首页 > 最新文献

2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)最新文献

英文 中文
The information environment for the integrated life cycle model of configurable information system 可配置信息系统集成生命周期模型的信息环境
Y. Rogozov, A. Sviridov, A. Degtyarev
The Integrated Life Cycle Model demands presence of the information environment which combines in it functions on storage of a subject domain description, a configuration of system and a user data. The given information environment is based on the Structure-Independent Database operated by Database Management System. Using of the Integrating Information Environment allows to raise information systems flexibility, to lower expenses and terms for developing, to refuse the Relational approach to databases design. In the article requirements to the Integrating Information Environment are stated. The analysis of matrix representation of entities and their sets in Relational model and Entity-Attribute-Value model is made. The Integrating Information Environment and realization of a Structure-Independent Database is described.
集成生命周期模型需要信息环境的存在,该信息环境结合了主题领域描述、系统配置和用户数据的存储功能。给定的信息环境是基于数据库管理系统运行的与结构无关的数据库。使用集成信息环境可以提高信息系统的灵活性,降低开发费用和条件,拒绝使用关系型方法进行数据库设计。本文阐述了对集成信息环境的要求。分析了关系模型和实体-属性-值模型中实体及其集合的矩阵表示。介绍了集成信息环境和结构无关数据库的实现。
{"title":"The information environment for the integrated life cycle model of configurable information system","authors":"Y. Rogozov, A. Sviridov, A. Degtyarev","doi":"10.1109/ICAICT.2014.7035918","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035918","url":null,"abstract":"The Integrated Life Cycle Model demands presence of the information environment which combines in it functions on storage of a subject domain description, a configuration of system and a user data. The given information environment is based on the Structure-Independent Database operated by Database Management System. Using of the Integrating Information Environment allows to raise information systems flexibility, to lower expenses and terms for developing, to refuse the Relational approach to databases design. In the article requirements to the Integrating Information Environment are stated. The analysis of matrix representation of entities and their sets in Relational model and Entity-Attribute-Value model is made. The Integrating Information Environment and realization of a Structure-Independent Database is described.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124856323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cognitive analysis of relations between concepts of the problem area (the example of a small enterprise) 问题领域概念之间关系的认知分析(以小型企业为例)
O. Luchko, V. Marenko
The paper describes the process of cognitive maps construction of various degrees of detailisation using the example of a small enterprise problem area. The generalizing hierarchical cognitive map as a 3D-model of the problem area was presented. Cognitive structuring of the problem area illustrating the existence of relations between basic factors was displayed. Cognitive parameterization and coordination of expert estimations of the basic factors interconnections using the mathematical statistics tools were carried out. The process of automation of data processing and presentation of the studied problem area were implemented. The cognitive model of relations control affecting profit growth was formed. As a result of simulated experiment and the empirical results analysis, the main controlling relation between the "Personnel" and the "Profit" factors was revealed. Experiments were conducted to determine the intellectual parameters of a small enterprise employees and labor capacity. The labor capacity as a function of intellectual indicators of the personnel using a linguistic variable was revealed.
