Search results for "Eavesdropping"

showing 9 items of 9 documents

How Do Infanticidal Male Bank Voles (Myodes glareolus) Find the Nest with Pups?

2016

Infanticide, the killing of conspecific young, occurs in most mammal species, like in our study species, the bank vole (Myodes glareolus). Infanticide by adult males is regarded as a strong factor affecting recruitment of young into population. It is considered as an adaptive behaviour, which may increase male fitness via resource gain or an increased access to mates. When an intruder is approaching the nest, the mother should not be present, as her nest guarding is very aggressive and successful. Pups use ultrasonic vocalisation to call their mother when mother leaves nest for foraging but it is not know which cues do infanticidal males use to find the nest with vulnerable pups to commit i…

0106 biological sciencesForagingPopulationZoologyBiology010603 evolutionary biology01 natural sciencesacousticNestBeggingSeasonal breeder0501 psychology and cognitive sciences050102 behavioral science & comparative psychologyeducationNest boxEcology Evolution Behavior and Systematicseducation.field_of_studyultrasoundEcology05 social scienceseavesdroppingultraäänibiology.organism_classificationolfactoryBank volenest mortalityta1181Animal Science and ZoologyHouse mice
researchProduct

Asymmetrical interspecific communication of predatory threat in mixed-species colonies of lesser kestrels (Falco naumanni) and jackdaws (Corvus moned…

2019

Sympatric species derive benefits by attending to information conveyed by heterospecifics. Our previous finding of reduced vigilance among jackdaws and lesser kestrels residing in mixed-species colonies suggested a reliance on interspecific communication of information regarding predatory threats. To test for interspecific communication of threat, we first determined whether jackdaw and lesser kestrel call structure varied with perceived threat. In this call production phase of our study, free-living birds in mixed-species colonies were presented with models representing a potential nest predator (European magpie) or with non-threatening stimuli (wood pigeon or wooden dowel) in proximity to…

0106 biological sciencesPublic informationalarm communicationgroup living05 social scienceseavesdroppingSettore BIO/05 - ZoologiaZoologyFalco naumanniresponse urgencyInterspecific competitionpublic&nbspGroup livingBiologybiology.organism_classification010603 evolutionary biology01 natural sciencesinformationMixed speciesinterspecific association0501 psychology and cognitive sciencesAnimal Science and Zoology050102 behavioral science & comparative psychologyEcology Evolution Behavior and Systematics
researchProduct

A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security

2019

Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…

BeamformingComputer scienceJammingCryptography5G-tekniikka02 engineering and technologylangaton tiedonsiirto0203 mechanical engineering0202 electrical engineering electronic engineering information engineeringWirelessElectrical and Electronic Engineeringtietoturvabusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSPhysical layer020206 networking & telecommunications020302 automobile design & engineeringEavesdropping5G communicationsphysical layer security (PLS)jamming techniquesrelaying protocolsKey (cryptography)business5Glangattomat verkotComputer network
researchProduct

Eavesdropping on quantum-cryptographical systems

1994

Quantum cryptography cannot prevent eavesdropping, but any eavesdropping attempt can be detected by the legitimate users of the communication channel. This is because eavesdropping affects the quantum state of the information carriers and results in an abnormal error rate. In this paper, we analyze various eavesdropping techniques, which may be either translucent or opaque to the transmitted photons, and we estimate the error rate above which the key distribution is deemed unsafe and should be abandoned. © 1994 The American Physical Society.

PhysicsQuantum networkQuantum cryptographyQuantum mechanicsEavesdroppingQuantumAtomic and Molecular Physics and OpticsPhysical Review A
researchProduct

Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden

2021

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterProcess (computing)020206 networking & telecommunicationsJammingEavesdroppingThroughputData_CODINGANDINFORMATIONTHEORY02 engineering and technologyTransmitter power outputPower (physics)Covert0202 electrical engineering electronic engineering information engineeringbusinessComputer network2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)
researchProduct

Security of information in IT systems

2005

The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

business.industrySocial engineering (security)Telecommunication securityInformation technologyEavesdroppingElectromagnetic emissionComputer securitycomputer.software_genreInformation protection policyInformation security managementSociologyTempestbusinesscomputerSPIE Proceedings
researchProduct

UAV-Aided Secure Short-Packet Data Collection and Transmission

2023

Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned aerial vehicle (UAV) has gained tremendous attention in data collection for wireless sensor networks. However, the high-quality air-ground channels also pose significant threats to the security of UAV aided wireless networks. In this paper, we propose a short-packet secure UAV-aided data collection and transmission scheme to guarantee the freshness and security of the transmission from the sensors to the remote ground base station (BS). First, during the data collection phase, the trajectory, the flight duration, and the user scheduling are jointly optimized with the objective of maximizing t…

finite blocklengthdata collectionsecure transmissionInternet of Thingseavesdroppingsensoriverkotresource allocationshort-packet transmissionlangaton tekniikkamiehittämättömät ilma-aluksetsensorstiedonsiirtodatatietoliikennetrajectoryunmanned aerial vehicleesineiden internetElectrical and Electronic Engineeringautonomous aerial vehicleswireless sensor networksIEEE Transactions on Communications
researchProduct

Data from: I smell where you walked – how chemical cues influence movement decisions in ants

2016

Interactions between animals are not restricted to direct encounters. Frequently, individuals detect the proximity of others through cues unintentionally left by others, such as prey species assessing predation risk based on indirect predator cues. However, while the importance of indirect cues in predator–prey interactions has been intensely studied, their role in interactions among competitors, and their consequences for community structure, are little known to date. Ant communities are usually structured by aggressive interactions between competing species. Responding to cues of others should be useful to avoid competitors or discover food sources. In ants and other insects, such cues in…

interspecific interactionseavesdroppingLife sciencesTetramorium caespitumbehavioral traitMyrmica rubramedicine and health careFormica polyctenainterspecific recognitionMedicineLasius nigerchemotactile cuesFormica rufibarbiscompetitor avoidance
researchProduct

IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

2018

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…

wireless networksGeneral Computer ScienceComputer sciencenoise (radio technology)ComputerApplications_COMPUTERSINOTHERSYSTEMShäiriötInterference (communication)General Materials Sciencekohinakyberturvallisuusta213Wireless networkbusiness.industryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSGeneral EngineeringEavesdroppingTransmission (telecommunications)interferenceslcsh:Electrical engineering. Electronics. Nuclear engineeringTransceiverbusinessenergiantuotantolcsh:TK1-9971Energy harvestinglangattomat verkotComputer networkIEEE Access
researchProduct