首页 > 最新文献

Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)最新文献

英文 中文
Blind equalization of short burst signals based on twin support vector regressor and data-reusing method 基于双支持向量回归和数据重用方法的短突发信号盲均衡
Ling Yang, Y. Fu, Zhifen Yang, Yanyan Wei
In this paper, blind equalization of short burst signals is formulated with the twin support vector regressor (TSVR) framework. The proposed algorithm combine the conventional cost function of TSVR with classical error function applied to blind equalization: the Godard's error function that describes the relationship between the input signals and the desired output signals of a blind equalizer is contained in the penalty terms of TSVR, and the iterative re-weighted least square (IRWLS) algorithm is used for twin support vector regressor to achieve fast convergence. In addition, it utilizes the data-reusing method for small amounts of data samples to reach stable convergence. Simulation experiments for constant modulus signals are done to prove the feasibility and validity of the proposed algorithm.
本文利用双支持向量回归器(TSVR)框架建立了短突发信号的盲均衡。该算法将传统的TSVR代价函数与用于盲均衡的经典误差函数相结合,将描述盲均衡器输入信号与期望输出信号之间关系的Godard误差函数包含在TSVR的惩罚项中,采用迭代重加权最小二乘(IRWLS)算法作为双支持向量回归器实现快速收敛。此外,它还利用少量数据样本的数据重用方法来达到稳定收敛。对恒模信号进行了仿真实验,验证了该算法的可行性和有效性。
{"title":"Blind equalization of short burst signals based on twin support vector regressor and data-reusing method","authors":"Ling Yang, Y. Fu, Zhifen Yang, Yanyan Wei","doi":"10.1109/ICCCNT.2014.6963089","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963089","url":null,"abstract":"In this paper, blind equalization of short burst signals is formulated with the twin support vector regressor (TSVR) framework. The proposed algorithm combine the conventional cost function of TSVR with classical error function applied to blind equalization: the Godard's error function that describes the relationship between the input signals and the desired output signals of a blind equalizer is contained in the penalty terms of TSVR, and the iterative re-weighted least square (IRWLS) algorithm is used for twin support vector regressor to achieve fast convergence. In addition, it utilizes the data-reusing method for small amounts of data samples to reach stable convergence. Simulation experiments for constant modulus signals are done to prove the feasibility and validity of the proposed algorithm.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124316206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Survey on scheduling in hybrid clouds 混合云中的调度研究
Nitish Chopra, Sarbjeet Singh
Cloud computing provides infinite access to on demand resources, this is true in case of public clouds but not in case of private clouds. As public cloud charges on usage basis, private clouds are owned by user. Composition of private and public cloud is known as hybrid cloud. In hybrid cloud task scheduling is a complex process as jobs can be allocated either in private cloud or public cloud. Deciding which resource should be taken on lease from public cloud into private cloud to complete the task is decided by number of scheduling algorithms. In this paper, we look at the various scheduling techniques and algorithms that are used in hybrid cloud and these are classified according to their optimization criteria and features provided by them. This paper is composed of five parts as introduction, scheduling process in hybrid clouds, types of scheduling techniques with their classification, execution cost parameter and conclusion is given in the end.
