from : http://sigport.org/2769

Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach

Paper Details

Authors:
Submitted On:
13 November 2017 - 1:21pm
Short Link:
Type:
Event:

Document Files

Conference Paper

(190)

Subscribe

[1] , "Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/2340. Accessed: May. 20, 2019.
@article{2340-17,
url = {http://sigport.org/2340},
author = { },
publisher = {IEEE SigPort},
title = {Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach},
year = {2017} }
TY - EJOUR
T1 - Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach
AU -
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/2340
ER -
. (2017). Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach. IEEE SigPort. http://sigport.org/2340
, 2017. Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach. Available at: http://sigport.org/2340.
. (2017). "Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach." Web.
1. . Defense against Stealthy Jammer Attacks in Wide-band Radios- A Physical Layer Approach [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/2340

DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION


The field of quantum computing is based on the laws of quantum mechanics, including states superposition and entanglement. Quantum cryptography is amongst the most surprising applications of quantum mechanics in quantum information processing. Remote state preparation allows a known state to a sender to be remotely prepared at a receiver’s location when they prior share entanglement and transmit one classical bit.

Paper Details

Authors:
Khaled Elleithy
Submitted On:
15 March 2017 - 11:03am
Short Link:
Type:
Event:
Presenter's Name:
Paper Code:
Document Year:
Cite

Document Files

Alshowkan_Elleithy_ICASSP2017.pdf

(229)

Subscribe

[1] Khaled Elleithy, "DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION", IEEE SigPort, 2017. [Online]. Available: http://sigport.org/1768. Accessed: May. 20, 2019.
@article{1768-17,
url = {http://sigport.org/1768},
author = {Khaled Elleithy },
publisher = {IEEE SigPort},
title = {DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION},
year = {2017} }
TY - EJOUR
T1 - DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION
AU - Khaled Elleithy
PY - 2017
PB - IEEE SigPort
UR - http://sigport.org/1768
ER -
Khaled Elleithy. (2017). DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION. IEEE SigPort. http://sigport.org/1768
Khaled Elleithy, 2017. DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION. Available at: http://sigport.org/1768.
Khaled Elleithy. (2017). "DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION." Web.
1. Khaled Elleithy. DETERMINISTIC AND EFFICIENT THREE-PARTY QUANTUM KEY DISTRIBUTION [Internet]. IEEE SigPort; 2017. Available from : http://sigport.org/1768

Pages