首页 > 最新文献

2016 18th International Conference on Advanced Communication Technology (ICACT)最新文献

英文 中文
A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems 为保证工业控制系统传输数据的可靠性和安全性,设计了一种单向安全网关
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423371
Youngjun Heo, Byoung-Koo Kim, Dong-ho Kang, Jungchan Na
Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth strategy can be applied to industrial control systems. It separates control network and business network, and uses a one-way data transmission technology for data transfer between higher security area and lower security area. But most of the current unidirectional security gateway system is just only data transmission without considering the reliability and security. In this paper, to guarantee the reliability and security of transmitted data, we design a unidirectional security gateway system, UNIWAY, which provides forward error correction, session management, packet sequence number, IP/Port filter, content filter, and protocol break.
最近,针对工业控制系统设施的针对性攻击有所增加。为了保护这些设施免受攻击,纵深防御策略可以应用于工业控制系统。它将控制网和业务网分开,采用单向数据传输技术,在高安全区域和低安全区域之间进行数据传输。但目前大多数单向安全网关系统只是单纯的数据传输,没有考虑可靠性和安全性。为了保证传输数据的可靠性和安全性,本文设计了单向安全网关UNIWAY系统,该系统具有前向纠错、会话管理、包序列号、IP/Port过滤、内容过滤和协议破坏等功能。
{"title":"A design of unidirectional security gateway for enforcement reliability and security of transmission data in industrial control systems","authors":"Youngjun Heo, Byoung-Koo Kim, Dong-ho Kang, Jungchan Na","doi":"10.1109/ICACT.2016.7423371","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423371","url":null,"abstract":"Recently, targeted attacks are increased against industrial control system facilities. In order to protect these facilities from attacks, defence-in-depth strategy can be applied to industrial control systems. It separates control network and business network, and uses a one-way data transmission technology for data transfer between higher security area and lower security area. But most of the current unidirectional security gateway system is just only data transmission without considering the reliability and security. In this paper, to guarantee the reliability and security of transmitted data, we design a unidirectional security gateway system, UNIWAY, which provides forward error correction, session management, packet sequence number, IP/Port filter, content filter, and protocol break.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131220425","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
What to name, How to route 取什么名字,怎么走
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423248
Daeyoung Kim
Presents a collection of slides covering the following topics: semantic overloading of IP address; Loc/ID separation; fallacy of IP address; global Internet; flat interior routing; and mapped interior routing.
介绍了一系列涵盖以下主题的幻灯片:IP地址的语义重载;Loc / ID分离;IP地址谬误;全球互联网;平面内走线;并绘制了内部路线。
{"title":"What to name, How to route","authors":"Daeyoung Kim","doi":"10.1109/ICACT.2016.7423248","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423248","url":null,"abstract":"Presents a collection of slides covering the following topics: semantic overloading of IP address; Loc/ID separation; fallacy of IP address; global Internet; flat interior routing; and mapped interior routing.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"97 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132237973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of episodes of mosquito borne disease: Dengue, yellow fever, west nile, and filariasis with decision tree, apriori algorithm 用决策树和先验算法比较蚊媒疾病:登革热、黄热病、西尼罗河和丝虫病的发作
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423430
S. H. Song, Yijeong Choi, Taeseon Yoon
This study focuses on the mosquito borne diseases including dengue-1, dengue-4, yellow fever, west nile virus infection, and filariasis. These are the diseases that are typically shown in the African continent and Eastern Asia, which are the places that suffer from poverty the most. Vaccines for some of the diseases have already been made but the ones who inhabit in those areas do not have the ability to afford it. The research will use 3, 5, 7 windows of decision tree and apriori algorithm. By finding the similarities between the amino acid sequences between these viruses the study to find the curing for all diseases will be in progress. Emerging filariviruses: the spread and resurgence of Japanese encephalitis, West Nile and dengue viruses.