云计算提供了对随需应变资源的无限访问,这在公共云中是正确的,但在私有云中不是。公有云按使用收费,私有云由用户拥有。私有云和公共云的组合被称为混合云。在混合云中,任务调度是一个复杂的过程,因为作业可以在私有云中分配,也可以在公共云中分配。决定应该将哪些资源从公共云租借到私有云以完成任务是由调度算法的数量决定的。在本文中,我们研究了混合云中使用的各种调度技术和算法,并根据它们提供的优化标准和特性对它们进行了分类。本文由绪论、混合云中的调度过程、调度技术的类型及其分类、执行成本参数等五个部分组成,最后给出了结论。
{"title":"Survey on scheduling in hybrid clouds","authors":"Nitish Chopra, Sarbjeet Singh","doi":"10.1109/ICCCNT.2014.6963050","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963050","url":null,"abstract":"Cloud computing provides infinite access to on demand resources, this is true in case of public clouds but not in case of private clouds. As public cloud charges on usage basis, private clouds are owned by user. Composition of private and public cloud is known as hybrid cloud. In hybrid cloud task scheduling is a complex process as jobs can be allocated either in private cloud or public cloud. Deciding which resource should be taken on lease from public cloud into private cloud to complete the task is decided by number of scheduling algorithms. In this paper, we look at the various scheduling techniques and algorithms that are used in hybrid cloud and these are classified according to their optimization criteria and features provided by them. This paper is composed of five parts as introduction, scheduling process in hybrid clouds, types of scheduling techniques with their classification, execution cost parameter and conclusion is given in the end.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125143473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Extending self-organizing network availability using genetic algorithm 利用遗传算法扩展自组织网络的可用性
M. Elhoseny, Xiaohui Yuan, H. K. El-Minir, A. Riad
In this paper, we propose a novel method based on genetic algorithm for constructing the wireless sensor network to extend its functionality and availability. In our proposed method, the structure of the network is dynamically decided and the organization differs after each message transmission round. With the goal of optimizing the lifespan of the entire network, genetic algorithm is employed to search for the most suitable sensor nodes as the cluster heads to relay the messages to base station. Using the chosen cluster heads, sensor clusters are formed that minimize the total inner cluster node-to-cluster head distance. Compared with eight other methods, our experimental results demonstrated that our proposed method greatly extended the network life. The network life improvement rate with respect to the second best cases is in the range of 13% to 43.44%. In each transmission round, the remaining energy of sensor nodes are fairly even with some fluctuations. That is, as a consequence of our proposed method, the variance among remaining energy is quite low, which implies that the sensor nodes shared the burden of relaying messages and, hence, elongated the overall network life.
本文提出了一种基于遗传算法构建无线传感器网络的新方法,以扩展其功能和可用性。在该方法中,网络的结构是动态确定的,并且在每一轮消息传输之后,网络的组织都是不同的。以优化整个网络的寿命为目标,采用遗传算法寻找最合适的传感器节点作为簇头,将报文转发给基站。使用选择的簇头,形成传感器簇,使簇内节点到簇头的总距离最小。实验结果表明,与其他八种方法相比,我们提出的方法大大延长了网络寿命。相对于第二好的情况,网络寿命改善率在13%到43.44%之间。在每一轮传输中,传感器节点的剩余能量相当均匀,存在一定的波动。也就是说,由于我们提出的方法,剩余能量之间的方差非常低,这意味着传感器节点分担了中继消息的负担,从而延长了整个网络的寿命。
{"title":"Extending self-organizing network availability using genetic algorithm","authors":"M. Elhoseny, Xiaohui Yuan, H. K. El-Minir, A. Riad","doi":"10.1109/ICCCNT.2014.6963059","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963059","url":null,"abstract":"In this paper, we propose a novel method based on genetic algorithm for constructing the wireless sensor network to extend its functionality and availability. In our proposed method, the structure of the network is dynamically decided and the organization differs after each message transmission round. With the goal of optimizing the lifespan of the entire network, genetic algorithm is employed to search for the most suitable sensor nodes as the cluster heads to relay the messages to base station. Using the chosen cluster heads, sensor clusters are formed that minimize the total inner cluster node-to-cluster head distance. Compared with eight other methods, our experimental results demonstrated that our proposed method greatly extended the network life. The network life improvement rate with respect to the second best cases is in the range of 13% to 43.44%. In each transmission round, the remaining energy of sensor nodes are fairly even with some fluctuations. That is, as a consequence of our proposed method, the variance among remaining energy is quite low, which implies that the sensor nodes shared the burden of relaying messages and, hence, elongated the overall network life.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126890939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
The secret image sharing scheme based on improved LSB algorithm 基于改进LSB算法的秘密图像共享方案
Xiaohong Li, Yuan Chen, Feng Wang, Tao Qinqin
Secret sharing is a very important branch in the field of modern cryptography. Secret image sharing technology is the expansion of secret sharing in terms of image. When using this technology to share images, it can ensure the integrity and security of the image. In this paper, secret image used random shadow image which is generated from (t, n) threshold secret image sharing scheme. This paper adopted improved method of LSB to hide the secrets in n meaningful cover images that were provided randomly, which reflected good invisibility, then compared the level of similarity of extracted watermark and original watermark, and eventually got good effects. Finally, we made noise and cutting attack, which illustrated that the scheme has good robustness.
