This paper studies an invisible and robust digital watermarking algorithm in the wavelet transform domain. The chose of Discrete Wavelet Transform is motivated by a good match with Human Visual System directives. Howe...
详细信息
There are more security issues in Wireless Sensor networks (WSNs) than in traditional networks, because of the particularity of WSNs. The existing security mechanisms for WSNs can be classified into two types. One is ...
详细信息
There are more security issues in Wireless Sensor networks (WSNs) than in traditional networks, because of the particularity of WSNs. The existing security mechanisms for WSNs can be classified into two types. One is based on cryptography, and it can resolve the traditional security issues such as authentication and privacy;the other is based on trust, which emphasizes the reliability and availability of the network services. To perfectly resolve all security issues in WSNs, the cryptography technology and the trust mechanism should be used together. In this paper, we combine the concepts of cryptography and trust to propose a novel secure trust management mechanism to overcome the faults in existing mechanisms. And then, based on this trust management, a secure communication protocol is proposed. Experiments and simulations show our scheme is effective to the unresolved issues in the existing trust management mechanisms.
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has ...
详细信息
ISBN:
(纸本)9781509035144
Erasure coding has been increasingly used by distributed storage systems to maintain fault tolerance with low storage redundancy. However, how to enhance the performance of degraded reads in erasure-coded storage has been a critical issue. We revisit this problem from two different perspectives that are neglected by existing studies: data placement and encoding rules. To this end, we propose an encoding-aware data placement (EDP) approach that aims to reduce the number of I/Os in degraded reads during a single failure for general XOR-based erasure codes. EDP carefully places sequential data based on the encoding rules of the given erasure code. Trace-driven evaluation results show that compared to two baseline data placement methods, EDP reduces up to 37.4% of read data on the most loaded disk and shortens up to 15.4% of read time.
As online advertisements are increasing in number, many ad filtering tools have emerged, among which the most widely-used are AdBlock and AdBlock Plus. To use these tools effectively is of significance to the network ...
详细信息
As online advertisements are increasing in number, many ad filtering tools have emerged, among which the most widely-used are AdBlock and AdBlock Plus. To use these tools effectively is of significance to the network users. First, this paper analyzes the filtering performance of both AdBlock and AdBlock Plus, using the percentage of ad requests blocked when accessing a web page in the total number of page requests, as well as web page loading time as two specific metrics for comparison. According to the results, AdBlock surpasses AdBlock Plus in terms of ad filtering capability, and the difference between those two tools is mainly due to different default filter lists they use. Then taking video and game filtering as an example, this paper explores how to use ad filtering tools to achieve traffic filtering with specific requirements on the basis of ad filtering principle and rule grammar. In such way, ad filtering tools are expanded to web traffic filtering in specific application scenarios.
In this paper, we present an unequal message protection (UMP) coding scheme, which provides unequal error protection (UEP) for a message set consisting of disjoint classes with different reliability requirements. The ...
In this paper, we present an unequal message protection (UMP) coding scheme, which provides unequal error protection (UEP) for a message set consisting of disjoint classes with different reliability requirements. The proposed UMP code is a union of coset codes, each of which is chosen from a class of length-flexible polar codes and can be implemented over a balanced binary tree (BBT). For the UMP code construction, we propose to generate each coset code by superimposing a class indicator vector on a rate-matched BBT code. Then, we present a polarization weight (PW) method for the BBT code construction and a row weight (RW) method for the class indicator vector selection. Numerical results show that our UMP coding scheme can achieve performance within the achievability UMP bound and the converse UMP bound in the finite blocklength regime.
360° UHD videos have absorbed great attention in recent years. However, as they are of significant size and usually watched from a close range, they require extremely high bandwidth for a good immersive experienc...
详细信息
ISBN:
(数字)9781728199160
ISBN:
(纸本)9781728192369
360° UHD videos have absorbed great attention in recent years. However, as they are of significant size and usually watched from a close range, they require extremely high bandwidth for a good immersive experience, which poses a great challenge on the current single-source adaptive streaming strategies. Realizing the great potentials of tile-based video streaming and pervasive edge services, we advocate a tile-based multi-source adaptive streaming strategy for 360° UHD videos over edge networks. In order to reap its benefits, we consider a comprehensive model which captures the key components of tile-based multi-source adaptive streaming. Then we formulate a joint bitrate selection and request scheduling problem, aiming at maximizing the system utility (i.e., user QoE minus service overhead) while satisfying the service integrity and latency constraints. To solve the formulated non-linear integer programming problem efficiently, we decouple the control variables and resort to matroid theory to design an optimal master-slave algorithm. In addition, we improve our proposed algorithm with a deep learning-based bitrate selection algorithm, which can achieve a rationalization result in a short running time. Extensive datadriven simulations validate the superior performance of our proposed algorithm.
