Search results for "Eavesdropping"
showing 9 items of 9 documents
How Do Infanticidal Male Bank Voles (Myodes glareolus) Find the Nest with Pups?
2016
Infanticide, the killing of conspecific young, occurs in most mammal species, like in our study species, the bank vole (Myodes glareolus). Infanticide by adult males is regarded as a strong factor affecting recruitment of young into population. It is considered as an adaptive behaviour, which may increase male fitness via resource gain or an increased access to mates. When an intruder is approaching the nest, the mother should not be present, as her nest guarding is very aggressive and successful. Pups use ultrasonic vocalisation to call their mother when mother leaves nest for foraging but it is not know which cues do infanticidal males use to find the nest with vulnerable pups to commit i…
Asymmetrical interspecific communication of predatory threat in mixed-species colonies of lesser kestrels (Falco naumanni) and jackdaws (Corvus moned…
2019
Sympatric species derive benefits by attending to information conveyed by heterospecifics. Our previous finding of reduced vigilance among jackdaws and lesser kestrels residing in mixed-species colonies suggested a reliance on interspecific communication of information regarding predatory threats. To test for interspecific communication of threat, we first determined whether jackdaw and lesser kestrel call structure varied with perceived threat. In this call production phase of our study, free-living birds in mixed-species colonies were presented with models representing a potential nest predator (European magpie) or with non-threatening stimuli (wood pigeon or wooden dowel) in proximity to…
A Comprehensive Survey on Cooperative Relaying and Jamming Strategies for Physical Layer Security
2019
Physical layer security (PLS) has been extensively explored as an alternative to conventional cryptographic schemes for securing wireless links. Many studies have shown that the cooperation between the legitimate nodes of a network can significantly enhance their secret communications performance, relative to the noncooperative case. Motivated by the importance of this class of PLS systems, this paper provides a comprehensive survey of the recent works on cooperative relaying and jamming techniques for securing wireless transmissions against eavesdropping nodes, which attempt to intercept the transmissions. First, it provides a in-depth overview of various secure relaying strategies and sch…
Eavesdropping on quantum-cryptographical systems
1994
Quantum cryptography cannot prevent eavesdropping, but any eavesdropping attempt can be detected by the legitimate users of the communication channel. This is because eavesdropping affects the quantum state of the information carriers and results in an abnormal error rate. In this paper, we analyze various eavesdropping techniques, which may be either translucent or opaque to the transmitted photons, and we estimate the error rate above which the key distribution is deemed unsafe and should be abandoned. © 1994 The American Physical Society.
Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden
2021
Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …
Security of information in IT systems
2005
The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.
UAV-Aided Secure Short-Packet Data Collection and Transmission
2023
Benefiting from the deployment flexibility and the line-of-sight (LoS) channel conditions, unmanned aerial vehicle (UAV) has gained tremendous attention in data collection for wireless sensor networks. However, the high-quality air-ground channels also pose significant threats to the security of UAV aided wireless networks. In this paper, we propose a short-packet secure UAV-aided data collection and transmission scheme to guarantee the freshness and security of the transmission from the sensors to the remote ground base station (BS). First, during the data collection phase, the trajectory, the flight duration, and the user scheduling are jointly optimized with the objective of maximizing t…
Data from: I smell where you walked – how chemical cues influence movement decisions in ants
2016
Interactions between animals are not restricted to direct encounters. Frequently, individuals detect the proximity of others through cues unintentionally left by others, such as prey species assessing predation risk based on indirect predator cues. However, while the importance of indirect cues in predator–prey interactions has been intensely studied, their role in interactions among competitors, and their consequences for community structure, are little known to date. Ant communities are usually structured by aggressive interactions between competing species. Responding to cues of others should be useful to avoid competitors or discover food sources. In ants and other insects, such cues in…
IEEE Access Special Section Editorial: Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security
2018
Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that one can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference man…