Communications

This dataset comprises the time cost of ten cryptographic operations on our testing platform, as well as the required number of operations and corresponding time consumption at each phase of the authentication schemes from six selected literature sources. The data is utilized for comparative analysis and evaluation of the operational efficiency among various identity authentication schemes.

Categories:
1 Views

The source data files and code files of the paper: optical chaos shift keying communication system via neural network-based signal reconstruction. The following data is included:

1. Source figure file in the paper;

2. Source code of the proposed scheme, include the simulation code for communication, secure analysis and parameter mismatch range.

3. The source Simulink module is included for time-delayed chaotic signal generation.

Categories:
34 Views

A rapid growth of wireless communication networks, particularly in 5G Non-Standalone (NSA) deployments, has necessitated advanced multiple access techniques to enhance spectral efficiency, interference management, and energy optimization [1-3]. Rate-Splitting Multiple Access (RSMA) has arisen as a strong candidate to replace conventional Non-Orthogonal Multiple Access (NOMA) by efficiently splitting user data into common and private components. [1-2].

Categories:
52 Views

The CyberAlert-25 Dataset is a comprehensive collection of curated cyber threat data, developed to support advanced research in vulnerability detection, classification, and threat intelligence. Aggregated from authoritative sources such as the National Critical Information Infrastructure Protection Center (NCIIPC) and the MITRE Corporation, the dataset focuses on Common Vulnerabilities and Exposures (CVEs), encompassing a total of 29,650 entries.

Categories:
149 Views

At-sea testing of underwater acoustic communication systems requires resources unavailable to the wider research community, and researchers often resort to simplified channel models to test new protocols. The present dataset comprises in-situ hydrophone recordings of communications and channel probing waveforms, featuring an assortment of popular modulation formats. The waveforms were transmitted in three frequency bands (4-8 kHz, 9-14 kHz, and 24-32 kHz) during an overnight experiment in an enclosed fjord environment, and were recorded on two hydrophone receivers.

Categories:
233 Views

Astronomical instrumentation and related fields have seen remarkable evolution in recent decades, driving the need for advanced signal acquisition and processing techniques. Current experiments demand readout capabilities beyond traditional approaches, leading to the adoption of a wideband instrumentation system architecture for high-speed Radio Frequency (RF) measurements. Field Programmable Gate Array (FPGA) and System on Chip (SoC) devices, owing to their features, are well-suited to perform tasks related to the digital back-end of these types of systems.

Categories:
157 Views

This paper explores the cryptanalysis of the ASCON algorithm, a lightweight cryptographic method designed for applications like the Internet of Things (IoT). We utilize deep learning techniques to identify potential vulnerabilities within ASCON's structure. First, we provide an overview of how ASCON operates, including key generation and encryption processes.

Categories:
164 Views

This paper explores the cryptanalysis of the ASCON algorithm, a lightweight cryptographic method designed for applications like the Internet of Things (IoT). We utilize deep learning techniques to identify potential vulnerabilities within ASCON's structure. First, we provide an overview of how ASCON operates, including key generation and encryption processes.

Categories:
36 Views

Modern power systems face growing risks from cyber-physical attacks, necessitating enhanced resilience due to their societal function as critical infrastructures. The challenge is that defense of large-scale systems-of-systems requires scalability in their threat and risk assessment environment for cyber-physical analysis including cyber-informed transmission planning, decision-making, and intrusion response. Hence, we present a scalable discrete event simulation tool for analysis of energy systems, called DESTinE.

Categories:
211 Views

Network Interface Cards (NICs) are one of the key enablers of the modern-day Internet. They serve as gateways for connecting computing devices to networks for the exchange of data with other devices. Recently, the pervasive nature of Internet-enabled devices coupled with the growing demands for faster network access have necessitated the enhancement of NICs to Smart NICs (SNICs), capable of processing enormous volumes of data at near real-time speed.

Categories:
38 Views

Pages