intended receiver
Recently Published Documents


TOTAL DOCUMENTS

21
(FIVE YEARS 15)

H-INDEX

2
(FIVE YEARS 1)

2022 ◽  
Vol 2161 (1) ◽  
pp. 012014
Author(s):  
Chiradeep Gupta ◽  
N V Subba Reddy

Abstract Cryptography is related and referred to as the secured transmission of messages amongst the sender and the intended receiver by ensuring confidentiality, integrity, and authentication. Diffie – Hellman (DH) key exchange protocol is a well-known algorithm that would generate a shared secret key among the sender and the intended receiver, and the basis of cryptosystems for using public and private key for encryption and decryption process. But it is severely affected by the Man in the Middle (MITM) attack that would intercept and manipulate thus eavesdropping the shared secret key. This paper proposes a model of integrating the public-key RSA cryptography system with the DH key exchange to prevent the MITM attack. The performance of the proposed work has been compared to the DH Key Exchange algorithm as well as RSA Cryptosystem to conclude for effectiveness of the proposed model.


2022 ◽  
Author(s):  
Longhui Zhao ◽  
Jichao Wang ◽  
Haodi Zhang ◽  
Tongliang Wang ◽  
Yue Yang ◽  
...  

Many animals rely on complex sexual signals that target multiple senses to attract mates and repel rivals. These multimodal mating displays can however also attract unintended receivers, which can be an important driver of signal complexity. Despite being taxonomically widespread, we often lack insight into how multimodal signals evolve from unimodal signals and in particular what roles unintended eavesdroppers play. Here we assess whether the physical movements of parasite defense behavior increase the complexity and attractiveness of an acoustic sexual signal in the little torrent frog (Amolops torrentis). Calling males of this species often display limb movements in order to defend against blood sucking parasites such as frog biting midges that eavesdrop on their acoustic signal. Through mate choice tests we show that some of these midge evoked movements influence female preference for acoustic signals. Our data suggest that midge induced movements may be incorporated into a sexual display, targeting both hearing and vision in the intended receiver. Females may play an important role in incorporating these multiple components because they prefer signals which combine multiple programs. Our results thus help to understand the relationship between ecological and sexual selection pressure operating on signalers and how in turn this may influence multimodal signal evolution.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Idban Alamzadeh ◽  
George C. Alexandropoulos ◽  
Nir Shlezinger ◽  
Mohammadreza F. Imani

AbstractReconfigurable reflective surfaces can alter the propagation environment to improve wireless communication and power transfer. Paramount to this operation—which has attracted much attention recently—is the assumption that the reflective surface has prior knowledge of the propagation environment, for example, the direction/location of the transmitter and the intended receiver(s). To address this need, we propose a reconfigurable reflective metasurface with integrated sensing capabilities. By modifying the tunable meta-atoms constituting the metasurface, we couple small portions of the incident wave to an array of sensing waveguides. As an illustrative example, we demonstrate the ability to use the sampled incident wave to detect its angle of arrival. In addition, we propose and numerically demonstrate the possibility to reduce the required sensors, i.e., the number of radio frequency (RF) chains needed to acquire the sensed signals, by leveraging the inherent metasurface’s tunable multiplexing capability. A reconfigurable reflective metasurface with integrated sensing capabilities can benefit wireless communications, wireless power transfer, RF sensing, and smart sensors.


Author(s):  
Chandrala M S ◽  
Dr. Kiran V

The advancement in the technology has led to the tremendous variance in the 5G domain. Development in some of the physical layer technologies would help think beyond 5G. One such technology is Intelligent Reflecting Surfaces (IRS). IRS caters to focusing the reception of the signal, only to the intended receiver, without loss of power. This otherwise termed as beamforming. In this a new and vast dimension, the wireless environment, in which signal propagates, to be tuned, for reliable transmission. The paper deals about what are Intelligent Reflecting Surfaces, features, false ideas, and critical analysis of how IRS can be a part of future beyond 5G.


Author(s):  
Pushkar Aneja

With the growing use of the Internet, and more people being connected with it, the security of the data becomes a major concern. It is necessary that the data can only be accessed by the intended receiver and no person in the middle makes alterations to it. This is achieved by encryption of the data using cryptography. This paper presents a comparative analysis of RSA (Rivest-Shamir-Adleman), Caesar Cipher and Playfair Cipher cryptographic techniques. This paper also presents a comparative analysis of Symmetric Key Cryptography and Asymmetric Key Cryptography. Also, this paper includes the basic working of the above-mentioned techniques along with their implementation in C language over Visual Studio Code 1.49.3.


