In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on ...
详细信息
In order to speed up the propagating process, the worms need to scan many IP addresses to target vulnerable hosts. However, the distribution of IP addresses is highly nonuniform, which results in many scans wasted on invulnerable addresses. Inspired by the theory of good point set, this paper proposes a new scanning strategy, referred to as good point set scanning (GPSS), for worms. Experimental results show that GPSS can generate more distinct IP addresses and less unused IP addresses than the permutation scanning. Combined with group distribution, a static optimal GPSS is derived. Since the information can not be easily collected before a worm is released, a self-learning worm with GPSS is designed. Such worm can accurately estimate the underlying vulnerable-host distribution when a sufficient number of IP addresses of infected hosts are collected. We use a modified Analytical Active Worm Propagation (AAWP) to simulate data of Code Red and the performance of different scanning strategies. Experimental results show that once the distribution of vulnerable hosts is accurately estimated, a self- learning worm can propagate much faster than other worms.
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with ran...
详细信息
According to the weakness of mode of operation, a modified parallelizable message authentication code (MPMAC) is proposed. The mode to process the last block of message is improved to avoid the forgery attack with random message by using the fact that the block cipher has same output with the same input using a key. Its security is proved by quantifying the advantage of distinguishing message authentication code from the random function in terms of the quality of the block cipher as a pseudo-random permutation.
Sensor data error is one of the important reasons of satellite mission *** eliminate the negative influence of error sensor data,prediction methods are used to tolerate the temporal error of satellite data acquisition...
详细信息
Sensor data error is one of the important reasons of satellite mission *** eliminate the negative influence of error sensor data,prediction methods are used to tolerate the temporal error of satellite data acquisition *** expound the effect of curve fitting prediction and Lagrange interpolation *** the limit of satellite on-board-computer memory,we find that the curve fitting can tolerate the sensor error better with finite *** showed that the error rate between prediction value and real value is lower than 1% when there is no fault in *** technique can use to check the correctness of sensor data,and tolerate the error data when sensor is disturbed,and then improve the reliability of satellite control system.
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of us...
详细信息
A novel generation key scheme based on DNA is proposed. By using a key expansion matrix, the scheme improves the independence and the strict avalanche of the key. Although it increases computation amount because of using the matrix operation, the random number can be generated by the DNA sequence directly and the speed of the computation is greatly improved. Therefore, the new scheme has wide application in the field of the block cipher, data signature, identity authentication, et al.
Owing to the difference of soil water in the farm,a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy *** water content can be forecaste...
详细信息
Owing to the difference of soil water in the farm,a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy *** water content can be forecasted by using the forecast model of soil water,according to the real soil water content of different sampling sites in this *** or not can be decided by comparing the current soil content with the light drought and serious drought index of the *** water amount of irrigation can be decided by the analysis of economy benefit according to the model of water consumption-yield,thus the irrigation prescription map can be created..This system can also query the information of fields,manage and analysis the data of *** test was performed in national precision agriculture demo farm.
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarch...
详细信息
In this paper, a collusion-resistant matrix system (CRMS) for group key managements is presented. The CRMS is defined as a collection of subsets of users, and the keys held by users in CRMS are organized in a hierarchical matrix manner. After describing the join and leave protocols, we prove that CRMS has lceil2N/trceil-collusion resistant capability. Moreover, the suggestion of how to select the parameters in CRMS is given. The simulated experiments show that CRMS is a practical group key management in wireless networks.
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi...
详细信息
ISBN:
(纸本)9781424432127
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limited resources and security, no key distribution technique is ideal to all the scenarios where sensor networks are used. In this paper, we primarily focus on storage requirements of several key distribution schemes in sensor networks, and obtain their lower bounds on the amount of information each user has to keep secret by modeling the key distribution schemes with an information theoretic framework.
Owing to the difference of soil water in the farm, a system of variable rate irrigation was developed with Visual C++ and MapObjects that can save water as well as can improve economy benefit. Soil water content can b...
详细信息
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo...
详细信息
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present a keying Material Based key Pre-distribution Scheme, i.e., a group of users, using secret information preloaded in their memory and some public information retrieved from a keying material server, can compute a common key. We first formally define the keying material based key pre-distribution scheme in terms of the entropy, and give lower bounds on the amount of information each user has to keep secret. Then, we describe its applications for sensor networks.
暂无评论