首页 > 最新文献

2021 International Conference on Advanced Computing and Endogenous Security最新文献

英文 中文
A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC 基于ECC的物联网轻量级认证与密钥协商协议
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013341
Bing Li, Guohe Zhang, Shaochong Lei, H. Fu, Jinlei Wang
The quick development of the Internet of Things (IoT) makes the IoT devices become appealing targets of various cyberattacks. Authentication and key agreement (AKA) protocol are the most important measures to ensure the security of IoT. However, it is still quite challenging to devise proper AKA protocols for IoT because of the resource-constrained nature of IoT devices. In this paper, we have proposed a new lightweight AKA protocol for IoT based on elliptic curve cryptography (ECC). Our proposed AKA protocol can achieve mutual authentication and ECC-based session key establishment simultaneously. To enhance security and provide anonymity, our protocol uses the one-time password and dynamic identity information which are updated in every round of mutual authentication through a well-designed update operation. To assess our protocol, we carry out security and performance analyses. The obtained results show that our protocol with a high level of security has low complexity and small computational cost and is appropriate to be applied in resource-constrained IoT devices.
物联网的快速发展使得物联网设备成为各种网络攻击的目标。认证和密钥协议(AKA)协议是确保物联网安全的最重要措施。然而,由于物联网设备的资源限制性质,为物联网设计适当的AKA协议仍然是相当具有挑战性的。在本文中,我们提出了一种新的基于椭圆曲线加密(ECC)的物联网轻量级AKA协议。我们提出的AKA协议可以同时实现相互认证和基于ecc的会话密钥建立。为了提高安全性和提供匿名性,我们的协议使用一次性密码和动态身份信息,这些信息通过精心设计的更新操作在每一轮相互认证中更新。为了评估我们的协议,我们进行了安全性和性能分析。结果表明,我们的协议具有较高的安全性,复杂度低,计算成本小,适合应用于资源受限的物联网设备。
{"title":"A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC","authors":"Bing Li, Guohe Zhang, Shaochong Lei, H. Fu, Jinlei Wang","doi":"10.1109/IEEECONF52377.2022.10013341","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013341","url":null,"abstract":"The quick development of the Internet of Things (IoT) makes the IoT devices become appealing targets of various cyberattacks. Authentication and key agreement (AKA) protocol are the most important measures to ensure the security of IoT. However, it is still quite challenging to devise proper AKA protocols for IoT because of the resource-constrained nature of IoT devices. In this paper, we have proposed a new lightweight AKA protocol for IoT based on elliptic curve cryptography (ECC). Our proposed AKA protocol can achieve mutual authentication and ECC-based session key establishment simultaneously. To enhance security and provide anonymity, our protocol uses the one-time password and dynamic identity information which are updated in every round of mutual authentication through a well-designed update operation. To assess our protocol, we carry out security and performance analyses. The obtained results show that our protocol with a high level of security has low complexity and small computational cost and is appropriate to be applied in resource-constrained IoT devices.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching Design in Multi-IRS-UAV-assisted Multi-pair Anti-jamming Communication Networks 多红外-无人机辅助多对抗干扰通信网络的匹配设计
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013344
Z. Hou, Jin Chen, Guoxin Li, Yu-zhen Huang, Yifan Xu, Yuhua Xu
This paper studies the matching optimization problem in multi-IRS-UAV-assisted multi-pair anti-jamming communication networks. The matching relationship between the transmitters and IRS-UAVs is formed to improve the overall anti-jamming performance, and we formulate it as a non-substitutable many-to-many matching problem. To solve this problem, we propose a low-complexity distributed matching-based optimization algorithm. Numerical results show that the proposed algorithm has a significant performance improvement than the random matching algorithm and is even close to optimal performance.
研究了多红外-无人机辅助多对抗干扰通信网络中的匹配优化问题。为了提高红外无人机的整体抗干扰性能,形成了发射机与红外无人机之间的匹配关系,并将其表述为不可替代的多对多匹配问题。为了解决这一问题,我们提出了一种低复杂度的分布式匹配优化算法。数值结果表明,该算法比随机匹配算法性能有明显提高,甚至接近最优性能。
{"title":"Matching Design in Multi-IRS-UAV-assisted Multi-pair Anti-jamming Communication Networks","authors":"Z. Hou, Jin Chen, Guoxin Li, Yu-zhen Huang, Yifan Xu, Yuhua Xu","doi":"10.1109/IEEECONF52377.2022.10013344","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013344","url":null,"abstract":"This paper studies the matching optimization problem in multi-IRS-UAV-assisted multi-pair anti-jamming communication networks. The matching relationship between the transmitters and IRS-UAVs is formed to improve the overall anti-jamming performance, and we formulate it as a non-substitutable many-to-many matching problem. To solve this problem, we propose a low-complexity distributed matching-based optimization algorithm. Numerical results show that the proposed algorithm has a significant performance improvement than the random matching algorithm and is even close to optimal performance.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast recoverable heterogeneous quad-core lockstep architecture 快速可恢复异构四核锁步架构
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013101
Kai Liu, Yu Li, Ouyang Ling
With the increasing demand of industry and automobile for reliability, various redundant software and hardware technologies are introduced into system design. In this paper, we present a fast recoverable heterogeneous quad-core lockstep architecture to mitigate single event upset (SEU) and common-mode failure(CMF) problems. Two ARM processors and Two RISC-V processors are integrated in a loosely-coupled lockstep mode and a recovery scheme is implemented without frequent processor context saving.
