The proceedings contain 36 papers. The special focus in this conference is on Mathematical Methods, Models and Architectures for computer Network Security. The topics include: Models from biology and history;character...
ISBN:
(纸本)9783540739852
The proceedings contain 36 papers. The special focus in this conference is on Mathematical Methods, Models and Architectures for computer Network Security. The topics include: Models from biology and history;characterizing software self-healing systems;the Trojan horses of secure protocols;smart cards and digital security;virus throttle as basis for proactive defense;technologies for protection against insider attacks on computer systems;access control and declassification;reasoning about delegation and account access in retail payment systems;performance evaluation of keyless authentication based on noisy channel;avoiding key redistribution in key assignment schemes;an updatable authenticated dictionary suitable for distributed caching;class of provably secure information authentication systems;a new modeling paradigm for dynamic authorization in multi-domain systems;synthesis of non-interferent distributed systems;covert channel invisibility theorem;policy-based proactive monitoring of security policy performance;algebraic models to detect and solve policy conflicts;event calculus based checking of filtering policies;a new approach to security evaluation of operating systems;multi-agent peer-to-peer intrusion detection;mathematical models of intrusion detection by an intelligent immunochip;a novel intrusion detection system for a local computer network;host-based intrusion detection system;interval approach to preserving privacy in statistical databases;anycast communication - a new approach to survivability of connection-oriented;privacy preserving context transfer in all-IP networks;environment-aware trusted data delivery in multipath wireless protocols;a spatial watermarking algorithm for video images and watermarking software to signal copy protection.
Autonomic computing is gradually becoming accepted as a viable approach to achieving self- management in systems and networks, with the goal of lessening the impact of the complexity crisis on the computing industry. ...
详细信息
Autonomic computing is gradually becoming accepted as a viable approach to achieving self- management in systems and networks, with the goal of lessening the impact of the complexity crisis on the computing industry. The authors propose the integration of high level self-organisation features into the Application Directed Adaptive Framework (ADAF) which, when embedded into software applications, enables those applications to exhibit autonomic behaviour. This paper briefly discusses the infrastructure of ADAF and demonstrates two self-managing capabilities, namely self- monitoring and self-diagnosis.
Ad hoc wireless sensor networks are emerging as an important technology for applications such as environmentalmonitoring, battlefield surveillance and infrastructure security. While most research so far has focused o...
详细信息
Ad hoc wireless sensor networks are emerging as an important technology for applications such as environmentalmonitoring, battlefield surveillance and infrastructure security. While most research so far has focused on the network aspects of these systems (e.g., routing, scheduling, etc.), the capacity for scalable, in-field information processing is potentially their most important attribute. Networks that can infer the phenomenological structure of their environment can use this knowledge to improve both their sensing performance and their resource usage. These intelligent networks would require much less a priori design, and be truly autonomous. This paper presents a distributed algorithm for inferring the global topological connectivity of an environment through a simple self-organization algorithm based on Hebbian learning. The application considers sensors distributed over an environment with a network of tracks on which vehicles of various types move according to rules unknown to the sensor network. Each sensor infers the local topology of the track network by comparing its observations with those from neighboring sensors. The complete topology of the network emerges from the distributed fusion of these local views.
Due to the nonlinear, time-varying and time lagging property of the transfusion system, conventional control methods cannot achieve good performance in the real time monitoring. This paper proposes a method based on f...
详细信息
Due to the nonlinear, time-varying and time lagging property of the transfusion system, conventional control methods cannot achieve good performance in the real time monitoring. This paper proposes a method based on fuzzy neural network, which integrates the advantages of fuzzy logical control and neural network. It utilizes neural network to train fuzzy rules for fuzzy control. Error back propagation is adopted to realize the online self-learning when the control parameters are changed, which can quickly analyze the data and achieve intelligentcontrol.
We consider the problem of self-deployment and relocation in mobile wireless networks, where nodes are both sensors and actuators. We propose a unified, distributed algorithm that has the following features. During de...
详细信息
We consider the problem of self-deployment and relocation in mobile wireless networks, where nodes are both sensors and actuators. We propose a unified, distributed algorithm that has the following features. During deployment, our algorithm yields a regular tessellation of the geographical area with a given node density, called monitoring configuration. Upon the occurrence of a physical phenomenon, network nodes relocate themselves so as to properly sample and control the event, while maintaining the network connectivity. Then, as soon as the event ends, all nodes return to the monitoring configuration. To achieve these goals, we use a virtual force-based strategy, which proves to be very effective even when compared to an optimal centralized solution.
