Match!
Arsenia Chorti
Cergy-Pontoise University
60Publications
12H-index
533Citations
Publications 62
Newest
The goal of physical layer security (PLS) is to make use of the properties of the physical layer, including the wireless communication medium and the transceiver hardware, to enable critical aspects of secure communications. In particular, PLS can be employed to provide i) node authentication, ii) message authentication, and, iii) message confidentiality. Unlike the corresponding classical cryptographic approaches which are all based on computational security, PLS's added strength is that it is ...
With the emergence of 5G low latency applications, such as haptics and V2X, low complexity and low latency security mechanisms are sought. Promising lightweight mechanisms include physical unclonable functions (PUF) and secret key generation (SKG) at the physical layer, as considered in this paper. In this framework we propose i) a novel authenticated encryption using SKG; ii) a combined PUF / SKG authentication to reduce computational overhead; iii) a 0-RTT resumption authentication protocol; i...
#1Wenjuan Yu (University of Surrey)H-Index: 1
#2Wenjuan YuH-Index: 3
Last.Qiang NiH-Index: 37
view all 5 authors...
In this paper, a novel approach is introduced to study the achievable delay-guaranteed secrecy rate, by introducing the concept of the effective secrecy rate (ESR). This study focuses on the downlink of a non-orthogonal multiple access (NOMA) network with one base station, multiple single-antenna NOMA users and an eavesdropper. Two possible eavesdropping scenarios are considered: 1) an internal, unknown, eavesdropper in a purely antagonistic network; and 2) an external eavesdropper in a network ...
1 CitationsSource
#1Rihem Nasfi (Cergy-Pontoise University)
#2Arsenia Chorti (Cergy-Pontoise University)H-Index: 12
In fifth generation and beyond (B5G) technologies, delay constrains emerge as a topic of particular interest for ultra reliable low latency communications (e.g., enhanced reality, haptic communications). In this short paper, we study the performance of a two-user uplink NOMA network under quality of service (QoS) delay constraints, captured through each user's effective capacity (EC). We propose novel closed-form expressions for the EC of the NOMA users, validated through Monte Carlo simulations...
Source
#1Miroslav Mitev (University of Essex)
#2Arsenia Chorti (Cergy-Pontoise University)H-Index: 12
Last.Martin J. Reed (University of Essex)H-Index: 12
view all 3 authors...
Due to computational complexity and latency constraints in the nodes of many IoT systems, alternatives to public key encryption are sought for session key generation schemes. In this work we investigate novel cross-layer security protocols in which session keys are generated at the physical layer using standard techniques of secret key generation (SKG) from shared randomness. In this framework, we study the optimal power allocation in block-fading additive white Gaussian noise (BF-AWGN) channels...
Source
#1Gada Rezgui (Cergy-Pontoise University)H-Index: 1
#2E. Veronica Belmega (Cergy-Pontoise University)H-Index: 3
Last.Arsenia Chorti (Cergy-Pontoise University)H-Index: 12
view all 3 authors...
The use of energy harvesting as a counter-jamming measure is investigated on the premise that part of the harmful interference can be harvested to increase the transmit power. We formulate the strategic interaction between a pair of legitimate nodes and a malicious jammer as a zero-sum game. Our analysis demonstrates that the legitimate nodes are able to neutralize the jammer. However, this policy is not necessarily a Nash equilibrium and hence is sub-optimal. Instead, harvesting the jamming int...
2 CitationsSource
#1Sotiris SkaperasH-Index: 1
#2Lefteris MamatasH-Index: 14
Last.Arsenia ChortiH-Index: 12
view all 3 authors...
Source
#2Cintia B. Margi (USP: University of São Paulo)H-Index: 15
Last.Arsenia Chorti (Cergy-Pontoise University)H-Index: 12
view all 3 authors...
Wireless sensor networks (WSN) are formed from restricted devices and are known to be vulnerable to denial of service (DoS) security attacks. In parallel, software-defined networking has been identified as a solution for many WSN challenges with respect to flexibility and reuse. Conversely, the SDN control plane centralization may bring about new security threats and vulnerabilities. In this work, we perform a traffic analysis of software-defined WSN (SDWSN) in order to gain understanding of the...
Dec 1, 2018 in GLOBECOM (Global Communications Conference)
#1Sotiris SkaperasH-Index: 1
#2Lefteris Mamatas (UoM: University of Macedonia)H-Index: 14
Last.Arsenia Chorti (Cergy-Pontoise University)H-Index: 12
view all 3 authors...
Video content is responsible for more than 70% of the global IP traffic. Consequently, it is important for content delivery infrastructures to rapidly detect and respond to changes in content popularity dynamics. For flexible and highly adaptive solutions, the capability for a quick response should be driven from early (real-time) and low-complexity content popularity detection schemes. In this paper, we focus on the early and low-complexity detection of video content popularity, which we addres...
1 CitationsSource
Jamming attacks represent a critical vulnerability for wireless secret key generation (SKG) systems. In this paper, two counter-jamming approaches are investigated for SKG systems: first, the employment of energy harvesting (EH) at the legitimate nodes to turn part of the jamming power into useful communication power, and, second, the use of channel hopping or power spreading in block fading channels to reduce the impact of jamming. In both cases, the adversarial interaction between the pair of ...
7 CitationsSource
1234567