- 标题
- 摘要
- 关键词
- 实验方案
- 产品
-
[Advances in Intelligent Systems and Computing] Image Processing and Communications Challenges 10 Volume 892 (10th International Conference, IP&C’2018 Bydgoszcz, Poland, November 2018, Proceedings) || Air-Gap Data Transmission Using Backlight Modulation of Screen
摘要: Novel technique for data transmission from air–gap secured computer is considered in this paper. Backlight modulation of screen using BFSK allows data transmission that is not visible for human. The application of digital camera equipped and telescope allows data recovery during the lack of the user’s activity. Demodulation scheme with automatic selection of demodulation ?lters is presented. Di?erent con?guration of data transmission parameters and acquisition hardware were tested.
关键词: BFSK,Image processing,Air–gap transmission,Network security,Digital demodulation
更新于2025-09-23 15:21:21
-
[IEEE 2018 20th International Conference on Transparent Optical Networks (ICTON) - Bucharest (2018.7.1-2018.7.5)] 2018 20th International Conference on Transparent Optical Networks (ICTON) - Resilient Optical Networks <sup>1</sup>
摘要: Networking resilience is the ability to provide and maintain an acceptable level of service, albeit potentially degraded from nominal, in the face of faults and challenges to normal, including adversarial attacks. This paper explores the concept of resilient optical networks and scopes the important issues to be addressed in a sensible architecture. The solution includes monitoring and probing to determine the states of potentially unreliable network substrates, assessment of resilient network operating regimes, isolation of compromised assets, deployment of mitigation measures that may require communication over unreliable substrates and suggestions for resilient architecture design and improvement. The architecture construct evolves around a robust control plane that uses cognitive techniques to assess network states and automatically reacts to the on-set of impairments and attacks involving all the network layers from the Physical Layer to the Application Layer.
关键词: resilient networks,optical network architecture,network reconstitution,network security
更新于2025-09-19 17:15:36
-
LuxSteg: First Practical Implementation of Steganography in VLC
摘要: Visible-light communication (VLC) is a new technique for high-speed, low-cost wireless data transmission services. One of the areas in which VLC is considered superior to traditional radio-based communication is security. The common slogan summarizing the VLC security features is WYSIWYS—''What You See Is What You Send.'' However, the broadcast nature of downlink VLC makes it possible for eavesdroppers to easily intercept the light communication in various settings, e.g., offices, conference rooms, plenum spaces, and so on. Similarly to radio-based data broadcasting systems, such as Wi-Fi, VLC opens the possibilities of hiding information in the public channel. In this paper, we describe (for the first time, to the best of our knowledge) the implementation of steganographic data transmission in a VLC system called LuxSteg. This VLC system utilizes pulse position modulation and direct sequence-code division multiple access modulation. In our implementation, multiple steganographic data streams are mixed with the spreading codes and combined with the overt data stream. We achieve a steganographic transmission rate of approximately 1 Mb/s hidden in a 110-Mb/s data stream. We analyze the influence of the spreading factor, spreading code type, number of hidden data streams, and the amplitude on the achievable transmission rate, undetectability, and robustness.
关键词: network security,computer networks,Communication system security,visible light communication
更新于2025-09-19 17:15:36
-
[IEEE 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE) - Bhubaneswar, India (2018.7.27-2018.7.28)] 2018 International Conference on Recent Innovations in Electrical, Electronics & Communication Engineering (ICRIEECE) - Performance Analysis Of P-V And Q-F Droop Control Strategy In An Islanded Resistive Microgrid During Partial Shading On Photovoltaic Plant
摘要: Statistics from security firms, research institutions and government organizations show that the number of data-leak instances have grown rapidly in recent years. Among various data-leak cases, human mistakes are one of the main causes of data loss. There exist solutions detecting inadvertent sensitive data leaks caused by human mistakes and to provide alerts for organizations. A common approach is to screen content in storage and transmission for exposed sensitive information. Such an approach usually requires the detection operation to be conducted in secrecy. However, this secrecy requirement is challenging to satisfy in practice, as detection servers may be compromised or outsourced. In this paper, we present a privacy-preserving data-leak detection (DLD) solution to solve the issue where a special set of sensitive data digests is used in detection. The advantage of our method is that it enables the data owner to safely delegate the detection operation to a semihonest provider without revealing the sensitive data to the provider. We describe how Internet service providers can offer their customers DLD as an add-on service with strong privacy guarantees. The evaluation results show that our method can support accurate detection with very small number of false alarms under various data-leak scenarios.
关键词: privacy,network security,Data leak,collection intersection
更新于2025-09-19 17:13:59
-
[IEEE 2019 18th International Conference on Optical Communications and Networks (ICOCN) - Huangshan, China (2019.8.5-2019.8.8)] 2019 18th International Conference on Optical Communications and Networks (ICOCN) - Chaotic Discrete Cosine Transform for Physical-Layer Data Encryption in OFDM-PON
摘要: Chaotic discrete cosine transform is proposed to enhance both the physical-layer security and the transmission performance in OFDM-PON. Experimentally, secure transmission of 13.3Gb/s OFDM signals shows a ~1.5 dB (BER@10-3) improvement in receiver sensitivity.
关键词: Optical Communications,data encryption,chaotic discrete cosine transform,network security
更新于2025-09-16 10:30:52
-
Chaos Synchronization in Visible Light Communications with Variable Delays Induced by Multipath Fading
摘要: Visible Light Communication (VLC) uses light-emitting diodes to provide wireless connectivity in public environments. Transmission security in this emerging channel is not trivial. Chaotic modulation techniques can provide encryption directly in the physical layer based on the random-alike evolution and strong synchronization prospect given by deterministic chaos. In secure chaotic inclusion or embedding methods, continuous-time chaos oscillator models need to be synchronized via a coupling carrier. Here we present a ?rst numerical simulation study for the impact of the variable delays induced by line-of-sight and non-line-of-sight multipath fading in complete chaotic synchronization. More precisely, we analyze a chaotic Colpitts oscillator that is simultaneously transmitting the carrier to several mobile receivers via nine spotlights. Such induced delays depend on both the receiver position and the carrier frequency, in?uencing the complete synchronization required in modulation via chaotic inclusion. Correlation values for several receiver positions and carrier frequencies are presented, examining the progressive emergence of the multipath effect and its impact on chaotic synchronization. We show that, for the chaotic oscillator and coupling applied in the de?ned room settings, complete chaotic synchronization can be achieved and that it is robust up to the tens of MHz region.
关键词: multipath channels,network security,chaotic communication,visible light communication,nonlinear systems,chaos synchronization
更新于2025-09-04 15:30:14