本研究的重点是蚊媒疾病,包括登革热-1、登革热-4、黄热病、西尼罗病毒感染和丝虫病。这些疾病通常出现在非洲大陆和东亚,这些地方是最贫穷的地方。一些疾病的疫苗已经生产出来,但居住在这些地区的人没有能力负担得起。研究将使用决策树的3、5、7个窗口和先验算法。通过发现这些病毒之间氨基酸序列的相似性,寻找治疗所有疾病的研究将会取得进展。新出现的丝状病毒:日本脑炎、西尼罗河病毒和登革热病毒的传播和死灰复燃。
{"title":"Comparison of episodes of mosquito borne disease: Dengue, yellow fever, west nile, and filariasis with decision tree, apriori algorithm","authors":"S. H. Song, Yijeong Choi, Taeseon Yoon","doi":"10.1109/ICACT.2016.7423430","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423430","url":null,"abstract":"This study focuses on the mosquito borne diseases including dengue-1, dengue-4, yellow fever, west nile virus infection, and filariasis. These are the diseases that are typically shown in the African continent and Eastern Asia, which are the places that suffer from poverty the most. Vaccines for some of the diseases have already been made but the ones who inhabit in those areas do not have the ability to afford it. The research will use 3, 5, 7 windows of decision tree and apriori algorithm. By finding the similarities between the amino acid sequences between these viruses the study to find the curing for all diseases will be in progress. Emerging filariviruses: the spread and resurgence of Japanese encephalitis, West Nile and dengue viruses.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126158419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Adaptive spectral co-clustering for multiview data 多视点数据的自适应光谱共聚类
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423426
Jeong-Woo Son, Junekey Jeon, Sang-Yun Lee, Sun-Joong Kim
Spectral clustering is a typical unsupervised machine learning technique and it has widely adopted in various fields. This paper proposes a novel spectral clustering technique to handle the characteristics of multiview data. In the proposed method, co-training approach is adopted in the spectral clustering. When an instance has more than three views, it is difficult to handle different dependencies among views in ordinary co-training. To overcome this, the proposed method reflects these different dependencies among views when the information is propagated in the training phrase. In the experiment, the proposed method is evaluated with the synthetic data whose instances are represented with three views. The proposed method achieves up to 8.25% better ARI (Adjusted Rand Index) than those of five algorithms.
谱聚类是一种典型的无监督机器学习技术,广泛应用于各个领域。本文提出了一种新的光谱聚类技术来处理多视点数据的特征。该方法在谱聚类中采用了协同训练方法。当一个实例有三个以上的视图时,普通的协同训练很难处理视图之间不同的依赖关系。为了克服这个问题,当信息在训练短语中传播时,提出的方法反映了视图之间的这些不同依赖关系。在实验中,用三个视图表示实例的合成数据对所提出的方法进行了评价。与其他5种算法相比,该方法的调整后兰德指数(ARI)提高了8.25%。
{"title":"Adaptive spectral co-clustering for multiview data","authors":"Jeong-Woo Son, Junekey Jeon, Sang-Yun Lee, Sun-Joong Kim","doi":"10.1109/ICACT.2016.7423426","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423426","url":null,"abstract":"Spectral clustering is a typical unsupervised machine learning technique and it has widely adopted in various fields. This paper proposes a novel spectral clustering technique to handle the characteristics of multiview data. In the proposed method, co-training approach is adopted in the spectral clustering. When an instance has more than three views, it is difficult to handle different dependencies among views in ordinary co-training. To overcome this, the proposed method reflects these different dependencies among views when the information is propagated in the training phrase. In the experiment, the proposed method is evaluated with the synthetic data whose instances are represented with three views. The proposed method achieves up to 8.25% better ARI (Adjusted Rand Index) than those of five algorithms.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114538771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Data communication method based on inaudible sound at near field 基于近场不听声的数据通信方法
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423502
Green Bang, Myoungbeom Chung, Il-Ju Ko
In this paper, we proposed data communication method based on inaudible sound which the most people cannot listen to at near field. The proposed method can transmit some bits data as using mixed high frequencies which are mapped at each data bit. Besides, the proposed method increases the accuracy of data transmission as using cyclic redundancy check for prevention of transmission error. To evaluate the performance of the proposed method, we tested with the proposed method and the result showed 97.5% accuracy. Therefore, the proposed method could be applied at various wireless data communication technology fields.