To tackle with physical attacks to real world cryptosystems,leakage resilient cryptography was *** this setting, the adversary is allowed to have access to the internal state of a cryptographic system, thus violates t...
To tackle with physical attacks to real world cryptosystems,leakage resilient cryptography was *** this setting, the adversary is allowed to have access to the internal state of a cryptographic system, thus violates the black-box reduction used in *** when considering continual memory leakage (CML), i.e., there is no predetermined bound on the leakage of the internal information, the task is extremely *** this paper, we solve this problem by introducing a new primitive called updatable hash proof system (UHPS).A UHPS can be viewed as a special Hash proof system (HPS), which served as a fundamental tool in constructing public key encryption (PKE) schemes in both leakage-free and leaky settings.A remarkable property of UHPS is that by simply substituting the HPS component with a UHPS component in a PKE scheme, one obtains a new PKE scheme secure in the CML ***, the resulting PKE scheme enjoys the same advantage of the original HPS-based PKE, for instance, still "compatible" with known transforms [8, 24, 20, 32].We then give instantiations of UHPS from widely-accepted assumptions, including the symmetric external Diffie-Hellman assumption and the d-linear ***, we notice that when instantiated with concrete assumptions, the resulting chosenciphertext secure PKE scheme is by far the most efficient.
The smart grid is widely recognized as a highly efficient solution for mitigating carbon emissions and addressing energy crises. Within this framework, the collection of metering data from users is crucial for improvi...
详细信息
ISBN:
(数字)9798350391367
ISBN:
(纸本)9798350391374
The smart grid is widely recognized as a highly efficient solution for mitigating carbon emissions and addressing energy crises. Within this framework, the collection of metering data from users is crucial for improving energy efficiency. However, the frequent collection of real-time metering data presents substantial challenges in terms of data privacy and communication overhead. In this paper, we propose an efficient and secure scheme that enables the system operator to monitor load and compute bills while preserving the users’ privacy. During the load monitoring phase, our scheme uses certificateless ring signatures and unique random identifiers to ensure the security of electricity data. Additionally, the proposed scheme uses improved function encryption for electricity data in a ciphertext state to protect users’ privacy during dynamic billing. Detailed security analysis demonstrates that our scheme meets the security requirements of the smart grid. Furthermore, we compare our scheme with existing schemes to demonstrate the effectiveness of our proposed scheme in terms of low computational complexity and communication overhead.
'Robust yet fragile (RYF)' is a major feature of Internet survivability. The cascading failure, which is caused by attacks or configuration mistakes, is one of the most serious incidents impact on the network ...
详细信息
'Robust yet fragile (RYF)' is a major feature of Internet survivability. The cascading failure, which is caused by attacks or configuration mistakes, is one of the most serious incidents impact on the network survivability. Taking aim at this incident, this paper proposes a simple 'load-capacity' model based on the 'self-organized criticality' and the 'highly optimized tolerance' theories in complex system. The model is the abstract of the network topology, the dynamics in network protocols and the complex patterns of network behaviors (load). In this model, the network capacity reflects the expectation of survivability. Our research shows that the RYF nature in network is closely related to abnormal network load pattern.
In this paper, we review the classical secure communication issues, which is always described as a set of interactive rules following a specified sequence, in the perspective of game theory. By introducing rational co...
In this paper, we review the classical secure communication issues, which is always described as a set of interactive rules following a specified sequence, in the perspective of game theory. By introducing rational communication participants, we model the secure communication process in the manner of game theory to capture the interactions of distrusted communication parties. More specifically, we propose a formal framework to provide a precise description of the computation and communication rules in a secure communication game. Each player tends to behave in a way that maximizes their profits in this framework. Following the framework, the fairness of a protocol is presented according to Nash equilibrium of the communication game, as well as the equivalence condition towards a fair protocol. To verify the effectiveness of this framework, we design and implement a series of experiments. The experimental results show that our rational framework is more secure and closer to the practice compared with traditional cryptographic models, which can be a promising analysis solution for future cryptographic protocols .
暂无评论