Search results for: eavesdropping
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 8

Search results for: eavesdropping

8 Fatal Attractions: Exploiting Olfactory Communication between Invasive Predators for Conservation

Authors: Patrick M. Garvey, Roger P. Pech, Daniel M. Tompkins

Abstract:

Competition is a widespread interaction and natural selection will encourage the development of mechanisms that recognise and respond to dominant competitors, if this information reduces the risk of a confrontation. As olfaction is the primary sense for most mammals, our research tested whether olfactory ‘eavesdropping’ mediates alien species interactions and whether we could exploit our understanding of this behaviour to create ‘super-lures’. We used a combination of pen and field experiments to evaluate the importance of this behaviour. In pen trials, stoats (Mustela erminea) were exposed to the body odour of three dominant predators (cat / ferret / African wild dog) and these scents were found to be attractive. A subsequent field trial tested whether attraction displayed towards predator odour, particularly ferret (Mustela furo) pheromones, could be replicated with invasive predators in the wild. We found that ferret odour significantly improved detection and activity of stoats and hedgehogs (Erinaceus europaeus), while also improving detections of ship rats (Rattus rattus). Our current research aims to identify the key components of ferret odour, using chemical analysis and behavioural experiments, so that we can produce ‘scent from a can’. A lure based on a competitors’ odour would be beneficial in many circumstances including: (i) where individuals display variability in attraction to food lures, (ii) there are plentiful food resources available, (iii) new immigrants arrive into an area, (iv) long-life lures are required. Pest management can therefore benefit by exploiting behavioural responses to odours to achieve conservation goals.

Keywords: predator interactions, invasive species, eavesdropping, semiochemicals

Procedia PDF Downloads 379
7 Secure Optical Communication System Using Quantum Cryptography

Authors: Ehab AbdulRazzaq Hussein

Abstract:

Quantum cryptography (QC) is an emerging technology for secure key distribution with single-photon transmissions. In contrast to classical cryptographic schemes, the security of QC schemes is guaranteed by the fundamental laws of nature. Their security stems from the impossibility to distinguish non-orthogonal quantum states with certainty. A potential eavesdropper introduces errors in the transmissions, which can later be discovered by the legitimate participants of the communication. In this paper, the modeling approach is proposed for QC protocol BB84 using polarization coding. The single-photon system is assumed to be used in the designed models. Thus, Eve cannot use beam-splitting strategy to eavesdrop on the quantum channel transmission. The only eavesdropping strategy possible to Eve is the intercept/resend strategy. After quantum transmission of the QC protocol, the quantum bit error rate (QBER) is estimated and compared with a threshold value. If it is above this value the procedure must be stopped and performed later again.

Keywords: security, key distribution, cryptography, quantum protocols, Quantum Cryptography (QC), Quantum Key Distribution (QKD).

Procedia PDF Downloads 370
6 Implementation of the Interlock Protocol to Enhance Security in Unmanned Aerial Vehicles

Authors: Vikram Prabhu, Mohammad Shikh Bahaei

Abstract:

This paper depicts the implementation of a new infallible technique to protect an Unmanned Aerial Vehicle from cyber-attacks. An Unmanned Aerial Vehicle (UAV) could be vulnerable to cyber-attacks because of jammers or eavesdroppers over the network which pose as a threat to the security of the UAV. In the field of network security, there are quite a few protocols which can be used to establish a secure connection between UAVs and their Operators. In this paper, we discuss how the Interlock Protocol could be implemented to foil the Man-in-the-Middle Attack. In this case, Wireshark has been used as the sniffer (man-in-the-middle). This paper also shows a comparison between the Interlock Protocol and the TCP Protocols using cryptcat and netcat and at the same time highlights why the Interlock Protocol is the most efficient security protocol to prevent eavesdropping over the communication channel.