本文提出了一种基于大多数人在近场无法听到的不听声的数据通信方法。该方法可以利用在每个数据位上映射的混合高频传输一些位数据。此外,该方法采用循环冗余校验防止传输错误,提高了数据传输的准确性。为了评价所提方法的性能,我们对所提方法进行了测试,结果显示准确率达到97.5%。因此,该方法可应用于各种无线数据通信技术领域。
{"title":"Data communication method based on inaudible sound at near field","authors":"Green Bang, Myoungbeom Chung, Il-Ju Ko","doi":"10.1109/ICACT.2016.7423502","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423502","url":null,"abstract":"In this paper, we proposed data communication method based on inaudible sound which the most people cannot listen to at near field. The proposed method can transmit some bits data as using mixed high frequencies which are mapped at each data bit. Besides, the proposed method increases the accuracy of data transmission as using cyclic redundancy check for prevention of transmission error. To evaluate the performance of the proposed method, we tested with the proposed method and the result showed 97.5% accuracy. Therefore, the proposed method could be applied at various wireless data communication technology fields.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130656360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance analysis and implementation of a DVB-C2 transceiver DVB-C2收发器的性能分析与实现
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423492
Jaeho Lee, Woongshik You, Jintae Oh, Sang-Jung Ra, Junyoung Jung
This paper depicts a results of field test for an implemented digital video broadcasting for cable system (DVB-C2) transceiver, which has been implemented using field programmable gate arrays (FPGAs). The test results show the physical channel status and performance of the DVB-C2 transceiver, which includes the sampling clock offset (SCO), the frequency offset (FO), the frequency response of the hybrid fiber coax (HFC) channel, the uncoded-bit error rate (BER) before the forward error correction (FEC) decoder, and the BER after the FEC decoder. Since the moving picture exports group-transport stream (MPEG-TS) is received successfully with a raw data rate of 55 Mbps through a commercial in-service HFC network, a high data rate such as ultra-high definition (UHD) can be expected to be serviced. In addition, because the measured uncoded-BER satisfies the requirement of 10-2 uncoded-BER, the implemented DVB-C2 transceiver can support 4096QAM as well as 16384QAM. Therefore, it can be used as a cable modem supporting DVB-C2 and the data-over-cable-service-interface-specifications (DOCSIS) 3.1.
本文介绍了一种采用现场可编程门阵列(fpga)实现的有线数字视频广播系统(DVB-C2)收发器的现场测试结果。测试结果显示了DVB-C2收发器的物理信道状态和性能,包括采样时钟偏移(SCO)、频率偏移(FO)、混合光纤同轴(HFC)信道的频率响应、前向纠错(FEC)解码器前的未编码误码率(BER)和前向纠错(FEC)解码器后的误码率(BER)。由于通过商用HFC网络以55mbps的原始数据速率成功接收了运动图像导出组传输流(MPEG-TS),因此可以期望为超高清(UHD)等高数据速率提供服务。此外,由于测量的无编码误码率满足10-2的无编码误码率要求,因此所实现的DVB-C2收发器可以支持4096QAM和16384QAM。因此,它可以作为支持DVB-C2和DOCSIS (data-over-cable service interface specification) 3.1的电缆调制解调器使用。
{"title":"Performance analysis and implementation of a DVB-C2 transceiver","authors":"Jaeho Lee, Woongshik You, Jintae Oh, Sang-Jung Ra, Junyoung Jung","doi":"10.1109/ICACT.2016.7423492","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423492","url":null,"abstract":"This paper depicts a results of field test for an implemented digital video broadcasting for cable system (DVB-C2) transceiver, which has been implemented using field programmable gate arrays (FPGAs). The test results show the physical channel status and performance of the DVB-C2 transceiver, which includes the sampling clock offset (SCO), the frequency offset (FO), the frequency response of the hybrid fiber coax (HFC) channel, the uncoded-bit error rate (BER) before the forward error correction (FEC) decoder, and the BER after the FEC decoder. Since the moving picture exports group-transport stream (MPEG-TS) is received successfully with a raw data rate of 55 Mbps through a commercial in-service HFC network, a high data rate such as ultra-high definition (UHD) can be expected to be serviced. In addition, because the measured uncoded-BER satisfies the requirement of 10-2 uncoded-BER, the implemented DVB-C2 transceiver can support 4096QAM as well as 16384QAM. Therefore, it can be used as a cable modem supporting DVB-C2 and the data-over-cable-service-interface-specifications (DOCSIS) 3.1.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122893225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Effects of selection of a reference view on quality improvement of hybrid 3DTV 参考视点选择对混合3DTV画质提高的影响
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423427
Min-Suk Bang, Ji-Won Kim, Sung-Hoon Kim, Ki-Doo Kim, Kyeong-Hoon Jung
Conditional replenishment algorithm (CRA) was proposed to improve the quality of a hybrid 3DTV system with mixed resolution. In the hybrid 3DTV system, the role of a reference view is important since not only the overall quality of the hybrid 3DTV depends on the quality of the reference view, but also the reference view directly affects the quality improvement of the hybrid 3DTV using CRA. Moreover, since stereo mismatch between left and right cameras can be occurred, carefully choosing the reference view between the left and right views is very important. In this paper, we observe effects of the selection of a reference view on the quality of a hybrid 3DTV which is improved by CRA.
