{"title":"可靠和安全的通信使用基本切割集和基本电路","authors":"C. P. Kumar, R. Selvakumar, R. K. Bhattar","doi":"10.1504/IJICS.2018.10010648","DOIUrl":null,"url":null,"abstract":"Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.","PeriodicalId":164016,"journal":{"name":"Int. J. Inf. Comput. Secur.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Reliable and secure communication using fundamental cut-sets and fundamental circuits\",\"authors\":\"C. P. Kumar, R. Selvakumar, R. K. Bhattar\",\"doi\":\"10.1504/IJICS.2018.10010648\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.\",\"PeriodicalId\":164016,\"journal\":{\"name\":\"Int. J. Inf. Comput. Secur.\",\"volume\":\"70 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-02\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Int. J. Inf. Comput. Secur.\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1504/IJICS.2018.10010648\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Int. J. Inf. Comput. Secur.","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1504/IJICS.2018.10010648","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Reliable and secure communication using fundamental cut-sets and fundamental circuits
Ensuring reliability and security has been a challenge in modern communication systems. To achieve these challenges, a novel reliable and secure communication system is designed in this paper. Reliability is achieved by constructing a class of error correcting codes called concatenated kernel codes. Security in terms of source authentication is achieved from using graph nature of trellis employing techniques from graph theory namely fundamental cut-set and fundamental circuit. It has been shown that the proposed communication framework achieves the goal of reliability and security considering the channel noise and cryptanalytic attacks. The theoretical basis of the proposed framework is validated and its performance is evaluated through simulations.