Monitoring user's abnormal behaviors, which is an effective method to detect impersonation, is used for impersonation detection in insider threats. A model is built by using TAN-based Bayesian network to reflect t...
详细信息
Monitoring user's abnormal behaviors, which is an effective method to detect impersonation, is used for impersonation detection in insider threats. A model is built by using TAN-based Bayesian network to reflect the characteristics of user's behavior. When the deviation from the model is found, the system can determine the identity of the user. As a result, experiments show that the monitoring numbers of processes called by users can be very effective on detecting impersonation and can identify the identity of the attacker.
This paper presents an access control algorithm which bases on artificial neural network (ANN). It uses selected roles as input vectors. Then, considering role inheritance, the matching roles that may mutual exclude a...
详细信息
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly non-uniform, which results in many scans wasted on...
详细信息
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynch...
详细信息
Deniable authentication protocols allow a sender to authenticate a message for a receiver, in a way which the receiver cannot convince a third party that such authentication ever took place. When we consider an asynchronous multi-party network with open communications and an adversary that can adaptively corrupt as many parties as it wishes, we present a new approach to solve the problem of concurrent deniable authentication within the framework of universally composable (UC) security. We formulate a definition of an ideal functionality for deniable authentication. Our constructions rely on a modification of the verifiably smooth projective hashing (VSPH) with projection key function by trapdoor commitment. Our protocols are forward deniable and UC security against adaptive adversaries in the common reference string model. A new approach implies that security is preserved under concurrent composition of an unbounded number of protocol executions; it implies non-malleability with respect to arbitrary protocols and more. The novelty of our schemes is the use of witness indistinguishable protocols and the security is based on the decisional composite residuosity (DCR) assumption. This new approach is practically relevant as it leads to more efficient protocols and security reductions.
Based on the analysis of the node selfishness and the drawback of min-hop selection method as the unique routing selection criteria in Ad Hoc networks,a non-intrusive multi-metric Ad Hoc Routing Protocol-NIMR is *** c...
详细信息
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance abilit...
详细信息
Three basic questions are presented and answered in researching on nodefailure topology in wireless sensor network. First, what is the definition of nodefailure tolerance? Second, how to evaluate this tolerance ability? Third, which type of topologies is more efficient in tolerating nodefailure?.
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the a...
详细信息
It is essential to ensure that sensors can determine their location for wireless sensor networks. However, most of existing location discovery protocols became vulnerable in the presence of malicious attacks. So the authors presented an attack-tolerant node localization algorithm called AtLoc. In AtLoc, a least safe reference set was randomly built up according to the unbiased estimation of variance. Based on this, prediction residual of the least safe reference set was used to stepwise diagnose the remained references were abnormal or not, which significantly enhanced the resilience of localization system against attacks. Finally, the authors provided theoretical analysis and simulations to evaluate the proposed techniques.
Being infrastructureless, node trust plays an important role in security and reliability of mobile ad hoc networks. A new trust valuation model based on the experience of node is given to evaluate trustworthiness betw...
详细信息
Being infrastructureless, node trust plays an important role in security and reliability of mobile ad hoc networks. A new trust valuation model based on the experience of node is given to evaluate trustworthiness between network nodes. To improve the accuracy and rationality of node trust evaluation in a mobile network, the evidence theory is introduced to evaluate trust and combine multilateral experience from others. In addition, observation-frame is introduced to incorporate experience's time-sensitivity, which provides adequate support to cope with strategically altering behaviors of malicious nodes efficiently. A low-cost recommendation technique based on sleep mechanism is provided for neighboring nodes to share experience information, which obtains faster convergence rate and reduces the whole energy dissipation. Together, recommendation trust is quantitatively evaluated by a fuzzy similarity measure, which significantly increases the resilience against dishonest feedbacks. In comparison with the existing works, a complete trust valuation model is designed, with emphasis on its adaptability to dynamics of trust, robustness and resource-saving. This model can be used in coordination and security decision for network services. Finally, the theoretical analysis and simulations is given to evaluate the proposed techniques.
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present....
详细信息
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present. We described the process of this TQSS scheme and discussed its security. It was shown that entan-glement is not necessary for quantum secret sharing. Moreover,the theoretic effi-ciency was improved to approach 100% as almost all the instances can be used for generating the private key,and each photon can carry one bit of information. This protocol is feasible with the present-day technique.
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu...
详细信息
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem. Generally speaking, as an authority which can be trusted by all members does not exist, a threshold signature scheme without a trusted party appears more attractive. Following some ideas of the classical Shamir’s threshold signature scheme, a quantum threshold group signature one is proposed. In the proposed scheme, only t or more of n persons in the group can generate the group signature and any t-1 or fewer ones cannot do that. In the verification phase, any t or more of n signature receivers can verify the message and any t-1 or fewer receivers cannot verify the validity of the signature.
暂无评论