Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting broadcast nature of wireless networks. OR relies on the global knowledge of networks to select relays and determine priorities. In this paper, we propose a new routing scheme, OxDSR, which combines OR and dynamic source routing (DSR) and performs opportunistic transmissions with the help of the local information and the traditional route obtained by DSR. By taking the duplicates and additional wireless resource consumed by multiple ACK frames into consideration, we propose a new metric, equivalent data rate, to select and prioritize relays. Extensive simulation study shows that the proposed OxDSR is more resilient and achieves higher throughput than DSR based on the expected transmission count routing metric.
Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on ...
详细信息
Using the access control relationship, the partial-order structures of subjects and objects in the system and their mapping relationship are defined, and a hierarchy-mapping based insider threat model is developed on these definitions. Then, this model is applied to build a cloud model which characterizes the states of insider threat in the system. Based on the proposed cloud model, an algorithm, which improves the accuracy and objectivity in evaluation, is also designed for sensing the insider threat in the system. Compared to the previous works, the algorithm could analyze threats of the system in various respects and makes decision qualitatively and quantitatively. As a result, the experiments show that the algorithm could effectively sense the insider threat in real-time.
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly ...
详细信息
Passive worms can passively propagate through embedding themselves into some sharing files, which can result in significant damage to unstructured P2P networks. To study the passive worm behaviors, this paper firstly analyzes and obtains the average delay for all peers in the whole transmitting process due to the limitation of network throughput, and then proposes a mathematical model for the propagation of passive worms over the unstructured P2P networks. The model mainly takes the effect of the network throughput into account, and applies a new healthy files dissemination-based defense strategy according to the file popularity which follows the Zipf distribution. The simulation results show that the propagation of passive worms is mainly governed by the number of hops, initially infected files and uninfected files. The larger the number of hops, the more rapidly the passive worms propagate. If the number of the initially infected files is increased by the attackers, the propagation speed of passive worms increases obviously. A larger size of the uninfected file results in a better attack performance. However, the number of files generated by passive worms is not an important factor governing the propagation of passive worms. The effectiveness of healthy files dissemination strategy is verified. This model can provide a guideline in the control of unstructured P2P networks as well as passive worm defense.
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantage...
详细信息
To solve the drawbacks of Dempster rule and improved rule of combination, a novel evidence combination method based on proportional conjunctive and complementary pooling criterion was presented. Firstly, the advantages and disadvantages of Dempster rule of combination were analyzed. Secondly, a new mass function based on proportional belief criterion of conjunctive and complementary belief was combined. Finally, the results of numerical examples show that the proposed approach of combination can not only maintain the advantages of original Dempster rule of combination, but also make up for its disadvantages.
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is ca...
详细信息
It is well known that the Chinese Remainder Theorem (CRT) can greatly improve the performances of RSA cryptosystem in both running times and memory requirements. However, if the implementation of CRT-based RSA is careless, an attacker can reveal some secret information by exploiting hardware fault cryptanalysis. In this paper, we present some fault attacks on a type of CRT-RSA algorithms namely BOS type schemes including the original BOS scheme proposed by Blomer, Otto, and Seifert at CCS 2003 and its modified scheme proposed by Liu et al. at DASC 2006. We first demonstrate that if some special signed messages such as m = 0, ±1 are dealt carelessly, they can be exploited by an adversary to completely break the security of both the BOS scheme and Liu et al.'s scheme. Then we present a new permanent fault attack on the BOS scheme with a success probability about 25%. Lastly, we propose a polynomial time attack on Liu et al.'s CRT-RSA algorithm, which combines physical fault injection and lattice reduction techniques when the public exponent is short.
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mat...
详细信息
This paper presents an analysis of 3GPP (3rd generation partnership project) security protocols and related technical specifications to further development of the 3G (3rd-generation) security protocol standards. A mathematical model of the authentication traffic throughput was developed based on the theory of independent and identically distributed probabilities. The research identifies some security vulnerabilities in these protocols, such as the unidirectional process of entity authentication and the unbalanced distribution of authentication traffic, as well as the system complexity. Future development of the 3G security authentication mechanism can be based on IBC (identity-based cryptography) theory.
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow par...
详细信息
Parallel approach is an important way to improve the performance of networked based intrusion detection system. A parallel architecture of intrusion detection system based on the ideas of combining twice data-flow partition with real-time load balancing feedback is presented. The components of data-flow partition and its optimized algorithm are designed and implemented. The experiment shows that the architecture may have higher speed and lower packet loss in high-speed network circumstance. Thus, it may raise the speed of data transmission and improve the efficiency of parallel intrusion detection.
The paper analyzed the security threats and system flaws of present proxy authorization signatures, and a forward secure proxy authorization signature scheme with conditionally anonymity based on ECC (Elliptic Curves ...
详细信息
Multi-receiver signeryption is a new cryptographic primitive that simultaneously fulfills both the functions of signature and multi-receiver encryption. Generalized Multi-Receiver signeryption can provide authenticity...
详细信息
In text information processing field, with the rapid development of information technology and Internet, it was no longer difficult to collect large scale of corpus for training. Privacy preserving data mining was nee...
详细信息
In text information processing field, with the rapid development of information technology and Internet, it was no longer difficult to collect large scale of corpus for training. Privacy preserving data mining was needed to discover accurate patterns without precise access to the original data, especially for personal privacy information. Firstly, a privacy preserving online adaptive spam filtering model was given. Then an example of privacy preserving spam filtering based on hash function was proposed. Thereafter, an approach of partial hiding privacy preserving spam filtering was discussed. Theoretical analyses and experiments show that it can provide better privacy in online spam filtering.
暂无评论