本文以某小型企业问题域为例,描述了不同细节化程度的认知地图构建过程。提出了问题区域的三维模型——泛化层次认知图。显示了问题域的认知结构,说明了基本因素之间存在关系。利用数理统计工具对基本因素互连进行了认知参数化和协调专家估计。实现了数据处理的自动化过程和所研究问题域的呈现。形成了关系控制影响利润增长的认知模型。通过模拟实验和实证结果分析,揭示了“人员”与“利润”因素之间的主要控制关系。通过实验确定了某小型企业员工的智力参数和劳动能力。使用语言变量揭示了劳动能力作为人员智力指标的函数。
{"title":"Cognitive analysis of relations between concepts of the problem area (the example of a small enterprise)","authors":"O. Luchko, V. Marenko","doi":"10.1109/ICAICT.2014.7035942","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035942","url":null,"abstract":"The paper describes the process of cognitive maps construction of various degrees of detailisation using the example of a small enterprise problem area. The generalizing hierarchical cognitive map as a 3D-model of the problem area was presented. Cognitive structuring of the problem area illustrating the existence of relations between basic factors was displayed. Cognitive parameterization and coordination of expert estimations of the basic factors interconnections using the mathematical statistics tools were carried out. The process of automation of data processing and presentation of the studied problem area were implemented. The cognitive model of relations control affecting profit growth was formed. As a result of simulated experiment and the empirical results analysis, the main controlling relation between the \"Personnel\" and the \"Profit\" factors was revealed. Experiments were conducted to determine the intellectual parameters of a small enterprise employees and labor capacity. The labor capacity as a function of intellectual indicators of the personnel using a linguistic variable was revealed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126770461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distance education application architecture and cloud computing 远程教育应用架构与云计算
M. Akçay, Hasan Armutlu
Distance education systems, initially perceived as a knowledge management system and knowledge management system in the preparation of distance education applications architectures have been used. However, students in the distance education system modules, tutorials, modules, such as the adequacy of student assessment and tutorial are many human factors. This application architectures and algorithms used in distance education because they are not flexible enough to be applied to these factors, they are forced to respond. Distance education systems must be more flexible and re-configurable. Cloud computing, which is based on sharing knowledge and equipment, services to gather under a single roof instead of offering a solution for each service is an information technology. Cloud computing technologies, more flexible compared to conventional information technology, can be updated quickly and are innovative. Distance education system through the use of cloud computing in addressing the needs of distance education is emerging architectures and algorithms. In this paper, application architecture according to the distance education system will be created. This application architecture will be utilized when creating cloud services and these services will be studied harmony with each other.
远程教育系统最初被认为是知识管理系统,而知识管理系统在远程教育应用体系结构的编制中已被使用。然而,在远程教育系统中,学生模块、辅导模块、学生评估和辅导模块的充分性等都受到许多人为因素的影响。这种应用架构和算法在远程教育中使用,因为它们不够灵活,不能应用于这些因素,它们被迫做出反应。远程教育系统必须更加灵活和可重新配置。云计算是一种信息技术,它以共享知识和设备为基础,在一个屋檐下收集服务,而不是为每项服务提供解决方案。与传统信息技术相比,云计算技术更加灵活,可以快速更新,具有创新性。远程教育系统通过使用云计算来解决远程教育的需求是新兴的体系结构和算法。本文将根据远程教育系统的特点,创建应用程序体系结构。在创建云服务时将使用此应用程序体系结构,并对这些服务进行相互协调的研究。
{"title":"Distance education application architecture and cloud computing","authors":"M. Akçay, Hasan Armutlu","doi":"10.1109/ICAICT.2014.7036014","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7036014","url":null,"abstract":"Distance education systems, initially perceived as a knowledge management system and knowledge management system in the preparation of distance education applications architectures have been used. However, students in the distance education system modules, tutorials, modules, such as the adequacy of student assessment and tutorial are many human factors. This application architectures and algorithms used in distance education because they are not flexible enough to be applied to these factors, they are forced to respond. Distance education systems must be more flexible and re-configurable. Cloud computing, which is based on sharing knowledge and equipment, services to gather under a single roof instead of offering a solution for each service is an information technology. Cloud computing technologies, more flexible compared to conventional information technology, can be updated quickly and are innovative. Distance education system through the use of cloud computing in addressing the needs of distance education is emerging architectures and algorithms. In this paper, application architecture according to the distance education system will be created. This application architecture will be utilized when creating cloud services and these services will be studied harmony with each other.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115106830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polyalphabetic Euclidean ciphers 多字母欧几里得密码
V. D. Ten, Aizhan B. Dyussenbina
First, we prove a fundamental theorem which describes some properties of elements of Euclidean rings. This theorem allows us to construct an infinite family of cryptosystems, among which there are cryptosystems without repetitions. This means that the encryption algorithm can encrypt any text so that all symbols after encryption are different. Therefore, methods of statistic analysis cannot be used against our cryptosystems even theoretically.
