Logo

Publikacije (72)

Nazad
P. Fazio, Miralem Mehic, M. Voznák

In the current era of mobile communications and next-generation networks, mobility analysis has a key role in guaranteeing the quality of service/experience in the available services. Although a vast amount of work has analyzed mobility from both analytic and stochastic points of view, much of it has focused on a time-based analysis and disregarded spectral features. In this article, we propose a method of analyzing the main features of mobility traces in the frequency domain and determining the possible relationships between typical mobility grades (in terms of average and maximum speed) and the required sampling frequencies. The collection and storage of mobility pattern samples when they are not required is impractical, and therefore, we attempt to demonstrate how mobility can be sampled to avoid information loss or oversampling (many works in the literature are based on a default sampling period of 1 s). The work also contributes with the proposal of a closed form for relating the sampling period and average moving speed with the spectral components. We conducted numerous simulations to confirm that, compared with classical sampling approaches that provide static behavior, it is possible to obtain a gain of about 35%–65% in the collected samples, with a negligible loss of accuracy in the reconstructed signal.

Marcin Niemiec, Tymoteusz Widlarz, Miralem Mehic

Quantum cryptography can provide a very high level of data security. However, a big challenge of this technique is errors in quantum channels. Therefore, error correction methods must be applied in real implementations. An example is error correction based on artificial neural networks. This paper considers the practical aspects of this recently proposed method and analyzes elements which influence security and efficiency. The synchronization process based on mutual learning processes is analyzed in detail. The results allowed us to determine the impact of various parameters. Additionally, the paper describes the recommended number of iterations for different structures of artificial neural networks and various error rates. All this aims to support users in choosing a suitable configuration of neural networks used to correct errors in a secure and efficient way.

Patrik Burdiak, E. Dervisevic, Amina Tankovic, Filip Lauterbach, J. Rozhon, L. Kapicak, Libor Michalek, Dzana Pivac et al.

: QKD integration into traditional telecommunication networks is anticipated in the upcoming decades in order to maintain adequate levels of communication security. QKD establishes ITS (Information-Theoretic secure) symmetric keys between the two parties, which they may use to sustain secure flow of data even in the post-quantum era. Since QKD-keys are a valuable and scarce resource, they must be carefully maintained. This paper investigates DoS attacks on actual QKD equipment, in which an adversary with access to QKD services depletes the reserves of QKD-keys maintained at the KMS system. As a result, safety precautions are proposed in order to prevent this scenario and maintain operational QKD service.

P. Fazio, M. Tropea, Miralem Mehic, F. Rango, M. Voznák

: Free Space Optics (FSO) represent a promising technology for secure communications in several types of architectures: from Quantum Key Distribution Networks (QKDNs) to satellite communications. In this paper, in particular, we take into account terrestrial point-to-point laser communications and evaluate the performance in terms of Signal-to-Noise Ratio (SNR) and Bit Error Rate (BER), taking into account different scenarios, that can reflect real situations in which long distances can be reached in a secure way, guaranteeing an acceptable level of BER. So, after a huge campaign of simulations, we would like to let the scientific community know which are the theoretical limits that such kind of communications can reach. We take into account standard telescopes parameters (available today in the market), while configuring several real situations, in function of, for example, bit-rate, visibility, link distance, etc. A brief survey of the existing works is given, then a clearer performance evaluation of terrestrial FSO links is proposed.

Aside from significant advancements in the development of optical and quantum components, the performance of practical quantum key distribution systems is largely determined by the type and settings of the error key reconciliation procedure. It is realized through public channel and it dominates the communication complexity of the quantum key distribution process. The practical utilization significantly depends on the computational capacities that are of great importance in satellite-oriented quantum communications. Here we present SarDub19 error key estimation and reconciliation protocol that improves performances of practical quantum systems.

P. Fazio, Miralem Mehic, M. Voznák

Mobility is a key aspect of modern networking systems. To determine how to better manage the available resources, many architectures aim to a priori know the future positions of mobile nodes. This can be determined, for example, from mobile sensors in a smart city environment or wearable devices carried by pedestrians. If we consider infrastructure networks, frequently changing the coverage cell may lead to service disruptions if a predictive approach is not deployed in the system. All predictive systems are based on the storage of old mobility samples to adequately train the model. Our focus is based on the possibility to determine an approach for adaptively sampling mobility patterns based on the intrinsic features of the human/node behavior. Several works in the literature examine mobility prediction mobile networks, but all of them are dedicated to the study of time features in mobility traces: none took into account the spectral content of historical mobility patterns for predictive purposes. In contrast, we take into account this spectral content in mobility samples. Through a set of wavelet transforms, we adapted the sampling frequency dynamically and obtained a considerable set of advantages (space, energy, accuracy, etc.). In fact, this issue covers an important role in the IoT paradigm, where energy consumption is one of the main variables requiring optimization (frequent and unnecessary mobility samplings can disrupt battery life). We performed several simulations using real-world traces to confirm the merit of our proposal.

Matej Plakalovic, Enio Kaljic, Miralem Mehic

New generation networks are facing ever greater demands. When testing new network devices that must process packets at extremely high rates, it is essential to test their functionality and desired performance under maximum traffic load. As a result, in order to test the hardware, a traffic generator is required. This paper proposes an affordable and extensible high-speed FPGA-based Ethernet traffic generator. The proposed solution is able of fully utilizing a 40GbE link, with the possibility of manipulating traffic characteristics at the level of an individual packet. Although intended to run on the DE10-Pro system, the proposed design is portable to other FPGA boards with minimal development effort and changes.

E. Dervisevic, Filip Lauterbach, Patrik Burdiak, J. Rozhon, Martina Slívová, Matej Plakalovic, M. Hamza, P. Fazio et al.

A QKD network can be considered an add-on technology to a standard communication network that provides IT-secure cryptographic keys as a service. As a result, security challenges resulting in the suspension of functional work must be addressed. This study analyzes a Denial of Service (DoS) attack on the Key Management System (KMS), one of the critical components of the QKD network in charge of key management and key provisioning to authorized consumers. Through simulation methods performed in the QKDNetSim, we show that legitimate customers experience significantly worse service during an excessive DoS attack on KMS.

Filip Lauterbach, Patrik Burdiak, J. Rozhon, E. Dervisevic, Martina Slívová, Matej Plakalovic, Miralem Mehic, M. Voznák

The article presents a series of measurements conducted on the fully-operated Quantum Key Distribution system. These measurements primarily focus on the Quantum Bit Error Rate (QBER), which is the most important parameter of the quantum channel. This parameter was observed and measured for 16 days under the quantum channel’s operating conditions to determine any correlations between the QBER and other quantum link parameters, such as secret key rate. A thorough statistical analysis of the measured data was performed as a part of this investigation and is presented in the paper.

Miralem Mehic, S. Rass, E. Dervisevic, M. Voznák

A QKD network provides an additional security layer for IT-secure cryptographic key distribution that is added to existing conventional networks. Thus, QKD network components must be resilient to security challenges from conventional network environments. This paper provided a novel solution for designing a Key Management System resistant to DoS attacks. Our solution allows applications to function securely in environments with fewer keys. In addition, we have provided approaches for allocating and managing QKD resources to avoid malicious key reservations. Simulation experiments verified the proposed solutions.

Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!

Pretplatite se na novosti o BH Akademskom Imeniku

Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo

Saznaj više