为了提高混合分辨率的混合3DTV系统的图像质量,提出了条件补充算法(CRA)。在混合3DTV系统中,参考视图的作用非常重要,因为不仅混合3DTV的整体质量取决于参考视图的质量,而且参考视图的质量直接影响使用CRA的混合3DTV的质量提高。此外,由于左右相机之间可能出现立体不匹配,因此在左右视图之间仔细选择参考视图非常重要。在本文中,我们观察了参考视图的选择对CRA改进的混合3DTV质量的影响。
{"title":"Effects of selection of a reference view on quality improvement of hybrid 3DTV","authors":"Min-Suk Bang, Ji-Won Kim, Sung-Hoon Kim, Ki-Doo Kim, Kyeong-Hoon Jung","doi":"10.1109/ICACT.2016.7423427","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423427","url":null,"abstract":"Conditional replenishment algorithm (CRA) was proposed to improve the quality of a hybrid 3DTV system with mixed resolution. In the hybrid 3DTV system, the role of a reference view is important since not only the overall quality of the hybrid 3DTV depends on the quality of the reference view, but also the reference view directly affects the quality improvement of the hybrid 3DTV using CRA. Moreover, since stereo mismatch between left and right cameras can be occurred, carefully choosing the reference view between the left and right views is very important. In this paper, we observe effects of the selection of a reference view on the quality of a hybrid 3DTV which is improved by CRA.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122158772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Your neighbors are my spies: Location and other privacy concerns in dating apps 你的邻居是我的间谍:约会软件中的位置和其他隐私问题
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423532
Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa
Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to pinpoint the victim's position. As a countermeasure, most of location-based applications have already implemented the "hide distance" function to protect their user's location privacy. The effectiveness of such approach however is still questionable. Therefore, in this paper, we first investigate how popular location-based dating applications are currently protecting their user's privacy by testing the two most popular GLBT-focused applications: Jack'd and Grindr. As one of our findings, we then demonstrate how an adversary can still figure out the location of the targeted victim even when the "hide distance" function is enabled. Our threat model is simply an enhanced version of the trilateration model. Without using sophisticated hacking tools or complex attack techniques, the model is still very effective and efficient at locating the targeted victim, and of course in a so-called "legal" manner since we only utilize the information that can be obtained just as same as any other ordinary user. In addition, we also introduce a potential side channel attack fashion due to the current design of Jack'd. Our study thus raises an urgent alarm to those location-based applications' users in general, and especially to those GLBT-focused dating application's users about their privacy. Finally, the paper concludes by suggesting some possible solutions from the viewpoints of both the provider and the user considering the implementation cost and the trade-off of utility.
在基于位置的应用程序(又名:基于位置的服务或LBS)中,Trilateration已经成为众所周知的威胁用户位置隐私的模型之一,特别是那些包含高度敏感信息的应用程序,如约会应用程序。威胁模型主要依靠从目标受害者到对手显示的距离来精确定位受害者的位置。作为应对措施,大多数基于位置的应用程序都已经实现了“隐藏距离”功能,以保护用户的位置隐私。然而,这种方法的有效性仍然值得怀疑。因此,在本文中,我们首先通过测试两个最流行的glbt应用程序:Jack'd和Grindr,来调查当前流行的基于位置的约会应用程序是如何保护用户隐私的。作为我们的发现之一,我们随后演示了即使启用了“隐藏距离”功能,攻击者仍然可以找出目标受害者的位置。我们的威胁模型只是三角模型的增强版。在没有使用复杂的黑客工具或复杂的攻击技术的情况下,该模型在定位目标受害者方面仍然非常有效和高效,当然是以所谓的“合法”方式,因为我们只利用与任何其他普通用户一样可以获得的信息。此外,由于Jack'd的当前设计,我们还引入了一种潜在的侧信道攻击方式。因此,我们的研究给那些基于位置的应用程序的用户敲响了警钟,尤其是那些关注lgbt约会应用程序的用户,提醒他们注意自己的隐私。最后,本文从供应商和用户的角度出发,考虑实施成本和效用权衡,提出了一些可能的解决方案。
{"title":"Your neighbors are my spies: Location and other privacy concerns in dating apps","authors":"Nguyen Phong Hoang, Yasuhito Asano, Masatoshi Yoshikawa","doi":"10.1109/ICACT.2016.7423532","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423532","url":null,"abstract":"Trilateration has recently become one of the well-known threat models to the user's location privacy in location-based applications (aka: location-based services or LBS), especially those containing highly sensitive information such as dating applications. The threat model mainly depends on the distance shown from the targeted victim to the adversary to pinpoint the victim's position. As a countermeasure, most of location-based applications have already implemented the \"hide distance\" function to protect their user's location privacy. The effectiveness of such approach however is still questionable. Therefore, in this paper, we first investigate how popular location-based dating applications are currently protecting their user's privacy by testing the two most popular GLBT-focused applications: Jack'd and Grindr. As one of our findings, we then demonstrate how an adversary can still figure out the location of the targeted victim even when the \"hide distance\" function is enabled. Our threat model is simply an enhanced version of the trilateration model. Without using sophisticated hacking tools or complex attack techniques, the model is still very effective and efficient at locating the targeted victim, and of course in a so-called \"legal\" manner since we only utilize the information that can be obtained just as same as any other ordinary user. In addition, we also introduce a potential side channel attack fashion due to the current design of Jack'd. Our study thus raises an urgent alarm to those location-based applications' users in general, and especially to those GLBT-focused dating application's users about their privacy. Finally, the paper concludes by suggesting some possible solutions from the viewpoints of both the provider and the user considering the implementation cost and the trade-off of utility.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115960588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Model networks for Internet of Things and SDN 物联网和SDN的网络模型
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423280
R. Kirichek, A. Vladyko, Maxim Zakharov, A. Koucheryavy
The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network, created on the basis of the Laboratory of the Internet of Things in the State University of Telecommunication and a description of features of the network for a comprehensive research of the Internet of Things.