Keywords: interlock protocol, Diffie-Hellman algorithm, unmanned aerial vehicles, control station, man-in-the-middle attack, Wireshark

Procedia PDF Downloads 276
5 Dynamics of Mach Zehnder Modulator in Open and Closed Loop Bias Condition

Authors: Ramonika Sengupta, Stuti Kachhwaha, Asha Adhiya, K. Satya Raja Sekhar, Rajwinder Kaur

Abstract:

Numerous efforts have been done in the past decade to develop the methods of secure communication that are free from interception and eavesdropping. In fiber optic communication, chaotic optical carrier signals are used for data encryption in secure data transmission. Mach-Zehnder Modulators (MZM) are the key components for generating the chaotic signals to be used as optical carriers. This paper presents the dynamics of a lithium niobate MZM modulator under various biasing conditions. The chaotic fluctuations of the intensity of a laser diode have been generated using the electro-optic MZM modulator operating in a highly nonlinear regime. The modulator is driven in closed loop by its own output at an earlier time. When used as an electro-optic oscillator employing delayed feedback, the MZM displays a wide range of output waveforms of varying complexity. The dynamical behavior of the system ranges from periodic to nonlinear oscillations. The nonlinearity displayed by the system is reproducible and is easily controllable. In this paper, we demonstrate a wide variety of optical signals generated by MZM using easily controllable device parameters in both open and close loop bias conditions.

Keywords: chaotic carrier, fiber optic communication, Mach-Zehnder modulator, secure data transmission

Procedia PDF Downloads 238
4 A Fresh Look at Tense System of Qashqaie Dialect of Turkish Language

Authors: Mohammad Sharifi Bohlouli

Abstract:

Turkish language with many dialects is native or official language of great number of people all around the world. The Qashqaie dialect of Turkish language is spoken by the Qashqaie tribe mostly scattered in the southern part of Iran. This paper aims at analyzing the tense system of this dialect to detect the type and number of tense and aspects available to its speakers. To collect a reliable data, a group of 50 old native speakers were randomly chosen as the informants and different techniques such as; Shuy et al interviews, selective listening ,and eavesdropping were used. The results of data analysis showed that the tense system in the Qashqaie dialect of Turkish language includes 3 absolute tenses , 6 aspectual , and 2 subjunctive ones. The interesting part of the study is that Qashqaie dialect enables its speakers to make a kind of aspectual opposition through verb structure which seems to be almost impossible through verb forms in any other nonturkish languages. For example in the following examples sentences 1 &2 and 3&4 have the same translation In English although they are different in both meaning and structure. 1. Ali ensha yazirdi. 2. Ali ensha yazirmush. (Ali was writing a composition.) 3. Ali yadmishdi. 4. Ali yadmishimish. ( Ali had slept.) The changes in the verb structure in Qashqaie dialect enables its speakers to say that whether the doer of the action remembers the process of doing the action or not. So, it presents a new aspectual opposition as Observed /nonobserved. The research findings reveal many other regularities and linguistic features that can be useful for linguists interested in Turkish in general and for those interested in tense and aspect and also they can be helpful for different pedagogical purposes including teaching and translating.

Keywords: qashqaie dialect, tense, aspect, linguistics, Turkish Language

Procedia PDF Downloads 330
3 A Fresh Look at the Tense-Aspect System of the Qashqaie Dialect of Turkish Language

Authors: Mohammad Sharifi Bohlouli, Elnaz Sharifi Bohlouli

Abstract:

Turkish language with many dialects is native or official language of great number of people all around the world. The Qashqaie dialect of Turkish language is spoken by the Qashqaie tribe mostly scattered in the southern part of Iran. This paper aims at analyzing the tense system of this dialect to detect the type and number of tense and aspects available to its speakers. To collect a reliable data, a group of 50 old native speakers were randomly chosen as the informants and different techniques such as; Shuy et al interviews, selective listening ,and eavesdropping were used. The results of data analysis showed that the tense system in the Qashqaie dialect of Turkish language includes 3 absolute tenses, 6 aspectual, and 2 subjunctive ones. The interesting part of the study is that Qashqaie dialect enables its speakers to make a kind of aspectual opposition through verb structure which seems to be almost impossible through verb forms in any other nonturkish languages. For example in the following examples sentences 1&2 and 3&4 have the same translation In English although they are different in both meaning and structure. 1. Ali ensha yazirdi. 2. Ali ensha yazirmush. (Ali was writing a composition.) 3. Ali yadmishdi. 4. Ali yadmishimish. (Ali had slept.). The changes in the verb structure in Qashqaie dialect enables its speakers to say that whether the doer of the action remembers the process of doing the action or not. So, it presents a new aspectual opposition as Observed /nonobserved. The research findings reveal many other regularities and linguistic features that can be useful for linguists interested in Turkish in general and for those interested in tense and aspect and also they can be helpful for different pedagogical purposes including teaching and translating.

Keywords: qashqaie dialect, tense, aspect, linguistics, Turkish language

Procedia PDF Downloads 460
2 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 101
1 Integrating the Modbus SCADA Communication Protocol with Elliptic Curve Cryptography

Authors: Despoina Chochtoula, Aristidis Ilias, Yannis Stamatiou

Abstract:

Modbus is a protocol that enables the communication among devices which are connected to the same network. This protocol is, often, deployed in connecting sensor and monitoring units to central supervisory servers in Supervisory Control and Data Acquisition, or SCADA, systems. These systems monitor critical infrastructures, such as factories, power generation stations, nuclear power reactors etc. in order to detect malfunctions and ignite alerts and corrective actions. However, due to their criticality, SCADA systems are vulnerable to attacks that range from simple eavesdropping on operation parameters, exchanged messages, and valuable infrastructure information to malicious modification of vital infrastructure data towards infliction of damage. Thus, the SCADA research community has been active over strengthening SCADA systems with suitable data protection mechanisms based, to a large extend, on cryptographic methods for data encryption, device authentication, and message integrity protection. However, due to the limited computation power of many SCADA sensor and embedded devices, the usual public key cryptographic methods are not appropriate due to their high computational requirements. As an alternative, Elliptic Curve Cryptography has been proposed, which requires smaller key sizes and, thus, less demanding cryptographic operations. Until now, however, no such implementation has been proposed in the SCADA literature, to the best of our knowledge. In order to fill this gap, our methodology was focused on integrating Modbus, a frequently used SCADA communication protocol, with Elliptic Curve based cryptography and develop a server/client application to demonstrate the proof of concept. For the implementation we deployed two C language libraries, which were suitably modify in order to be successfully integrated: libmodbus (https://github.com/stephane/libmodbus) and ecc-lib https://www.ceid.upatras.gr/webpages/faculty/zaro/software/ecc-lib/). The first library provides a C implementation of the Modbus/TCP protocol while the second one offers the functionality to develop cryptographic protocols based on Elliptic Curve Cryptography. These two libraries were combined, after suitable modifications and enhancements, in order to give a modified version of the Modbus/TCP protocol focusing on the security of the data exchanged among the devices and the supervisory servers. The mechanisms we implemented include key generation, key exchange/sharing, message authentication, data integrity check, and encryption/decryption of data. The key generation and key exchange protocols were implemented with the use of Elliptic Curve Cryptography primitives. The keys established by each device are saved in their local memory and are retained during the whole communication session and are used in encrypting and decrypting exchanged messages as well as certifying entities and the integrity of the messages. Finally, the modified library was compiled for the Android environment in order to run the server application as an Android app. The client program runs on a regular computer. The communication between these two entities is an example of the successful establishment of an Elliptic Curve Cryptography based, secure Modbus wireless communication session between a portable device acting as a supervisor station and a monitoring computer. Our first performance measurements are, also, very promising and demonstrate the feasibility of embedding Elliptic Curve Cryptography into SCADA systems, filling in a gap in the relevant scientific literature.

Keywords: elliptic curve cryptography, ICT security, modbus protocol, SCADA, TCP/IP protocol

Procedia PDF Downloads 226