秘密共享是现代密码学领域中一个非常重要的分支。秘密图像共享技术是秘密共享在图像方面的扩展。在使用该技术进行图像共享时,可以保证图像的完整性和安全性。本文的秘密图像采用(t, n)阈值秘密图像共享方案生成的随机阴影图像。本文采用改进的LSB方法,在随机提供的n幅有意义的封面图像中隐藏秘密,体现出较好的不可见性,然后比较提取的水印与原始水印的相似程度,最终获得较好的效果。最后进行了噪声和切割攻击,表明该方案具有良好的鲁棒性。
{"title":"The secret image sharing scheme based on improved LSB algorithm","authors":"Xiaohong Li, Yuan Chen, Feng Wang, Tao Qinqin","doi":"10.1109/ICCCNT.2014.6963003","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963003","url":null,"abstract":"Secret sharing is a very important branch in the field of modern cryptography. Secret image sharing technology is the expansion of secret sharing in terms of image. When using this technology to share images, it can ensure the integrity and security of the image. In this paper, secret image used random shadow image which is generated from (t, n) threshold secret image sharing scheme. This paper adopted improved method of LSB to hide the secrets in n meaningful cover images that were provided randomly, which reflected good invisibility, then compared the level of similarity of extracted watermark and original watermark, and eventually got good effects. Finally, we made noise and cutting attack, which illustrated that the scheme has good robustness.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124929881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Integrated location fingerprinting and physical neighborhood for WLAN probabilistic localization 集成位置指纹和物理邻域的WLAN概率定位
Mu Zhou, Qiao Zhang, Z. Tian, Feng Qiu, Qi Wu
For the purpose of utilizing physical neighborhood relations of adjacent reference points (ARPs) in radio-map, a new approach by constructing both location fingerprinting database and physical neighborhood database in off-line phase is proposed to enhance the accuracy of wireless local area network (WLAN) probabilistic localization. In the on-line phase, we first rely on Bayesian inference to find the most adjacent points (MAPs) with respect to each testing point (TP). Then, based on the physical neighborhood database, we obtain the physical adjacent points (PAPs) corresponding to these MAPs. In the set of MAPs and PAPs, we choose the feature points (FPs) for the second Bayesian inference. Finally, we locate the TP at the geometric center of the chosen FPs which has the maximum posterior probabilities.
