Securing IPv6 Neighbor Discovery using Pre-Shared Key

2021 ◽  
Vol 6 (2) ◽  
pp. 722-732
Author(s):  
Rezaur Rahman ◽  
Hossen Asiful Mustafa
2010 ◽  
Vol E93-B (5) ◽  
pp. 1151-1154
Author(s):  
Jihoon LEE ◽  
Seungwoo JEON ◽  
Jaehoon KIM

2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Hussein Abulkasim ◽  
Atefeh Mashatan ◽  
Shohini Ghose

AbstractQuantum key agreement enables remote participants to fairly establish a secure shared key based on their private inputs. In the circular-type multiparty quantum key agreement mode, two or more malicious participants can collude together to steal private inputs of honest participants or to generate the final key alone. In this work, we focus on a powerful collusive attack strategy in which two or more malicious participants in particular positions, can learn sensitive information or generate the final key alone without revealing their malicious behaviour. Many of the current circular-type multiparty quantum key agreement protocols are not secure against this collusive attack strategy. As an example, we analyze the security of a recently proposed multiparty key agreement protocol to show the vulnerability of existing circular-type multiparty quantum key agreement protocols against this collusive attack. Moreover, we design a general secure multiparty key agreement model that would remove this vulnerability from such circular-type key agreement protocols and describe the necessary steps to implement this model. The proposed model is general and does not depend on the specific physical implementation of the quantum key agreement.


2021 ◽  
pp. 101329
Author(s):  
Weidang Lu ◽  
Lixia Weng ◽  
Chenkai Li ◽  
Guoxing Huang ◽  
Yu Zhang ◽  
...  

Electronics ◽  
2021 ◽  
Vol 10 (2) ◽  
pp. 169
Author(s):  
Sherief Hashima ◽  
Basem M. ElHalawany ◽  
Kohei Hatano ◽  
Kaishun Wu ◽  
Ehab Mahmoud Mohamed

Device-to-device (D2D) communication is a promising paradigm for the fifth generation (5G) and beyond 5G (B5G) networks. Although D2D communication provides several benefits, including limited interference, energy efficiency, reduced delay, and network overhead, it faces a lot of technical challenges such as network architecture, and neighbor discovery, etc. The complexity of configuring D2D links and managing their interference, especially when using millimeter-wave (mmWave), inspire researchers to leverage different machine-learning (ML) techniques to address these problems towards boosting the performance of D2D networks. In this paper, a comprehensive survey about recent research activities on D2D networks will be explored with putting more emphasis on utilizing mmWave and ML methods. After exploring existing D2D research directions accompanied with their existing conventional solutions, we will show how different ML techniques can be applied to enhance the D2D networks performance over using conventional ways. Then, still open research directions in ML applications on D2D networks will be investigated including their essential needs. A case study of applying multi-armed bandit (MAB) as an efficient online ML tool to enhance the performance of neighbor discovery and selection (NDS) in mmWave D2D networks will be presented. This case study will put emphasis on the high potency of using ML solutions over using the conventional non-ML based methods for highly improving the average throughput performance of mmWave NDS.


Sign in / Sign up

Export Citation Format

Share Document