The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] interception(4hit)

1-4hit
  • Anti-Interception Vortex Microwave Photon Transmission with Covert Differential Channel Open Access

    Yuanhe WANG  Chao ZHANG  

     
    LETTER-Digital Signal Processing

      Pubricized:
    2024/06/14
      Vol:
    E107-A No:10
      Page(s):
    1621-1622

    With the emphasis on personal information privacy protection in wireless communications, the new dimension low-interception covert transmission technology represented by the vortex wave with Orbital Angular Momentum (OAM) has received attention from both academia and industry. However, the current OAM low-interception transmission techniques all assume that the eavesdropper can only receive plane wave signals, which is a very ideal situation. Once the eavesdropper is configured with an OAM sensor, the so-called mode covert channel will be completely exposed. To solve this problem, this paper proposes a vortex microwave photon low-interception transmission method. The proposed method utilizes the differential operation between plane and vortex microwave photons signals to construct the covert differential channel, which can hide the user data in the mode domain. Compared with the traditional spread spectrum transmission, our proposed covert differential channel schemes need less transmitted power to achieve reliable transmission, which means less possibility of being intercepted by the eavesdropper.

  • A Subcarrier-Reference Scheme for Multiuser MISO-OFDMA Systems with Low Probability of Interception

    Wenyu LUO  Liang JIN  Yingsong LI  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:10
      Page(s):
    2872-2876

    Recently, Li and Xia proposed a physical-layer security design to guarantee a low probability of interception (LPI) for asynchronous cooperative systems without relying on upper-layer data encryption. The proposed scheme utilizes diagonal unitary codes to perform different encoding in the frequency domain over subcarriers within each OFDM block to randomize the transmitted signals. To build on their idea, in this letter, a subcarrier-reference (SR) transmission scheme is proposed with deliberate signal randomization to achieve LPI in multiuser MISO-OFDMA systems. For each user, one of the allocated subcarriers is chosen by the transmitter to send reference signals, and others are chosen to send the user's information symbols. By some deliberate signal randomization, the eavesdropper cannot detect the transmitted symbols, while the authorized users can operate the system successfully without knowledge of the channels by subcarrier-reference demodulation. Extensive simulations are conducted to demonstrate the scheme's effectiveness.

  • A Seamless Lawful Interception Triggering Architecture for the Heterogeneous Wireless Networks

    Myoungrak LEE  Byungsik YOON  Hyogon KIM  Hoh Peter IN  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    473-483

    Lawful Interception (LI) refers to a lawfully authorized process of looking into private communication under a court-issued warrant. Quite a number of countries have been drafting and enacting laws authorizing the LI procedures on packet-switched IP networks including traditional circuit-switched ones. As the IP mobility becomes more ubiquitous, propelled by wireless networks, it becomes an issue in the LI domain to keep track of a migrating target. However, with the world's focus on the current LI architectures, little consideration has been given to a seamless LI triggering, which accommodates IP mobility and vertical handover. Proposed herein are a seamless LI architecture and relevant triggering algorithms for the heterogeneous wireless networks. The simulation results demonstrate that the proposed architecture secures a seamless LI by capturing all the suspected target traffics without any time delay, which usually occurs during an LI triggering between different service providers. Furthermore, when compared with the existing LI architectures, the architecture significantly helps reduce transmission and the time consumed for analysis of the content of communication (CC) and intercept related information (IRI).

  • Scalable Evolution of Highly Available Systems

    Jason O. HALLSTROM  William M. LEAL  Anish ARORA  

     
    PAPER-Reliability and Availability

      Vol:
    E86-D No:10
      Page(s):
    2154-2164

    The demand for highly available software systems has increased dramatically over the past several years. Such systems must be developed using a discipline that supports unanticipated runtime evolution. We characterize the desiderata of a programming model that provides such support, and describe the design and implementation of an architecture satisfying these criteria. The Dynamic Reconfiguration Subsystem (DRSS) is an interceptor-based open container architecture that supports the development of highly available systems by enabling the scalable, dynamic deployment of cross-cutting software modifications. We have implemented a prototype of DRSS using Microsoft's .NET Framework.