Peer-to-Peer (P2P) protocol is widely used in many network applications and P2P traffic is becoming dominating in the current Internet and may cause serious congestion. Recently, P2P applications tend to intentionally...
详细信息
Peer-to-Peer (P2P) protocol is widely used in many network applications and P2P traffic is becoming dominating in the current Internet and may cause serious congestion. Recently, P2P applications tend to intentionally disguise their traffic flows by using arbitrary ports, which leads the accurate identification of P2P traffic to become a very difficult job and hot research topic in network traffic control. In this paper, we employ the longest common subsequence to identify the key packets from the traffic flows, and present a new method to identify the P2P flows based on the signatures of key packets with only direction and payload length in the first few packets of a flow. We test the new method with four popular P2P applications in the actual network environment and the results show that the new method has high accuracy and efficiency since only a few packets in each flow needs to be analyzed. The new method is suitable for real time traffic management and monitoring.
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports ...
详细信息
The Binary-based attestation (BA) mechanism presented by the Trusted Computing Group can equip the application with the capability of genuinely identifying configurations of remote system. However, BA only supports the attestation for specific patterns of binary codes defined by a trusted party, mostly the software vendor, for a particular version of a software. In this paper, we present a Source-Code Oriented Attestation (SCOA) framework to enable custom built application to be attested to in the TCG attestation architecture. In SCOA, security attributes are bond with the source codes of an application instead of its binaries codes. With a proof chain generated by a Trusted Building System to record the building procedure, the challengers can determine whether the binary interacted with is genuinely built from a particular set of source codes. Moreover, with the security attribute certificates assigned to the source codes, they can determine the trustworthiness of the binary. In this paper, we present a TBS implementation with virtualization.
Pseudorandom sequence plays an important role in information hiding. But in many circumstances, what we need is pseudorandom sequence with adjustable density other than balanced pseudorandom sequence. Compared with th...
详细信息
Pseudorandom sequence plays an important role in information hiding. But in many circumstances, what we need is pseudorandom sequence with adjustable density other than balanced pseudorandom sequence. Compared with the study on other techniques in information hiding, research on special sequence for information hiding is rare. This paper proposes the concept of density adjustable pseudorandom sequence for the first time and presents its applications. We also give a general construction method of density adjustable pseudorandom sequence generator. Theoretical analysis proves our method can generate sequence approaching to any fixed density with arbitrary precision as well as preserving excellent randomness. Furthermore, two case studies are given to demonstrate it is applicable for information hiding. The main contribution of this paper is providing the density adjustable pseudorandom sequence as a fundamental primitives of information hiding.
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing. An new anonymous and authenticated ...
详细信息
Aimed at the anonymous of open environment of mobile ad hoc networks was not considered in the routing protocol of ARAN, and it was a low efficiency protocol in searching a routing. An new anonymous and authenticated routing protocol for mobile ad hoc networks(AARAN) was presented, It made use of hash function, signature and Hello message. The protocol can effectively ensure the anonymous of the networks, avoid launching a routing request repeatedly, so it improves the efficiency, and the protocol can availably account for the harm which is caused by selfish nodes.
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this ...
详细信息
ISBN:
(纸本)9781424454112
In a group signature scheme, a group member signs messages anonymously on behalf of the group. However, in the case of a dispute, the actual group signer's identity can be revealed by a designated entity. In this paper, we propose a new identity-based group signature scheme using bilinear maps. The group signature scheme is well suited for large groups, i. e., the length of the group' s public key and the length of signatures are independent on the size of the group. Our signature scheme is based on bilinear maps. Furthermore, a group member can sign many messages using the same key pair. Cryptanalysis shows that the proposed group signature scheme is secure under the computational Diffie Hellman problem called CDHP assumption. And it is also more efficient than previous ones satisfying these requirements.
Since biometric data are unique and permanent characteristics of individuals, the privacy protection of biometric authentication schemes has become a common concern of the public. Recently, Tang et al. proposed a biom...