首先,我们证明了描述欧几里得环元素的一些性质的一个基本定理。这个定理允许我们构造一个无限族的密码系统,其中存在没有重复的密码系统。这意味着加密算法可以加密任何文本,使得加密后的所有符号都不一样。因此,即使从理论上讲,统计分析方法也不能用于我们的密码系统。
{"title":"Polyalphabetic Euclidean ciphers","authors":"V. D. Ten, Aizhan B. Dyussenbina","doi":"10.1109/ICAICT.2014.7035909","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035909","url":null,"abstract":"First, we prove a fundamental theorem which describes some properties of elements of Euclidean rings. This theorem allows us to construct an infinite family of cryptosystems, among which there are cryptosystems without repetitions. This means that the encryption algorithm can encrypt any text so that all symbols after encryption are different. Therefore, methods of statistic analysis cannot be used against our cryptosystems even theoretically.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114273559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Computer simulation of conformational behaviour of human and rat/mouse hemokinin-1 molecules 人类和大鼠/小鼠血红素-1分子构象行为的计算机模拟
U. Agaeva, G. Agaeva, N. Godjaev
The conformational properties of biologically active human and mouse/rat hemokinin-1 peptide molecules have been investigated by computer modeling methods. It is showed that both molecule can exist in several stable conformational states. The energy and geometrical parameters for each of low-energy conformations of molecules are obtained. The conformationally rigid and labile segments of both molecules were revealed.
利用计算机建模方法研究了具有生物活性的人和小鼠/大鼠血红素-1肽分子的构象特性。结果表明,这两种分子都能以几种稳定的构象状态存在。得到了分子每一种低能构象的能量和几何参数。揭示了两种分子的构象刚性段和不稳定段。
{"title":"Computer simulation of conformational behaviour of human and rat/mouse hemokinin-1 molecules","authors":"U. Agaeva, G. Agaeva, N. Godjaev","doi":"10.1109/ICAICT.2014.7035993","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035993","url":null,"abstract":"The conformational properties of biologically active human and mouse/rat hemokinin-1 peptide molecules have been investigated by computer modeling methods. It is showed that both molecule can exist in several stable conformational states. The energy and geometrical parameters for each of low-energy conformations of molecules are obtained. The conformationally rigid and labile segments of both molecules were revealed.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"123 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129552798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective algorithms and methods for automatic number plate recognition 车牌自动识别的有效算法与方法
Amirgaliyev Beibut, Kairanbay Magzhan, Kenshimov Chingiz
Nowadays, an automatic number plate recognition (ANPR) system is a key aspect in traffic congestion. This will help to minimize the different kind of violations on the road. Advanced systems for tracking and identifying stolen, unauthorized vehicles are based on automated number plate recognition technology. This paper's main objectives are to review other methods and propose our own algorithm. A short review is performed on the various methods of number plate recognition algorithms. Further explanations of the proposed algorithm are illustrated in graphical forms to show how the algorithm works. This paper concluded with tests and evaluation results.
车牌自动识别系统是当前解决交通拥堵问题的关键。这将有助于减少道路上不同类型的违规行为。追踪和识别被盗车辆的先进系统是基于自动车牌识别技术。本文的主要目的是回顾其他方法,并提出自己的算法。简要回顾了车牌识别算法的各种方法。所提出的算法的进一步解释以图形形式说明,以显示算法如何工作。最后给出了试验和评价结果。
{"title":"Effective algorithms and methods for automatic number plate recognition","authors":"Amirgaliyev Beibut, Kairanbay Magzhan, Kenshimov Chingiz","doi":"10.1109/ICAICT.2014.7035951","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035951","url":null,"abstract":"Nowadays, an automatic number plate recognition (ANPR) system is a key aspect in traffic congestion. This will help to minimize the different kind of violations on the road. Advanced systems for tracking and identifying stolen, unauthorized vehicles are based on automated number plate recognition technology. This paper's main objectives are to review other methods and propose our own algorithm. A short review is performed on the various methods of number plate recognition algorithms. Further explanations of the proposed algorithm are illustrated in graphical forms to show how the algorithm works. This paper concluded with tests and evaluation results.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128282272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Towards integration of risk-driven and evidence-driven information security measurement 迈向整合风险驱动与证据驱动的资讯安全测量
R. Savola
Carefully designed information security metrics enable informed and effective decision making. However, the current state of the art of developing security metrics is not sufficiently advanced. A major challenge is that typically the risk-driven (top-down modelling) and evidence-driven (bottom-up monitoring) metrics approaches are not aligned, and often used separately. Consequently, it is not possible to understand the impact of monitored evidence to actual security risk. A crosscut model for risk-driven and evidence-driven security metrology is needed. We analyze the concepts needed to be able to integrate these two main approaches.
