scholarly journals Robust Transmission Design for Intelligent Reflecting Surface Aided Secure Communication Systems with Imperfect Cascaded CSI

Author(s):  
Sheng Hong ◽  
Cunhua Pan ◽  
Hong Ren ◽  
Kezhi Wang ◽  
Kok Keong Chai ◽  
...  
2020 ◽  
Vol 24 ◽  
pp. 100284 ◽  
Author(s):  
Xinying Ma ◽  
Zhi Chen ◽  
Wenjie Chen ◽  
Yaojia Chi ◽  
Zhuoxun Li ◽  
...  

2021 ◽  
Author(s):  
Nisar Ahmad ◽  
Muhammad Usman Younus ◽  
Muhammad Rizwan Anjum ◽  
Gulshan Saleem ◽  
Zaheer Ahmed Gondal ◽  
...  

Abstract Digital data must be compressed and encrypted to maintain confidentiality and efficient bandwidth usage. These two parameters are essential for information processing in most communication systems. Image compression and encryption may result in reduced restoration quality and degraded performance. This study attempts to provide a compression and encryption scheme for digital data named as Secure-JPEG. This scheme is built on the JPEG compression format, the most widely used lossy compression scheme. It extends the standard JPEG compression algorithm to encrypt data during compression. Secure-JPEG scheme provides encryption along with the process of compression, and it could be altered easily to provide lossless compression. On the other hand, the lossless compression provides less compression ratio and is suitable only in specific scenarios. The paper address the problem of security lacks due to the use of a simple random number generator which can not be cryptographically secure. The improved security characteristics are provided through Generalized Bernoulli Shift Map, which has a chaotic system with demonstrated security. The algorithm's security is tested by several cryptographic tests and the chaotic system’s behavior is also analyzed.


Author(s):  
Ryma Abassi ◽  
Sihem Guemara El Fatmi

Specifying a security policy (SP) is a challenging task in the development of secure communication systems since it is the bedrock of any security strategy. Paradoxically, this specification is error prone and can lead to an inadequate SP regarding the security needs. Therefore, it seems necessary to define an environment allowing one to “trust” the implemented SP. A testing task aims verifying whether an implementation is conforming to its specification. Test is generally achieved by generating and executing test cases. Some automated testing tools can be used from which model checkers. In fact, given a system modeling and a test objective, the model checker can generate a counterexample from which test cases can be deduced. The main proposition of this chapter is then a formal environment for SP test cases generation based on a system modeling, a SP specification (test purpose), and the use of a model checker. Once generated, these test cases must be improved in order to quantify their effectiveness to detect SP flaws. This is made through the generation of mutants.


Author(s):  
Kehui Sun

Chaos is characterized by aperiodic, wideband, random-like, and ergodicity. Chaotic secure communication has become one of the hot topics in nonlinear dynamics since the early 1990s exploiting the technique of chaos synchronization. As distinguished by the type of information being carried, chaos-based communication systems can be categorized into analogy and digital, including four popular techniques such as Chaos Masking, Chaos Shift Keying, Chaos Modulation, and Chaos Spreading Spectrum. In this chapter, the principles of these schemes and their modifications are analyzed by theoretical analysis as well as dynamic simulation. In addition, chaos-based cryptography is a new approach to encrypt information. After analyzing the performances of chaotic sequence and designing an effective chaotic sequence generator, the authors briefly presented the principle of two classes of chaotic encryption schemes, chaotic sequence encryption and chaotic data stream encryption.


Sign in / Sign up

Export Citation Format

Share Document