的目的是利用物理邻里关系radio-map相邻参考点(ARPs)的一种新方法通过构造两个位置指纹数据库和物理社区数据库在离线阶段提出了提高无线局域网(WLAN)的准确性概率本地化。在在线阶段,我们首先依靠贝叶斯推理来找到相对于每个测试点(TP)的最邻近点(map)。然后,基于物理邻域数据库,得到这些map对应的物理邻域点(pap)。在map和pap集合中,我们选择用于第二次贝叶斯推理的特征点(FPs)。最后,我们将TP定位在具有最大后验概率的所选fp的几何中心。
{"title":"Integrated location fingerprinting and physical neighborhood for WLAN probabilistic localization","authors":"Mu Zhou, Qiao Zhang, Z. Tian, Feng Qiu, Qi Wu","doi":"10.1109/ICCCNT.2014.6963028","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963028","url":null,"abstract":"For the purpose of utilizing physical neighborhood relations of adjacent reference points (ARPs) in radio-map, a new approach by constructing both location fingerprinting database and physical neighborhood database in off-line phase is proposed to enhance the accuracy of wireless local area network (WLAN) probabilistic localization. In the on-line phase, we first rely on Bayesian inference to find the most adjacent points (MAPs) with respect to each testing point (TP). Then, based on the physical neighborhood database, we obtain the physical adjacent points (PAPs) corresponding to these MAPs. In the set of MAPs and PAPs, we choose the feature points (FPs) for the second Bayesian inference. Finally, we locate the TP at the geometric center of the chosen FPs which has the maximum posterior probabilities.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123424246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Depth map-based human activity tracking and recognition using body joints features and Self-Organized Map 基于深度图的人体关节特征和自组织图的人体活动跟踪与识别
A. Jalal, S. Kamal, Daijin Kim
In this paper, we implement human activity tracking and recognition system utilizing body joints features using depth maps. During HAR settings, depth maps are processed to track human silhouettes by considering temporal continuity constraints of human motion information and compute centroids for each activity based on contour generation. In body joints features, depth silhouettes are computed first through geodesic distance to identify anatomical landmarks which produce joint points information from specific body parts. Then, body joints are processed to produce centroid distance features and key joints distance features. Finally, Self-Organized Map (SOM) is employed to train and recognize different human activities from the features. Experimental results show that body joints features achieved high recognition rate over the conventional features. The proposed system should be applicable as e-healthcare systems for monitoring elderly people, surveillance systems for observing pedestrian traffic areas and indoor environment systems which recognize activities of multiple users.
在本文中,我们利用深度图的人体关节特征实现了人体活动跟踪和识别系统。在HAR设置过程中,通过考虑人体运动信息的时间连续性约束,对深度图进行处理以跟踪人体轮廓,并基于轮廓生成计算每个活动的质心。在人体关节特征中,首先通过测地线距离计算深度轮廓,以识别解剖地标,从而产生特定身体部位的关节点信息。然后对机体关节进行处理,得到质心距离特征和关键关节距离特征。最后,利用自组织地图(SOM)从特征中训练和识别不同的人类活动。实验结果表明,人体关节特征比常规特征具有更高的识别率。建议的系统应适用于监控老年人的电子医疗系统,观察行人交通区域的监控系统和识别多个用户活动的室内环境系统。
{"title":"Depth map-based human activity tracking and recognition using body joints features and Self-Organized Map","authors":"A. Jalal, S. Kamal, Daijin Kim","doi":"10.1109/ICCCNT.2014.6963013","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963013","url":null,"abstract":"In this paper, we implement human activity tracking and recognition system utilizing body joints features using depth maps. During HAR settings, depth maps are processed to track human silhouettes by considering temporal continuity constraints of human motion information and compute centroids for each activity based on contour generation. In body joints features, depth silhouettes are computed first through geodesic distance to identify anatomical landmarks which produce joint points information from specific body parts. Then, body joints are processed to produce centroid distance features and key joints distance features. Finally, Self-Organized Map (SOM) is employed to train and recognize different human activities from the features. Experimental results show that body joints features achieved high recognition rate over the conventional features. The proposed system should be applicable as e-healthcare systems for monitoring elderly people, surveillance systems for observing pedestrian traffic areas and indoor environment systems which recognize activities of multiple users.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128770415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
A secure and robust crypto system based on unique dynamic key generation scheme 基于唯一动态密钥生成方案的安全鲁棒密码系统
S. Swaminathan, A. Karthick, S. Suganya
Information security is always given a cardinal role in every domain related to exchange of information. There is always a constant demand for dynamic and stronger encryption methods. Currently a plethora of encryption algorithms exist and have been achieving data security to a great extent. But, there is always a possibility of an adversary to crack the algorithm or use different attacks to gain access to confidential information. Striking a balance between the versatility and robustness is always important to maintain the level of security. A new crypto system has been proposed in this paper “HB2IG - Hex Binary 2's complement Invert Gray ” which offers higher level of security through a unique dynamic key generation scheme involving the use of symmetric encryption system coupled with a Unique Dynamic Crypto Key and Transport Cipher Key.
