The issue of security and privacy plays an important role in the wireless networks and directly affects the wide application of wireless network systems. In order to protect the confidentiality of data for wireless ne...
详细信息
ISBN:
(纸本)9783030861377;9783030861360
The issue of security and privacy plays an important role in the wireless networks and directly affects the wide application of wireless network systems. In order to protect the confidentiality of data for wireless networks, especially for the wireless sensor networks, a series of lightweight ciphers have been proposed in recent years. SKINNY, a family of lightweight block cipher, is designed in such scenario with competitive performance and security guarantees. SKINNY-128-256 is a widely used version as underlying primitive in NIST's Lightweight Cryptography (LWC) project. In this paper, we consider the security of SKINNY-128-256 under related-tweakey rectangle attack. Based on an 18-round related-tweakey boomerang distinguisher composed of two 9-round differential characteristics, a 23-round related-tweakey rectangle attack is proposed by expanding forward for 3-round and extending backwards for 2-round. Our attack utilize the incompleted diffusion property of MixColumns operation of SKINNY to reduce the times of exhaustive key search. To the best of our knowledge, this attack efficiently reduces the costs compared to the currently known attacks on 23-round SKINNY-128-256, especially the data complexity is considerably less than the existing results.
This paper proposes a framework, which integrates the development and operation environments for cloud applications. Adopting perspectives on lifecycle management, the framework is equipped with tools and platforms, w...
详细信息
Multi-standard terminals for cellular, WLAN, and WPAN applications are becoming more common in 5G wireless communication systems. The goal of this study is to create an ultra-wide band receiver front end design for sy...
详细信息
As the size and complexity of software is continually growing, manual testing becomes very difficult and tedious task. Also as the computer systems are significant to our society in every daily life and are performing...
详细信息
ISBN:
(纸本)9781467356930
As the size and complexity of software is continually growing, manual testing becomes very difficult and tedious task. Also as the computer systems are significant to our society in every daily life and are performing an increasing number of critical tasks, so more work in software testing and analysis has become of great importance. The software applications once developed need to be maintained and tested as they undergo regular or frequent modifications. Automation of software testing and tool support for testing, therefore, has been emerging as a very important technology to quality assurance of present software industry. The proposed paper provides view of a new approach to automate the software testing process using Coded UI (User Interface) tool. Automation of the test plays a significant role in testing activity, as it saves time and provides better utilization of resources. The test automation has many situations to deal such as mapping of user specifications to identification of the test cases, test case generation, maintenance of test cases and test scripts.
The proceedings contain 212 papers. The topics discussed include: price incentivized electric vehicle charge control for community voltage regulation;enabling location based services for hyperlocal marketing in connec...
ISBN:
(纸本)9781479967292
The proceedings contain 212 papers. The topics discussed include: price incentivized electric vehicle charge control for community voltage regulation;enabling location based services for hyperlocal marketing in connected vehicles;coordinated, progressive vehicular headlight glare reduction for driver safety using wireless sensor networks;development of risk factor management method for federation of clouds;hybrid decision and data adaptive antenna array processing for collision avoidance radar;modeling conducted noise propagation along high-voltage DC power buses for electric vehicle applications;assessment of electric vehicle charging load and its impact on electricity market price;electrical drivetrains for recumbent tricycles;and recommendations for mitigating low frequency magnetic field exposure in hybrid/electric vehicles.
Session Initiation Protocol (SIP) has already been accepted as the signaling standard in 3G wirelesssystems. However, the handover procedure with SIP suffers from undesirable delay in multimedia applications. The per...
详细信息
ISBN:
(纸本)1424404940
Session Initiation Protocol (SIP) has already been accepted as the signaling standard in 3G wirelesssystems. However, the handover procedure with SIP suffers from undesirable delay in multimedia applications. The performance for real-time mobile communication is decided by multiple factors, we only focus on the handover delay due to host mobility in this paper, especially the delay accumulated during movement detection, Duplicate Address Detection (DAD), SIP session reestablishment, and AAA procedure. This paper offers a fast handover solution for SIP-based mobility (named FMSIP for short). The proposed method utilizes movement anticipation, tunneling, and AAA context transfer to alleviate handover delay. The performance analysis and simulation results are presented at the end of this paper.
The goal of jointly providing fairness and efficiency in wireless networks can be seen as the problem of maximizing a given utility function. The main difficulty when solving this problem is that the capacity region o...
详细信息
Brain Computer Interface (BCI) is a communication pathway between the external devices and the brain signals that doesn39;t require any physical activity of the muscular system. Such systems are the only mode of com...
详细信息
In order to track animal movement patterns, habitat use, population demographics, human-wildlife conflict, vehicle-animal collisions, snare and poaching occurrences, and epidemics, it is essential to monitor wildlife....
详细信息
The Internet of Things (IoT) is a growing technology that allows data to be exchanged with other devices over the Internet or via wireless networks. Cyber-attacks may cause malicious intrusions into IoT systems due to...
详细信息
暂无评论