VANET is new kind of Ad hoc. It is widely used in ITS (Intelligent Transportation systems), which has many characteristics as large scale network, fast moving nodes, the frequently changing topological structure and e...
详细信息
ISBN:
(纸本)9781467362498;9781467362481
VANET is new kind of Ad hoc. It is widely used in ITS (Intelligent Transportation systems), which has many characteristics as large scale network, fast moving nodes, the frequently changing topological structure and easily divided networks. Therefore, routing protocol design must fully consider of this characteristics with much node information that bring a great challenge to the security of VANET. In this paper, we divide the information type into four categories based on different content, and analyze the security threats in different information type, then summarize the existing security technologies and give the possible research directions.
The bottleneck of NetFlow is the memory *** solve this problem,we propose continuous reading and writing method whose efficiency reaches 90% or *** single parallel multi-linked lists method used to handle the inactive...
详细信息
ISBN:
(纸本)9781467349994
The bottleneck of NetFlow is the memory *** solve this problem,we propose continuous reading and writing method whose efficiency reaches 90% or *** single parallel multi-linked lists method used to handle the inactive timeout flows is based on the continuous reading and writing *** analysis and experimental results show that the single parallel multi-linked lists method can be applied in OC-768(40Gbps) to manage tens of millions of entries.
In order to enhance the extensibility of current attack feature extracted anddetection means for App-ddoS(Application Layerdistributeddenial of Service, App-ddoS)attacks, a novel feature extracted method based on m...
详细信息
A video copy detection method based on fusion of spatio-temporal features is proposed in this paper. Firstly, trajectories are built and lens boundaries are detected by SUrF features analyzing, then normalized histogr...
详细信息
Image feature extraction is an important technology in image matching andretrieval. For the problem of high computational complexity of spatial domain image feature extraction using the SIFT algorithm, and by studyin...
详细信息
Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary *** abnormal detection method based on Hurst parameter estimation using Fractional Fouri...
详细信息
ISBN:
(纸本)9781467349970
Since traditional abnormal detection methods have poor performance,and Hurst parameter estimation was affected by non-stationary *** abnormal detection method based on Hurst parameter estimation using Fractional Fourier Transform(FrFT) was *** experimental results show that FrFT estimation method was not affected by nonstationary time series and has better performance on Hurst *** also verify the improvement in the network traffic anomaly detection.
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private infor...
详细信息
ISBN:
(纸本)9781467327626
The projection of the random multi-antenna weighted vector structured with spatial scrambling is of constant modulus on the main channel, Eavesdropper can take the advantage of multi-antenna to intercept private information. To solve this problem, we design a kind of physical-layer secrecy method based on the joint scrambling with spatial and frequency resource. Based on the parallel transmission nature of OFdM, we construct a random multiple antenna weighted vector in the each subcarrier, the projection of which on the main channel is equal to a dynamic reference variable. The legitimate user can correctly demodulate the receive signal by this reference variable obtained from the estimation of the reference subcarrier. Meanwhile, because of the difference between the main channel and eavesdropper channel, eavesdropper can't obtain the useful information. The simulation results show that, when the legitimate users can correctly demodulate the received signal, the eavesdropper can't intercept the private information using whether blind equalization or MUSIC-like method.
Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a s...
详细信息
ISBN:
(纸本)9781467327626
Length and mismatch rate of secret bit strings derived from channel characteristics by legitimate users for key generation are affected by quantization algorithm significantly. Existing schemes cannot achieve both a string and a low mismatch rate at the same time because of the static quantization method. In this paper we first propose an adaptive quantization algorithm formed of an quantizer offset with the quantization noise at one side and a quantization-level optimizing method, which maximize the length of secret bit string under the constraint of mismatch rate. Based on this algorithm, a key agreement scheme selection approach is presented to harvest longer bit strings. As a result, an adaptive key generation scheme based on quantization of channel characteristics is proposed using the above methods. With this scheme, bit strings with length close to theoretical limit can be generated, and the mismatch rate is lower than 5%.
The existing physical layer security algorithm could guarantee secure communication to a certain extent. However, eavesdropper can get more information from legitimate receivers whose channel condition is worse than o...
详细信息
ISBN:
(纸本)9781467327626
The existing physical layer security algorithm could guarantee secure communication to a certain extent. However, eavesdropper can get more information from legitimate receivers whose channel condition is worse than other users. In order to improve the system's security, a novel physical layer security algorithm based on cooperative jamming for multiuser MIMO system is proposed in this paper. Firstly, a multi-user MIMO system of security is established, combining transmit beamforming and artificial noise. Then, the status of each user's characteristics is describedrespectively. And users are divided into a secure communications group and interference group for scheduling according to the characteristics of the user's state. Further, interference group assists the base station interference eavesdropper by adjusting the beamforming weights. Simulation results show that the proposed algorithm can increase the secrecy capacity by 2.4bit/s/HZ averagely, which can improve security for multi-user MIMO system.
This paper proposes an alternative point of view on the use of ordinal measures to detect near-duplicate web videos. Ordinal measure fingerprints are first extracted in the core area of videos, and ordinal measures ar...
详细信息
ISBN:
(纸本)9781467327626
This paper proposes an alternative point of view on the use of ordinal measures to detect near-duplicate web videos. Ordinal measure fingerprints are first extracted in the core area of videos, and ordinal measures are fast matched based on Transformation distance, and then an asymmetric technique is used to obtain the longest same sub-sequence anddetect video copies. Experimental results show that the method has goodrobustness anddistinctiveness.
暂无评论