精心设计的信息安全度量标准可以实现明智和有效的决策制定。然而,开发安全度量的技术的当前状态还不够先进。一个主要的挑战是,风险驱动(自上而下的建模)和证据驱动(自下而上的监控)度量方法通常是不一致的,并且经常单独使用。因此,不可能理解监控证据对实际安全风险的影响。风险驱动和证据驱动的安全计量需要一个横切模型。我们分析了能够集成这两种主要方法所需的概念。
{"title":"Towards integration of risk-driven and evidence-driven information security measurement","authors":"R. Savola","doi":"10.1109/ICAICT.2014.7035903","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035903","url":null,"abstract":"Carefully designed information security metrics enable informed and effective decision making. However, the current state of the art of developing security metrics is not sufficiently advanced. A major challenge is that typically the risk-driven (top-down modelling) and evidence-driven (bottom-up monitoring) metrics approaches are not aligned, and often used separately. Consequently, it is not possible to understand the impact of monitored evidence to actual security risk. A crosscut model for risk-driven and evidence-driven security metrology is needed. We analyze the concepts needed to be able to integrate these two main approaches.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126791418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Barriers facing the diffusion of innovation in ICT sector in Sudan 苏丹信息通信技术部门创新传播面临的障碍
N. Nada, N. Gaylani, Abusflan Elgelany
In this paper we investigate the barriers that affect the ICT deployment and innovation in SUDAN. This is done in this step by consulting and interviewing the major focus group which is affecting and affected by the ICT deployment in SUDAN, several brain storming was done and found that there are many interrelated barriers in different fields but all together have a negative impact on the diffusion innovation in ICT sector. These barriers are identified and our contribution is formed in steps that would be followed to overcome the barriers.
在本文中,我们研究了影响苏丹ICT部署和创新的障碍。在此步骤中,我们会咨询并访谈影响及受苏丹资讯及通讯技术部署影响的主要焦点团体,我们进行了几次头脑风暴,发现不同领域存在许多相互关联的障碍,但这些障碍加在一起会对资讯及通讯技术部门的传播创新产生负面影响。这些障碍是确定的,我们的贡献是在克服这些障碍的步骤中形成的。
{"title":"Barriers facing the diffusion of innovation in ICT sector in Sudan","authors":"N. Nada, N. Gaylani, Abusflan Elgelany","doi":"10.1109/ICAICT.2014.7035980","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035980","url":null,"abstract":"In this paper we investigate the barriers that affect the ICT deployment and innovation in SUDAN. This is done in this step by consulting and interviewing the major focus group which is affecting and affected by the ICT deployment in SUDAN, several brain storming was done and found that there are many interrelated barriers in different fields but all together have a negative impact on the diffusion innovation in ICT sector. These barriers are identified and our contribution is formed in steps that would be followed to overcome the barriers.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126814135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Contaminant and foreign fiber detection in cotton using Gaussian mixture model 用高斯混合模型检测棉花中的污染物和外来纤维
K. A. Peker, Gokhan Ozsan
Cotton is a very important material used in producing many fabric types. Contaminants from various sources need to be removed from cotton before fibers can be spun into yarn. Contaminants critically affect the quality of the yarn produced; any foreign material may result in unacceptable yarn or fabric, or even cause damage to the production machines. Automatic detection and removal of foreign fibers and contaminants in cotton is an essential technology for the modern textile industry. Various image processing and computer vision techniques have been proposed for the detection of foreign materials in cotton fibers. We describe a detection method using Gaussian mixture models and thresholding based on pixel probabilities. The proposed method gives promising results.