模型网络在测试ngn服务中得到了广泛的应用。目前,在电信领域,物联网(IoT)的概念被广泛认为是一个关键。在这方面,建议使用经批准的方法来测试基于模型网络的物联网设备和应用。本文介绍了在国家电信大学物联网实验室的基础上创建的模型网络的结构,并描述了网络的特征,以进行物联网的综合研究。
{"title":"Model networks for Internet of Things and SDN","authors":"R. Kirichek, A. Vladyko, Maxim Zakharov, A. Koucheryavy","doi":"10.1109/ICACT.2016.7423280","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423280","url":null,"abstract":"The Model Networks have found widespread implementation in testing NGN-services. Currently, in a telecommunication sphere the concept of the Internet of Things (IoT) is widely recognized as a key. In this connection, it is advisable to use an approved approach for testing devices and applications of the Internet of Things based on model networks. The article presents the structure of the model network, created on the basis of the Laboratory of the Internet of Things in the State University of Telecommunication and a description of features of the network for a comprehensive research of the Internet of Things.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127398379","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
SDR-based frequency interference analysis test-bed considering time domain characteristics of interferer 考虑干扰时域特性的基于sdr的频率干扰分析试验台
Pub Date : 2016-03-03 DOI: 10.1109/ICACT.2016.7423453
Jin-Soo Park, H. Yoon, Byung-Jun Jang
In this paper, we suggested a software-defined radio (SDR)-based frequency interference analysis test-bed designed to consider both frequency and time domain characteristics of the interferer. Due to the versatile programming capability of universal software radio peripheral (USRP) and LabVIEW, performance degradation effects of victim receiver due to various interferer's parameters in both frequency and time domain can be analyzed intuitively. As an example, we demonstrated a frequency interference scenario consisting of Zigbee as a victim and three Wi-Fi nodes as interferers. From the measured results, it was verified that our test-bed can analyze easily actual interference environments in both frequency and time domain.
在本文中,我们提出了一个基于软件定义无线电(SDR)的频率干扰分析试验台,该试验台同时考虑了干扰的频域和时域特性。由于通用软件无线电外设(USRP)和LabVIEW的通用编程能力,可以直观地分析各种干扰参数在频域和时域上对受害接收机性能的影响。作为示例,我们演示了一个频率干扰场景,其中Zigbee是受害者,三个Wi-Fi节点是干扰者。实测结果表明,该试验台能够在频域和时域上方便地分析实际干扰环境。
{"title":"SDR-based frequency interference analysis test-bed considering time domain characteristics of interferer","authors":"Jin-Soo Park, H. Yoon, Byung-Jun Jang","doi":"10.1109/ICACT.2016.7423453","DOIUrl":"https://doi.org/10.1109/ICACT.2016.7423453","url":null,"abstract":"In this paper, we suggested a software-defined radio (SDR)-based frequency interference analysis test-bed designed to consider both frequency and time domain characteristics of the interferer. Due to the versatile programming capability of universal software radio peripheral (USRP) and LabVIEW, performance degradation effects of victim receiver due to various interferer's parameters in both frequency and time domain can be analyzed intuitively. As an example, we demonstrated a frequency interference scenario consisting of Zigbee as a victim and three Wi-Fi nodes as interferers. From the measured results, it was verified that our test-bed can analyze easily actual interference environments in both frequency and time domain.","PeriodicalId":125854,"journal":{"name":"2016 18th International Conference on Advanced Communication Technology (ICACT)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128864940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2016 18th International Conference on Advanced Communication Technology (ICACT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1