在与信息交换相关的各个领域,信息安全始终被赋予重要的地位。对动态和更强的加密方法的需求总是不断的。目前存在大量的加密算法,并在很大程度上实现了数据安全。但是,攻击者总是有可能破解算法或使用不同的攻击来获取机密信息。在多功能性和健壮性之间取得平衡对于维持安全级别总是很重要的。本文提出了一种新的加密系统“HB2IG - Hex Binary 2’s complement Invert Gray”,该系统通过一种独特的动态密钥生成方案提供了更高的安全性,该方案涉及使用对称加密系统以及唯一动态加密密钥和传输密码密钥。
{"title":"A secure and robust crypto system based on unique dynamic key generation scheme","authors":"S. Swaminathan, A. Karthick, S. Suganya","doi":"10.1109/ICCCNT.2014.6963000","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963000","url":null,"abstract":"Information security is always given a cardinal role in every domain related to exchange of information. There is always a constant demand for dynamic and stronger encryption methods. Currently a plethora of encryption algorithms exist and have been achieving data security to a great extent. But, there is always a possibility of an adversary to crack the algorithm or use different attacks to gain access to confidential information. Striking a balance between the versatility and robustness is always important to maintain the level of security. A new crypto system has been proposed in this paper “HB2IG - Hex Binary 2's complement Invert Gray ” which offers higher level of security through a unique dynamic key generation scheme involving the use of symmetric encryption system coupled with a Unique Dynamic Crypto Key and Transport Cipher Key.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129900006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework 利用中间件框架改进移动用户访问HDFS数据的安全机制
Surbhi Singh, Sangeeta Sharma
Revolution in the field of technology leads to the development of cloud computing which delivers on-demand and easy access to the large shared pools of online stored data, softwares and applications. It has changed the way of utilizing the IT resources but at the compromised cost of security breaches as well such as phishing attacks, impersonation, lack of confidentiality and integrity. Thus this research work deals with the core problem of providing absolute security to the mobile consumers of public cloud to improve the mobility of user's, accessing data stored on public cloud securely using tokens without depending upon the third party to generate them. This paper presents the approach of simplifying the process of authenticating and authorizing the mobile user's by implementing middleware-centric framework called MiLAMob model with the huge online data storage system i.e. HDFS. It allows the consumer's to access the data from HDFS via mobiles or through the social networking sites eg. facebook, gmail, yahoo etc using OAuth 2.0 protocol. For authentication, the tokens are generated using one-time password generation technique and then encrypting them using AES method. By implementing the flexible user based policies and standards, this model improves the authorization process.