棉花是一种非常重要的材料,用于生产许多类型的织物。在将纤维纺成纱线之前,需要从棉花中去除各种来源的污染物。污染物严重影响纱线的质量;任何异物都可能导致纱线或织物不合格,甚至导致生产机器损坏。自动检测和去除棉花中的外来纤维和污染物是现代纺织工业的一项重要技术。人们提出了各种图像处理和计算机视觉技术来检测棉纤维中的异物。我们描述了一种基于高斯混合模型和基于像素概率阈值的检测方法。该方法取得了令人满意的结果。
{"title":"Contaminant and foreign fiber detection in cotton using Gaussian mixture model","authors":"K. A. Peker, Gokhan Ozsan","doi":"10.1109/ICAICT.2014.7035922","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035922","url":null,"abstract":"Cotton is a very important material used in producing many fabric types. Contaminants from various sources need to be removed from cotton before fibers can be spun into yarn. Contaminants critically affect the quality of the yarn produced; any foreign material may result in unacceptable yarn or fabric, or even cause damage to the production machines. Automatic detection and removal of foreign fibers and contaminants in cotton is an essential technology for the modern textile industry. Various image processing and computer vision techniques have been proposed for the detection of foreign materials in cotton fibers. We describe a detection method using Gaussian mixture models and thresholding based on pixel probabilities. The proposed method gives promising results.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121519127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Combined side-channel attacks on COMP128 对COMP128的联合侧信道攻击
A. Levina, Mikhail Korovkin, D. Sleptsova
Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using up to 1000 queries. Proposed method - combined side-channel attack - can speed up key retrieving. Partitioning attack measures only power consumption, while it can be combined with timing attack, fault injection or probing attack. Study of combination with timing attack shows that it will be the least effective variant, because used in COMP128 operations are not vulnerable to timing attack. Probing attack gives way more opportunities as it is invasive attack. Increased number of rounds that can be monitored give 8-time speed gain. However, best combination of non-invasive execution and efficiency is fault injection attack. This combination gives the opportunity of power measurement on each round and reduces quantity of needed queries by 8 times as well. Despite the increased speed of the attack, defence against combined attacks comes down to defence against the weakest component.
GSM网络中的身份验证使用的是COMP128,容易受到侧信道攻击,即分区攻击。在资源受限的设备(如sim卡)上,表查找非常不可靠,因此可以使用多达1000个查询来执行攻击。提出的联合侧信道攻击方法可以提高密钥检索速度。分区攻击仅衡量功耗,可与定时攻击、故障注入或探测攻击相结合。结合时序攻击的研究表明,它将是最无效的变体,因为在COMP128中使用的操作不容易受到时序攻击。探测攻击提供了更多的机会,因为它是侵入性攻击。增加了可以监控的回合数,速度增加了8倍。然而,非侵入性执行和效率的最佳结合是故障注入攻击。这种组合为每个回合提供了功率测量的机会,并将所需查询的数量减少了8倍。尽管提高了攻击速度,但防御组合攻击归结为防御最弱的部分。
{"title":"Combined side-channel attacks on COMP128","authors":"A. Levina, Mikhail Korovkin, D. Sleptsova","doi":"10.1109/ICAICT.2014.7035902","DOIUrl":"https://doi.org/10.1109/ICAICT.2014.7035902","url":null,"abstract":"Authentication in GSM networks uses COMP128, which is vulnerable to side-channel attack called partitioning attack. On the device constrained in resources, such as SIM-card, table lookups are quite unreliable, so the attack can be carried out using up to 1000 queries. Proposed method - combined side-channel attack - can speed up key retrieving. Partitioning attack measures only power consumption, while it can be combined with timing attack, fault injection or probing attack. Study of combination with timing attack shows that it will be the least effective variant, because used in COMP128 operations are not vulnerable to timing attack. Probing attack gives way more opportunities as it is invasive attack. Increased number of rounds that can be monitored give 8-time speed gain. However, best combination of non-invasive execution and efficiency is fault injection attack. This combination gives the opportunity of power measurement on each round and reduces quantity of needed queries by 8 times as well. Despite the increased speed of the attack, defence against combined attacks comes down to defence against the weakest component.","PeriodicalId":103329,"journal":{"name":"2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121695891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2014 IEEE 8th International Conference on Application of Information and Communication Technologies (AICT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1