In ICC2008 and subsequent work, Lei et al. proposed a user authentication system (virtual password system), which is claimed to be secure against identity theft attacks, including phishing, keylogging and shoulder sur...
详细信息
In ICC2008 and subsequent work, Lei et al. proposed a user authentication system (virtual password system), which is claimed to be secure against identity theft attacks, including phishing, keylogging and shoulder surfing. Their authentication system is a challenge-response protocol based on a randomized linear generation function, which uses a random integer in the responses of each login session to offer security against assorted attacks. In this paper we show that their virtual password system is insecure and vulnerable to multiple attacks. We show that with high probability an attacker can recover an equivalent password with only two (or a few more) observed login sessions. We also give a brief survey of the related work and discuss the main challenges in designing user authentication methods secure against identity theft.
Cluster-Head (CH) nodes function as gateways between the sensors and the Base Station, in Wireless Sensor Networks with a cluster hierarchy. The total energy dissipation of the sensors can be reduced by optimizing the...
详细信息
Cluster-Head (CH) nodes function as gateways between the sensors and the Base Station, in Wireless Sensor Networks with a cluster hierarchy. The total energy dissipation of the sensors can be reduced by optimizing the load balance within the cluster hierarchy. This paper proposes an uncapacitated facility location based cluster scheme in which the system lifetime is extended by adding an additional layer of SuperCluster-Head (SCH) nodes, in order to ease the transmission load of the CHs and to balance the load distribution within the network. The SCH layer is configured using an uncapacitated facility location algorithm in which the facility and service costs are defined in terms of both the energy and the transmission distance. The simulation results confirm that the proposed method yields a better load balance in the SCH layer than that obtained using either a random configuration or a round-robin scheme. Finally, it is shown that irrespective of the size of the sensor field, the proposed scheme outperforms the conventional LEACH-C two-layer scheme in terms of the average energy dissipation of the nodes, the average survival times of the nodes, and the overall system lifetime.
A mathematical model is established, centered on time efficiency andimproved, Ant Colony Algorithm. Ant Colony Algorithm, is used, to solve theemergency resources distribution problem, and, several aspects of the algo...
详细信息
The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, a...
详细信息
ISBN:
(纸本)9781424469611
The multiple pattern matching has always been a significant principle for applying to a network security system. This principle is adapted to accommodate the target patterns to be detected in a pre-processing phase, and the objective text and the suspect patterns are simultaneously detected by comparing with the existing structure. This research article introduces a new algorithm of multi-string pattern matching by means of a new data structure called inverted lists. The inverted lists structure, inherited from the inverted index, is represented by the positions of characters which appear in the patterns. The new algorithm, which is more efficient time than the traditional algorithms, scans the given text in a single pass. More importantly, the structure of patterns is able to update the patterns over time.
Sharing communications are not easy to do in the mobility networks (MONETs) for the limited bandwidth and the overhead of tunneling. Multicast is an intuitive method to solve this problem. To improve the performance, ...
详细信息
ISBN:
(纸本)9781424455652
Sharing communications are not easy to do in the mobility networks (MONETs) for the limited bandwidth and the overhead of tunneling. Multicast is an intuitive method to solve this problem. To improve the performance, the multicast topology should be redesigned for the MONETs. We proposed an efficient communication algorithm with multicast schemes in a network mobility (NEMO) environment. The Mobile Router Forwarding Scheme (MRFS) algorithm is proposed for this goal. We can find that MRFS can reduce the storage cost for every Mobile Router (MR) especially in the TLMR (Top level MR).
In this work we present a general control scheme for the management of an energy community and a load modeling approach. We adopt a multilevel control scheme in which the first level computes the energy consumption se...
详细信息
In this work we present a general control scheme for the management of an energy community and a load modeling approach. We adopt a multilevel control scheme in which the first level computes the energy consumption set point towards the second level and the generation planning towards the energy sources, the second level is in charge of local loads scheduling and micro-generation planning.
This paper deals with a sensor scheduling algorithm considering estimation error variance and communication energy in sensor networked feedback systems. We propose a novel decentralized estimation algorithm with unkno...
详细信息
This paper deals with a sensor scheduling algorithm considering estimation error variance and communication energy in sensor networked feedback systems. We propose a novel decentralized estimation algorithm with unknown inputs in each sensor node. Most existing works deal with the sensor network systems as sensing systems and it is difficult to apply them to the real physical feedback control systems Then some local estimates are merged and the merged estimates can be optimized in the proposed method and the estimation error covariance has a unique positive definite solution under some assumptions. Next, we propose a novel sensor scheduling algorithm in which each sensor node transmits information. A sensor node uses energy by communication between other sensor node or the plant. The proposed algorithm achieves a sub-optimal network topology with minimum energy and a desired variance. Experimental results show an effectiveness of the proposed method.
Sensor network terminals are installed in large numbers in the field and transmit data periodically by radio. Such terminals must be miniaturized, and save power so that each device can operate by battery for several ...
详细信息
In this paper a comprehensive assertion-based verification methodology for the digital, analog and software domain of heterogeneous systems is presented. The proposed methodology combines a novel mixed-signal assertio...
详细信息
ISBN:
(纸本)9783981080162
In this paper a comprehensive assertion-based verification methodology for the digital, analog and software domain of heterogeneous systems is presented. The proposed methodology combines a novel mixed-signal assertion language and the corresponding automatic verification algorithm. The algorithm translates the heterogeneous temporal properties into observer automata for a semi-formal verification. This enables automatic verification of complex heterogeneous properties that can not be verified by existing approaches. The experimental results show the integration of mixed-signal assertions into a simulation environment and demonstrate the broad applicability and the high value of the evolved solution.
Minimal siphons in the class of S 4 PR nets have become a conceptual and practical central tool to deal with deadlocks caused by the sharing of resources in Flexible Manufacturing systems. The availability of efficien...
详细信息
Minimal siphons in the class of S 4 PR nets have become a conceptual and practical central tool to deal with deadlocks caused by the sharing of resources in Flexible Manufacturing systems. The availability of efficient algorithms to compute these structural objects is very important. In this paper we take advantage from the particular properties of the siphons in S 4 PR to obtain an efficient algorithm. These properties allow to compute the minimal siphons from a generating family of minimal siphons. This family is composed by the minimal siphons containing only one resource. The computation of the minimal siphons is based in the maximal strongly connected components of a graph representing the relations between the siphons of the generating family. The algorithm is very economic in memory in all intermediate steps with respect to the classical algorithms.
暂无评论