技术领域的革命导致了云计算的发展,云计算提供了对在线存储数据、软件和应用程序的大型共享池的按需和轻松访问。它改变了利用It资源的方式,但代价是安全漏洞,以及网络钓鱼攻击、冒充、缺乏机密性和完整性。因此,本研究工作涉及的核心问题是为公共云的移动消费者提供绝对安全,以提高用户的移动性,使用令牌安全地访问存储在公共云上的数据,而不依赖于第三方生成令牌。本文提出了一种简化移动用户身份验证和授权过程的方法,该方法通过在庞大的在线数据存储系统HDFS上实现以中间件为中心的MiLAMob模型框架。它允许用户通过手机或社交网站访问HDFS中的数据。facebook, gmail, yahoo等使用OAuth 2.0协议。对于身份验证,使用一次性密码生成技术生成令牌,然后使用AES方法对其进行加密。通过实现灵活的基于用户的策略和标准,该模型改进了授权流程。
{"title":"Improving security mechanism to access HDFS data by mobile consumers using middleware-layer framework","authors":"Surbhi Singh, Sangeeta Sharma","doi":"10.1109/ICCCNT.2014.6963051","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963051","url":null,"abstract":"Revolution in the field of technology leads to the development of cloud computing which delivers on-demand and easy access to the large shared pools of online stored data, softwares and applications. It has changed the way of utilizing the IT resources but at the compromised cost of security breaches as well such as phishing attacks, impersonation, lack of confidentiality and integrity. Thus this research work deals with the core problem of providing absolute security to the mobile consumers of public cloud to improve the mobility of user's, accessing data stored on public cloud securely using tokens without depending upon the third party to generate them. This paper presents the approach of simplifying the process of authenticating and authorizing the mobile user's by implementing middleware-centric framework called MiLAMob model with the huge online data storage system i.e. HDFS. It allows the consumer's to access the data from HDFS via mobiles or through the social networking sites eg. facebook, gmail, yahoo etc using OAuth 2.0 protocol. For authentication, the tokens are generated using one-time password generation technique and then encrypting them using AES method. By implementing the flexible user based policies and standards, this model improves the authorization process.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129125320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Real time implementation of Elliptic Curve Cryptography over a open source VoIP server 椭圆曲线加密的实时实现在一个开源的VoIP服务器
T. Subashri, A. Arjun, S. Ashok
This paper presents the design and the implementation of Elliptic Curve Cryptography in an Asterisk VoIP server which serves as an exchange for placing voice calls over the internet. Voice over internet protocol refers to the transmission of speech encoded into data packets transmitted across networks. VoIP networks are prone to confidentiality threats due to the weak keys used by the AES algorithm for encryption of the VoIP packets. So, in order to strengthen the key for encryption/decryption, Elliptic Curve Diffie-Hellman (ECDH) Algorithm key agreement scheme is employed with smaller key sizes resulting in faster computations. The elliptic curve used in this paper is a modified NIST P-256 curve and key generation algorithm using split exponents for fast exponentiation has been implemented to speed up and increase the randomness of key generation. The implementation of split exponents also help in increasing the security of the keys generated. The key generated by ECDH is highly secure because the discrete logarithmic problem is very difficult in this scheme. This Method is successfully carrying out voice calls on VoIP clients connected to the internet. This ECDH key exchanging mechanism for voice calls in real time is implemented on an Asterisk PBX (Private Branch eXchange), using AGI(Asterisk Gateway Interface) server.
本文介绍了椭圆曲线加密在Asterisk VoIP服务器上的设计和实现,该服务器用于在互联网上进行语音呼叫的交换。互联网语音协议是指将语音编码成数据包在网络上传输。由于AES算法对VoIP报文进行加密时使用弱密钥,因此VoIP网络容易受到机密性威胁。因此,为了加强加密/解密密钥,采用椭圆曲线Diffie-Hellman (ECDH)算法密钥协议方案,密钥尺寸较小,计算速度更快。本文所使用的椭圆曲线是一种改进的NIST P-256曲线,并实现了使用分割指数进行快速幂运算的密钥生成算法,以加快密钥生成的速度并增加密钥生成的随机性。拆分指数的实现还有助于提高生成的密钥的安全性。由于该方案中离散对数问题非常困难,因此ECDH生成的密钥具有很高的安全性。该方法可以在连接internet的VoIP客户端上成功进行语音通话。这种实时语音呼叫的ECDH密钥交换机制是在使用AGI(Asterisk Gateway Interface)服务器的Asterisk PBX (Private Branch eXchange)上实现的。