2021 ◽  
Vol 9 ◽  
Author(s):  
Melanie L. Low ◽  
Mairelys Naranjo ◽  
Jayne E. Yack

Insect defense sounds have been reported for centuries. Yet, aside from the well-studied anti-bat sounds of tiger moths, little is understood about the occurrence, function, and evolution of these sounds. We define a defense sound as an acoustic signal (air- or solid-borne vibration) produced in response to attack or threat of attack by a predator or parasitoid and that promotes survival. Defense sounds have been described in 12 insect orders, across different developmental stages, and between sexes. The mechanisms of defensive sound production include stridulation, percussion, tymbalation, tremulation, and forced air. Signal characteristics vary between species, and we discuss how morphology, the intended receiver, and specific functions of the sounds could explain this variation. Sounds can be directed at predators or non-predators, and proposed functions include startle, aposematism, jamming, and alarm, although experimental evidence for these hypotheses remains scant for many insects. The evolutionary origins of defense sounds in insects have not been rigorously investigated using phylogenetic methodology, but in most cases it is hypothesized that they evolved from incidental sounds associated with non-signaling behaviors such as flight or ventilatory movements. Compared to our understanding of visual defenses in insects, sonic defenses are poorly understood. We recommend that future investigations focus on testing hypotheses explaining the functions and evolution of these survival sounds using predator-prey experiments and comparative phylogenetics.


Sensors ◽  
2020 ◽  
Vol 21 (1) ◽  
pp. 127
Author(s):  
Omer Gurewitz ◽  
Oren Zaharia

The prevalence of the Internet of Things (IoT) paradigm in more and more applications associated with our daily lives has induced a dense network in which numerous wireless devices, many of which have limited capabilities (e.g., power, memory, computation), need to communicate with the internet. One of the main bottlenecks of this setup is the wireless channel. Numerous medium access control (MAC) protocols have been devised to coordinate between devices that share the wireless channel. One prominent approach that is highly suitable for IoT and wireless sensor networks (WSNs), which rely on duty cycling, is the receiver-initiated approach, in which, rather than the transmitter, the receiver initiates the transaction. The problem with this approach is that when many devices are trying to respond to the receiver’s transmission invitation and transmit simultaneously, a collision occurs. When the network is highly loaded, resolving such collisions is quite tedious. In this paper, we devise an enhancement to the receiver-initiated approach that aims at preventing this inherent collision scenario. Our modification relies on multiple devices sending a short predefined signal, informing their intended receiver of their intention to transmit simultaneously. The data transaction is done via a four-way handshake in which, after all backlogged devices have informed their designated receiver of their desire to transmit simultaneously, the receiver identifies them and polls them one by one, avoiding the collision. We compare the performance of Receiver-Initiated-MAC protocol (RI-MAC), which is one of the prevalent receiver-initiated protocols, with and without the suggested enhancement, and show superior air-time utilization under high traffic loads, especially in the presence of hidden terminals.


2020 ◽  
Vol 2 (2) ◽  
pp. 18-24
Author(s):  
Shaddrack Yaw Nusenu

Configuration of antenna array system to offer directional dependent modulation has the capability of enhancing the security level of data transmission against eavesdroppers’ attacks. In this paper, Frequency diverse array (FDA) antenna for physical–layer security in wireless communications has been proposed. The proposed method provide a range and angle dependent directional modulation scheme using FDA with frequency increments to improve physical-layer security point-to-point communications. It maintains the objective of changing the progressive phase shifts at each symbol transmission. Thus the emitted pattern at each symbol transmission period will be range and angle dependent. Consequently, the proposed method offers a robust physical-layer security for wireless transmission, as the transmitted signal will be deliberately distorted along the undesired positions, but can be successfully decoded by the intended receiver position. Numerical results are presented to validate the effectiveness of the proposed method. Keywords: Frequency diverse array; Physical-layer security; Directional antenna modulation; Wireless communication; Range and angle dependent.


2020 ◽  
Author(s):  
Michele ER Pierotti ◽  
Anna Wandycz ◽  
Pawel Wandycz ◽  
Anja Rebelein ◽  
Vitor H Corredor ◽  
...  

ABSTRACTSince all forms of mimicry are based on perceptual deception, the sensory ecology of the intended receiver is of paramount importance to test the necessary precondition for mimicry to occur, i.e. model-mimic misidentification, and to gain insight in the origin and evolutionary trajectory of the signals. Here we test the potential for aggressive mimicry by a group of coral reef fishes, the color polymorphic Hypoplectrus hamlets, from the point of view of their most common prey, small epibenthic gobies and mysid shrimp. We build visual models based on the visual pigments and spatial resolution of the prey, the underwater light spectrum and color reflectances of putative models and their hamlet mimics. Our results are consistent with one mimic-model relationship between the butter hamlet H. unicolor and its model the butterflyfish Chaetodon capistratus but do not support a second proposed mimic-model pair between the black hamlet H. nigricans and the dusky damselfish Stegastes adustus. We discuss our results in the context of color morphs divergence in the Hypoplectrus species radiation and suggest that aggressive mimicry in H. unicolor might have originated in the context of protective (Batesian) mimicry by the hamlet from its fish predators.


Recently, the world has been interested in transferring data between different devices. The transmission of data must be encrypted so that the intended receiver can only read and process a secret message. Hence, the security of information has become more important than earlier. This paper proposes the least significant bit Steganography method to hide a secret message inside an image cover via using dynamic stego-key. To check the effectiveness of the proposed method, many factors are used for evaluation and compared with another method. The results illustrate more robustness at steganography since stego-key depends on the cover image to hide a secret message.


Sign in / Sign up

Export Citation Format

Share Document