详细信息
ISBN:
(纸本)9780769537443
Since biometric data are unique and permanent characteristics of individuals, the privacy protection of biometric authentication schemes has become a common concern of the public. Recently, Tang et al. proposed a biometric-based authentication scheme in an attempt to solve the privacy concerns. However, their scheme cannot resist the attack of tamper. Motivated by these concerns, in this paper, we proposed a new biometric-based authentication scheme, which achieves identity privacy and transaction untraceability.. Its security is based on the semantic security of the ElGamal algorithm. Analysis results show that our scheme is higher in efficiency than Tang et al. scheme does, and meanwhile, it can resist the tamper attack. It is concluded that the proposed scheme is more secure and more practical than the existing ones.
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system canno...
详细信息
ISBN:
(纸本)9780769537443
Wireless sensor networks are open architectures, so any potential threat can easily intercept, wiretap and counterfeit the information. Therefore, the safety of WSN is very important. Since any single key system cannot guarantee the security of the wireless sensor network for communications, this paper introduces a hierarchical key management scheme based on the different abilities of different sensor nodes in the clustered wireless sensor network. In this scheme, the nodes are distributed into several clusters, and a cluster head must be elected for each cluster. Private communication between cluster heads is realized through the encryption system based on the identity of each head while private communication between cluster nodes in a same cluster head is achieved through the random key preliminary distribution system. For cluster head node plays a pivotal role in this scheme, a trust management system should be introduced into the election of the cluster head which will exclude the malicious node from outside the cluster, thus improve the whole networksecurity.
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities&...
详细信息
The utility evaluation of DRM security policies based on fuzzy analytic hierarchy process (FAHP) and their game-theoretic adoptions were proposed from a novel perspective of the different level security and utilities' analyses. Based on the analytic hierarchy structure, the fuzzy estimation consistency matrix was employed to analyze the weights of optional security components and services, and then the gained weight values were further used for the computing of security policies' utilities and the accomplishing the game, finally yielding Nash equilibriums, that is, optimal policies profiles, as well as pre-conditions for participants. The use case for a group of the typical security policies shows that the result of the game includes two different groups of security policies profiles, as well as contents/services provider could effectively deploy a DRM system in term of the number of consumers purchasing digital contents, and average purchase, thus achieving the balance between the digital copyrights protection and real payoffs of participants.
作者:
Zuowen TanSchool of Information Technology
Jiangxi University of Finance & Economics Nanchang 330013Jiangxi Province P.R. China Key Lab of Network Security and Cryptology Fujian Normal University Fuzhou 350007Fujian Province P.R. China
In a society oriented signature scheme, a signature is produced by several co-signers simultaneously in a group. Saeednia proposed an identity-based society oriented signature scheme. However, there are some security ...
详细信息
In a society oriented signature scheme, a signature is produced by several co-signers simultaneously in a group. Saeednia proposed an identity-based society oriented signature scheme. However, there are some security weaknesses in the scheme. Zhu and Wang et al. showed two different attacks against the identity-based society oriented signature scheme respectively. In this paper, we proposed an improved identitybased society signature scheme with anonymous signers. The proposed identity-based society signature scheme removed the weaknesses of Saeednia's signature scheme. A detailed analysis demonstrated that the improved scheme is secure against all the attacks above-mentioned. In addition, when the structure of a group changes or a group represents different organizations to sign messages at the same time, the improved scheme won't reveal the secret key of any entity or even the value of the ratio of two secret keys. Our scheme doesn't require that the clerk must be a trusted and online party.
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents ...
详细信息
A successful transaction of digital contents is primarily dependent on security policies, trust relationships and benefit equilibriums among various participants in a DRM (Digital Rights Management)-enabling contents value chain ecosystem. We first analyzed basic value chain architectures in existence, together with some fundamental security and trust requirements. And then, a state-of- the-art anatomy of the security and trust related to DRM was presented from different stakeholder' perspectives. Next, some challenges for multi-party mutual trust, not just inclined to any of participants, were proposed based on the holistic consideration of the digital contents/rights protection and the benefits balance. Finally, a conclusion was drawn that the rights-benefits-centric DRM ecosystem and the resulting trust relationship are crucial for the survivability of the contents industry.
暂无评论