{"title":"Real time implementation of Elliptic Curve Cryptography over a open source VoIP server","authors":"T. Subashri, A. Arjun, S. Ashok","doi":"10.1109/ICCCNT.2014.6963029","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963029","url":null,"abstract":"This paper presents the design and the implementation of Elliptic Curve Cryptography in an Asterisk VoIP server which serves as an exchange for placing voice calls over the internet. Voice over internet protocol refers to the transmission of speech encoded into data packets transmitted across networks. VoIP networks are prone to confidentiality threats due to the weak keys used by the AES algorithm for encryption of the VoIP packets. So, in order to strengthen the key for encryption/decryption, Elliptic Curve Diffie-Hellman (ECDH) Algorithm key agreement scheme is employed with smaller key sizes resulting in faster computations. The elliptic curve used in this paper is a modified NIST P-256 curve and key generation algorithm using split exponents for fast exponentiation has been implemented to speed up and increase the randomness of key generation. The implementation of split exponents also help in increasing the security of the keys generated. The key generated by ECDH is highly secure because the discrete logarithmic problem is very difficult in this scheme. This Method is successfully carrying out voice calls on VoIP clients connected to the internet. This ECDH key exchanging mechanism for voice calls in real time is implemented on an Asterisk PBX (Private Branch eXchange), using AGI(Asterisk Gateway Interface) server.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123856553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Correlated received signal strength correction for radio-map based indoor Wi-Fi localization 基于无线地图的室内Wi-Fi定位相关接收信号强度校正
Mu Zhou, Qiao Zhang, Z. Tian, Feng Qiu, Qi Wu
The purpose of received signal strength (RSS) correction in radio-map based Wi-Fi localization is to obtain a set of fine-grain location-dependent RSS fingerprints, and eventually achieve the purpose of highly accurate and reliable localization. To meet this goal, the RSS correction is conducted on the raw RSS samples to eliminate the environmental noise from the radio-map. This paper shows the comprehensive analysis on the autocorrelation property of the chronological RSS samples in the same RSS sequence, and meanwhile presents the correlated RSS correction approach. Furthermore, the correlated RSS correction approach can also be integrated into the conventional radio-map based K nearest neighbor (KNN) and weighted KNN (WKNN) localization algorithms. The experimental results conducted on the real Wi-Fi RSS samples recorded in a representative indoor environment prove that the proposed correlated RSS correction approach can result in the significant improvement of accuracy over the conventional radio-map based localization.
在基于无线电图的Wi-Fi定位中,接收信号强度(RSS)校正的目的是获得一组细粒度位置相关的RSS指纹,最终达到高精度、可靠的定位目的。为了实现这一目标,对原始RSS样本进行RSS校正,以消除无线电图中的环境噪声。本文综合分析了同一RSS序列中时序RSS样本的自相关特性,同时提出了相关RSS校正方法。此外,相关RSS校正方法还可以集成到传统的基于无线电地图的K近邻(KNN)和加权KNN (WKNN)定位算法中。在具有代表性的室内环境中记录的真实Wi-Fi RSS样本上进行的实验结果表明,所提出的相关RSS校正方法与传统的基于无线电地图的定位方法相比,精度有显著提高。
{"title":"Correlated received signal strength correction for radio-map based indoor Wi-Fi localization","authors":"Mu Zhou, Qiao Zhang, Z. Tian, Feng Qiu, Qi Wu","doi":"10.1109/ICCCNT.2014.6963140","DOIUrl":"https://doi.org/10.1109/ICCCNT.2014.6963140","url":null,"abstract":"The purpose of received signal strength (RSS) correction in radio-map based Wi-Fi localization is to obtain a set of fine-grain location-dependent RSS fingerprints, and eventually achieve the purpose of highly accurate and reliable localization. To meet this goal, the RSS correction is conducted on the raw RSS samples to eliminate the environmental noise from the radio-map. This paper shows the comprehensive analysis on the autocorrelation property of the chronological RSS samples in the same RSS sequence, and meanwhile presents the correlated RSS correction approach. Furthermore, the correlated RSS correction approach can also be integrated into the conventional radio-map based K nearest neighbor (KNN) and weighted KNN (WKNN) localization algorithms. The experimental results conducted on the real Wi-Fi RSS samples recorded in a representative indoor environment prove that the proposed correlated RSS correction approach can result in the significant improvement of accuracy over the conventional radio-map based localization.","PeriodicalId":140744,"journal":{"name":"Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125627689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1