21 |
ProGrid: uma infra-estrutura de suporte a programação paralela em grades computacionais.Costa, Paulo Vicente Capellotto 26 May 2003 (has links)
Made available in DSpace on 2016-06-02T19:05:18Z (GMT). No. of bitstreams: 1
DissPVCC.pdf: 3610389 bytes, checksum: 207fb73eb90d6ef70e9232d6b9d02a92 (MD5)
Previous issue date: 2003-05-26 / Financiadora de Estudos e Projetos / The computational Grid concept allows resource sharing in large scale. This work
introduces the ProGrid system, an architecture for computational Grids, whose
communication and resource management infrastructure is used transparently by the
applications. Unlike other grid approaches, this work relies on the use of proxy servers to
perform additional communications and authentication procedures on behalf of client
applications. The purpose of this mechanism is to enable parallel applications to be
executed in geographically distributed environments interlinked by an open
communication network, such as the Internet, meeting the security requisites desirable for
computational grids. To reach such objectives, a generic architecture for ProGrid was
developed, that is divided in a group services layers. This work was focused in the
implementation of layers responsible by the secure communication and for the controlled
sharing of available resources. / O conceito de grade computacional permite o compartilhamento de recursos
computacionais em larga escala. Este trabalho apresenta o sistema ProGrid, uma
arquitetura para Grades Computacionais, na qual a infra-estrutura de comunicação e o
gerenciamento de recursos são usados transparentemente pelas aplicações. Diferentemente
de outras grades, este trabalho utilizou uma abordagem baseada em servidores Proxy para
realizar os processos adicionais de comunicação e autenticação em nome da aplicação
cliente. O propósito deste mecanismo é habilitar a execução de aplicações paralelas em
ambientes geograficamente distribuídos interconectados por um canal de comunicação
aberto, como a Internet, atendendo os requisitos de segurança desejáveis nas Grades
Computacionais. Para alcançar tais objetivos, desenvolveu-se uma arquitetura genérica
para o ProGrid , que é dividida em um conjunto de camadas de serviços. Este trabalho
focou-se na implementação das camadas responsáveis pela comunicação segura e pelo
compartilhamento controlado dos recursos disponíveis.
|
22 |
Wireless secret key generation versus capable adversariesGhoreishi Madiseh, Masoud 22 December 2011 (has links)
This dissertation applies theories and concepts of wireless communications and
signal processing to the security domain to assess the security of a Wireless secret
Key Generation (WKG) system against capable eavesdroppers, who employ all the
feasible tools to compromise the system’s security. The security of WKG is evaluated
via real wireless measurements, where adversary knows and applies appropriate signal
processing tools in ordere to predict the generated key with the communicating
pair. It is shown that in a broadband stationary wireless communication channel,
(e.g. commercial off-the-shelf 802.11 WLAN devices), a capable eavesdropper can
recover a large portion of the secret key bits. However, in an Ultra-wideband (UWB)
communication, at the same stationary environment, secret key rates of 128 bits per
channel probe are achievable. / Graduate
|
23 |
Lattice Codes for Secure Communication and Secret Key GenerationVatedka, Shashank January 2017 (has links) (PDF)
In this work, we study two problems in information-theoretic security. Firstly, we study a wireless network where two nodes want to securely exchange messages via an honest-but-curious bidirectional relay. There is no direct link between the user nodes, and all communication must take place through the relay. The relay behaves like a passive eavesdropper, but otherwise follows the protocol it is assigned. Our objective is to design a scheme where the user nodes can reliably exchange messages such that the relay gets no information about the individual messages. We first describe a perfectly secure scheme using nested lattices, and show that our scheme achieves secrecy regardless of the distribution of the additive noise, and even if this distribution is unknown to the user nodes. Our scheme is explicit, in the sense that for any pair of nested lattices, we give the distribution used for randomization at the encoders to guarantee security. We then give a strongly secure lattice coding scheme, and we characterize the performance of both these schemes in the presence of Gaussian noise. We then extend our perfectly-secure and strongly-secure schemes to obtain a protocol that guarantees end-to-end secrecy in a multichip line network. We also briefly study the robustness of our bidirectional relaying schemes to channel imperfections.
In the second problem, we consider the scenario where multiple terminals have access to private correlated Gaussian sources and a public noiseless communication channel. The objective is to generate a group secret key using their sources and public communication in a way that an eavesdropper having access to the public communication can obtain no information about the key. We give a nested lattice-based protocol for generating strongly secure secret keys from independent and identically distributed copies of the correlated random variables. Under certain assumptions on the joint distribution of the sources, we derive achievable secret key rates.
The tools used in designing protocols for both these problems are nested lattice codes, which have been widely used in several problems of communication and security. In this thesis, we also study lattice constructions that permit polynomial-time encoding and decoding. In this regard, we first look at a class of lattices obtained from low-density parity-check (LDPC) codes, called Low-density Construction-A (LDA) lattices. We show that high-dimensional LDA lattices have several “goodness” properties that are desirable in many problems of communication and security. We also present a new class of low-complexity lattice coding schemes that achieve the capacity of the AWGN channel. Codes in this class are obtained by concatenating an inner Construction-A lattice code with an outer Reed-Solomon code or an expander code. We show that this class of codes can achieve the capacity of the AWGN channel with polynomial encoding and decoding complexities. Furthermore, the probability of error decays exponentially in the block length for a fixed transmission rate R that is strictly less than the capacity. To the best of our knowledge, this is the first capacity-achieving coding scheme for the AWGN channel which has an exponentially decaying probability of error and polynomial encoding/decoding complexities.
|
Page generated in 0.1366 seconds