In view of the problem that mobile terminal handoffs among wireless heterogeneous networks, a predictive algorithm of handoff in teminal was proposed. The cost function, the algorithm of normalized network parameters,...
详细信息
In view of the problem that mobile terminal handoffs among wireless heterogeneous networks, a predictive algorithm of handoff in teminal was proposed. The cost function, the algorithm of normalized network parameters, the predictive algorithm of network parameter and the process of vertical handoff are given to ensure that the vertical handoff is really reasonable. The results show that the proposed algorithm can efficiently reduce the counts of handoff, increase the handoff performance of the system and improve the QoS of network.
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmatio...
详细信息
In this paper, we present an identity-based explicit authenticated key agreement protocol that is provably secure without random oracles. The protocol employs a new method to isolate a session key from key confirmation keys so that there is no direct usage of hash functions in the protocol. The protocol is proved secure without random oracles in a variant of Bellare and Rogaway style model, an exception to current proof method in this style model in the ID-based setting. We believe that this key isolation method is novel and can be further studied for constructing more efficient protocols.
The law of SMS (short message service) network growth is analyzed to understand the evolution of SMS communication network, and the deficiencies of existing complex network models that are used to describe real SMS ne...
详细信息
The law of SMS (short message service) network growth is analyzed to understand the evolution of SMS communication network, and the deficiencies of existing complex network models that are used to describe real SMS network are pointed out. Then, a new dynamic evolution model is proposed. The model considers both the network node removing and the inner and outer growth of the network, so that the dynamic evolution of a true network can be described in more detail. Experimental results show that the proposed model describes the growth of SMS network desirably, and the model can more objectively simulate and depict the features and evolution of the SMS complex network.
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting broadcast nature of wireless networks. OR relies on the global knowledge of networks to select relays and determine priorities. In this paper, we propose a new routing scheme, OxDSR, which combines OR and dynamic source routing (DSR) and performs opportunistic transmissions with the help of the local information and the traditional route obtained by DSR. By taking the duplicates and additional wireless resource consumed by multiple ACK frames into consideration, we propose a new metric, equivalent data rate, to select and prioritize relays. Extensive simulation study shows that the proposed OxDSR is more resilient and achieves higher throughput than DSR based on the expected transmission count routing metric.
Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on ...
详细信息
Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on these definitions. Then, this model is applied to build a cloud model which characterizes the states of insider threat in the system. Based on the proposed cloud model, an algorithm, which improves the accuracy and objectivity in evaluation, is also designed for sensing the insider threat in the system. Compared to the previous works, the algorithm could analyze threats of the system in various respects and makes decision qualitatively and quantitatively. As a result, the experiments show that the algorithm could effectively sense the insider threat in real-time.
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ...
详细信息
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage...
详细信息
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantages and disadvantages of Dempster rule of combination were analyzed. Secondly, a new mass function based on proportional belief criterion of conjunctive and complementary belief was combined. Finally, the results of numerical examples show that the proposed approach of combination can not only maintain the advantages of original Dempster rule of combination, but also make up for its disadvantages.
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca...
详细信息
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, ±1 are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mat...
详细信息
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mathematical model of the authentication traffic throughput was developed based on the theory of independent and identically distributed probabilities. The research identifies some security vulnerabilities in these protocols, such as the unidirectional process of entity authentication and the unbalanced distribution of authentication traffic, as well as the system complexity. Future development of the 3G security authentication mechanism can be based on IBC (identity-based cryptography) theory.
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par...
详细信息
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow partition with real-time load balancing feedback is presented. The components of data-flow partition and its optimized algorithm are designed and implemented. The experiment shows that the architecture may have higher speed and lower packet loss in high-speed network circumstance. Thus, it may raise the speed of data transmission and improve the efficiency of parallel intrusion detection.
暂无评论