Quantum cryptography is the study of unconditional information security against an all-powerful eavesdropper in secret key distillation. However, the assumption of an omnipotent eavesdropper is too strict for some realistic implementations. In this paper, we study the realistic application model of secret key distillation over a satellite-to-satellite free-space channel in which we impose a reasonable restriction on the eavesdropper by setting an exclusion zone around the legitimate receiver as a defense strategy. We first study the case where the eavesdropper’s aperture size is unlimited so their power is only restricted by the exclusion zone. Then, we limit Eve’s aperture to a finite size and study the straightforward case when her aperture is in the same plane of Bob’s, investigating how an exclusion zone can help improve security. Correspondingly, we determine the secret key rate lower bounds as well as upper bounds. Furthermore, we also apply our results on specific discrete variable (DV) and continuous variable (CV) protocols for comparison. We show that, by putting reasonable restrictions on the eavesdropper through the realistic assumptions of an inaccessible exclusion zone, we can significantly increase the key rate in comparison to those without and do so with relatively lower transmission frequency. We conclude that this model is suitable for extended analysis in many light-gathering scenarios and for different carrier wavelengths.
more »
« less
Security in Terahertz WLANs with Leaky Wave Antennas
This paper presents the first security study of THz networks with Leaky Wave Antennas (LWAs). We employ a mix of analytical models and over-the-air experiments to explore the unique security properties of LWA links. We show via both models and experiments that the LWA’s angle-frequency coupling leads to non-uniform secrecy capacity across sub-channels yielding advantages to an eavesdropper at edge frequencies. Yet, because different frequencies emit energy at different angles, the eavesdropper is thwarted from easily intercepting an entire wideband transmission. The experiments diverge from the analytical model in that the model underpredicts the eavesdropper’s advantage at angles smaller than the target user and subsequent asymmetric performance across angles. Nonetheless, both the model and measurements show that increasingly wide bandwidth and correspondingly wide beams have only a modest marginal security penalty.
more »
« less
- Award ID(s):
- 1923733
- PAR ID:
- 10169053
- Date Published:
- Journal Name:
- Proceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec)
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
Polar codes have been shown to provide an effective mechanism for achieving physical-layer security over various wiretap channels. A majority of these schemes require channel state information (CSI) at the encoder for both intended receivers and eavesdroppers. In this paper, we consider a polar coding scheme for secrecy over a Gaussian wiretap channel when no CSI is available. We show that the availability of a shared keystream between friendly parties allows polar codes to be used for both secure and reliable communications, even when the eavesdropper knows a large fraction of the keystream. The scheme relies on a predetermined strategy for partitioning the bits to be encoded into a set of frozen bits and a set of information bits. The frozen bits are filled with bits from the keystream, and we evaluate the security gap when the cyclic redundancy check-aided successive cancellation list decoder is used at both receivers in the wiretap channel model.more » « less
-
Time-varying fields drive the motion of magnetic particles adsorbed on liquid drops due to interfacial constraints that couple magnetic torques to capillary forces. Such magneto-capillary particle dynamics and the associated fluid flows are potentially useful for propelling drop motion, mixing drop contents, and enhancing mass transfer between phases. The design of such functions benefits from the development and validation of predictive models. Here, we apply methods of Bayesian data analysis to identify and validate a dynamical model that accurately predicts the field-driven motion of a magnetic particle adsorbed at the interface of a spherical droplet. Building on previous work, we consider candidate models that describe particle tilting at the interface, field-dependent contributions to the magnetic moment, gravitational forces, and their combinations. The analysis of each candidate is informed by particle tracking data for a magnetic Janus sphere moving in a precessing field at different frequencies and angles. We infer the uncertain parameters of each model, criticize their ability to describe and predict experimental data, and select the most probable candidate, which accounts for gravitational forces and the tilting of the Janus sphere at the interface. We show how this favored model can predict complex particle trajectories with micron-level accuracy across the range of driving fields considered. We discuss how knowledge of this “best” model can be used to design experiments that inform accurate parameter estimates or achieve desired particle trajectories.more » « less
-
null (Ed.)In this paper, we show that caching can aid in achieving secure communications by considering a wiretap scenario where the transmitter and legitimate receiver share access to a secure cache, and an eavesdropper is able to tap transmissions over a binary erasure wiretap channel during the delivery phase of a caching protocol. The scenario under consideration gives rise to a new channel model for wiretap coding that allows the transmitter to effectively choose a subset of bits to erase at the eavesdropper by caching the bits ahead of time. The eavesdropper observes the remainder of the coded bits through the wiretap channel for the general case. In the wiretap type-II scenario, the eavesdropper is able to choose a set of revealed bits only from the subset of bits not cached. We present a coding approach that allows efficient use of the cache to realize a caching gain in the network, and show how to use the cache to optimize the information theoretic security in the choice of a finite blocklength code and the choice of the cached bit set. To our knowledge, this is the first work on explicit algorithms for secrecy coding in any type of caching network.more » « less
-
We define the physical processes that control the style and distribution of ground surface ruptures on thrust and reverse faults during large magnitude earthquakes through an expansive suite of geomechanical models developed with the distinct element method (DEM). Our models are based on insights from analog sandbox fault experiments as well as coseismic ground surface ruptures in historic earthquakes. DEM effectively models the geologic processes of faulting at depth in cohesive rocks, as well as the granular mechanics of soil and sediment deformation in the shallow subsurface. We developed an initial suite of 45 2D DEM experiments on dense, 5.0 m thick sediment in a model 50 m wide with a fault positioned 20 m from the driving wall and slipped each model at a constant rate (0.3 m/s) from 0 to 5.0 m. We evaluated a range of homogeneous sediment mechanics (cohesion and tensile strength from 0.1 to 2.0 MPa) across a range of fault dip angles. In addition, we examined various depths of sediment above the fault tip. Based on these experiments, we developed a classification system of the observed fault scarp morphology including three main types (monoclinal, pressure ridge, and simple scarps), each of which can be subsequently modified by hanging wall collapse. After this initial suite of models, we generated an additional 2,981 experiments of homogeneous and heterogeneous sediment in dense, medium-dense, and loosely packed sediment across a wide range of sediment depths and mechanics, as well as a range of fault dips (20 – 70º). These models provide robust statistical relationships between model parameters such as the fault dip and sediment strength mechanics with the observed surface deformation characteristics, including scarp height, width, and dip as well as the tendency for secondary fault splays. These relationships are supported by natural rupture patterns from recent and paleo-earthquakes across a range of geologic settings. In conjunction with these natural examples, our models provide a basis to more accurately forecast ground surface deformation characteristics that will result from future earthquakes based on limited information about the earthquake source and local sediment properties.more » « less
An official website of the United States government