Wireless sensor networks offer a very attractive, low cost alternative for traffic monitoring and surveillance in car parking, freeways and intersection in different environmental conditions. In such systems, robust a...
详细信息
ISBN:
(纸本)9780769530062;0739530060
Wireless sensor networks offer a very attractive, low cost alternative for traffic monitoring and surveillance in car parking, freeways and intersection in different environmental conditions. In such systems, robust and reliable vehicle detection is a critical step, thus it is important to carefully evaluate the different modes of operations in order to address existing issues. This paper proposes a vision of improvements to wireless sensor car parking network system by presenting valuable comparison data for different sensors using different type of software functions and hardware components. The main goal of this work is to present a simple, automated analysis and comparison of power management, communication efficiency and threshold times using different sensors and a corresponding prediction of the above features. The results show a clear difference in various parameters by using different types of sensors for vehicle detection.
Using distributed hash tables (DHTs) over ad-hoc wireless sensor networks (WSNs) has gained a lot of attention in the research arena in last years. In WSN's world, the most important issue in routing is to gather ...
详细信息
ISBN:
(纸本)9780769530062;0739530060
Using distributed hash tables (DHTs) over ad-hoc wireless sensor networks (WSNs) has gained a lot of attention in the research arena in last years. In WSN's world, the most important issue in routing is to gather the routed information coming from sensor nodes to the sink node regardless of the identity of the donating node. The problem in this context is to locate efficiently the sensor node, which holds the data item with the minimum number of intermediate nodes to save network energy. DHTs based on the Internet are used for this purpose. This paper presents a ScatterPastry platform based on pastry DHT as an overlay routing platform for distributed applications over WSNs using Scatterweb nodes, a real-world wireless sensor platform.
Strategic, operational and tactical information, combat identification and blue-force-tracking provided by advanced "command, control, communications, computers, intelligence, surveillance, and reconnaissance&quo...
详细信息
Strategic, operational and tactical information, combat identification and blue-force-tracking provided by advanced "command, control, communications, computers, intelligence, surveillance, and reconnaissance" distributed system-of-systems improve the quality of decision-makers' situation awareness (SA). Such SA improvements increase the pace at which decision making can be done while maintaining a low risk of errors by decreasing the friction (the fog of war) in today's complex geopolitical contexts often conducted in urbanized areas. The first challenge addressed by this paper relates to generating accurate geolocation of agents even where satellite-positioning systems, such as the Global Positioning System, are unreliable or denied. The second challenge concerns the efficient sharing of this information for mobile agents in complex terrains by using advanced mobile ad-hoc network (MANET) technologies. The last challenge addressed consists in devising a set of rules based on a dead-reckoning error model for controlling the positional- data updates shared over the MANET.
This paper presents a distributed system for remote monitoring of vehicle diagnostics and geographical position. This is achieved by using on-board microcomputer system, called on-board smart box (OBSB), general packe...
详细信息
This paper presents a distributed system for remote monitoring of vehicle diagnostics and geographical position. This is achieved by using on-board microcomputer system, called on-board smart box (OBSB), general packet radio service (GPRS) and a remote server. The OBSB which is equipped with an integrated global positioning system (GPS) receiver is empowered by a software application that manages the processes of local data acquisition and transmission of the acquired data to the remote server via GPRS. When programmed with speed limits in a certain geographical region, the OBSB allows the traffic control authority to supervise violations of speed limits from inside vehicles rather than outside supervision via certain check points. Appropriate vocal and text warning messages are issued when a vehicle exceeds the permitted speed limit at a certain location. A prototype system is designed and implemented with a small number of sensors. On-road experiments have demonstrated the robustness, efficiency and applicability of the proposed system.
This paper presents locomotion control for a robotic snake that adaptively travels over rugged terrain using obstacles as supports. This kind of locomotion can typically be found in snakes in nature. The snake robot d...
详细信息
This paper presents locomotion control for a robotic snake that adaptively travels over rugged terrain using obstacles as supports. This kind of locomotion can typically be found in snakes in nature. The snake robot dealt with in this paper has an articulated structure in which all joints are actively driven. For locomotion on a flat terrain, joint torques distributed according to the curvature derivative of the body curve has been proved to be optimal under the condition that there is no lateral slippage at every part of the body. In this paper, the same method is applied to locomotion using two kinds of environmental supports; a narrow corridor surrounded by smoothly curved walls and a peg.
暂无评论