随着工业和汽车对可靠性要求的提高,各种冗余的软硬件技术被引入到系统设计中。在本文中,我们提出了一种快速可恢复的异构四核锁步架构,以减轻单事件干扰(SEU)和共模故障(CMF)问题。两个ARM处理器和两个RISC-V处理器以松散耦合的锁步模式集成,并且在不频繁保存处理器上下文的情况下实现恢复方案。
{"title":"Fast recoverable heterogeneous quad-core lockstep architecture","authors":"Kai Liu, Yu Li, Ouyang Ling","doi":"10.1109/IEEECONF52377.2022.10013101","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013101","url":null,"abstract":"With the increasing demand of industry and automobile for reliability, various redundant software and hardware technologies are introduced into system design. In this paper, we present a fast recoverable heterogeneous quad-core lockstep architecture to mitigate single event upset (SEU) and common-mode failure(CMF) problems. Two ARM processors and Two RISC-V processors are integrated in a loosely-coupled lockstep mode and a recovery scheme is implemented without frequent processor context saving.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of Relation Extraction 关系提取概述
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013099
Xuhui Song, Hongtao Yu, Shaomei Li, Xinbang Hu, Huansha Wang
With the rapid development of big data, information extraction has gradually become a hot research issue. As one of the sub tasks of information extraction, relation extraction is widely used in the fields of knowledge atlas, intelligent question answering and so on. According to the development history of relation extraction, this paper expounds relation extraction based on traditional machine learning, relation extraction based on deep learning and relation extraction in open domain, summarizes the representative research methods, models and achievements, and summarizes and prospects the possible research directions in the future.
随着大数据的快速发展,信息提取逐渐成为一个研究热点。关系抽取作为信息抽取的子任务之一,在知识图谱、智能问答等领域有着广泛的应用。根据关系抽取的发展历史,阐述了基于传统机器学习的关系抽取、基于深度学习的关系抽取和开放领域的关系抽取,总结了具有代表性的研究方法、模型和成果,并对未来可能的研究方向进行了总结和展望。
{"title":"Overview of Relation Extraction","authors":"Xuhui Song, Hongtao Yu, Shaomei Li, Xinbang Hu, Huansha Wang","doi":"10.1109/IEEECONF52377.2022.10013099","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013099","url":null,"abstract":"With the rapid development of big data, information extraction has gradually become a hot research issue. As one of the sub tasks of information extraction, relation extraction is widely used in the fields of knowledge atlas, intelligent question answering and so on. According to the development history of relation extraction, this paper expounds relation extraction based on traditional machine learning, relation extraction based on deep learning and relation extraction in open domain, summarizes the representative research methods, models and achievements, and summarizes and prospects the possible research directions in the future.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of pseudolite supplemented geolocation system for universal receiver 通用接收机伪卫星辅助定位系统设计
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013350
B. Yang, Yongjun Liu, Chunxiao Dong, Bo Gao, Mei Tian, Yawei Ji
Global navigation satellite system (GNSS) has been widely used around the world, but problems like low signal intensity or signal been blocked could often cause the users unable to collect enough satellite signal for position purpose. A pseudolite geolocation system is designed which can worked instead of non-line-of-sight (NLOS) satellites, cooperate with on orbit GNSS satellites. We detailed a novel pseudolite system consists and working progress. Through application scenario analysis and simulation we verified that pseudorange errors is the main factor affect position accuracy, therefore, we provide pseudolite testing and correction methods. In addition, we also verified that pseudolite can significantly improve positioning accuracy in high buildings around urban environment.
全球卫星导航系统(GNSS)在世界范围内得到了广泛的应用,但信号强度低或信号被阻塞等问题往往会导致用户无法收集到足够的卫星信号用于定位。设计了一种可以代替非视距卫星,与在轨GNSS卫星协同工作的伪卫星地理定位系统。详细介绍了一种新型伪卫星系统的组成和工作进展。通过应用场景分析和仿真,验证了伪距误差是影响定位精度的主要因素,给出了伪距测试和校正方法。此外,我们还验证了伪卫星在城市环境周围的高层建筑中可以显著提高定位精度。
{"title":"Design of pseudolite supplemented geolocation system for universal receiver","authors":"B. Yang, Yongjun Liu, Chunxiao Dong, Bo Gao, Mei Tian, Yawei Ji","doi":"10.1109/IEEECONF52377.2022.10013350","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013350","url":null,"abstract":"Global navigation satellite system (GNSS) has been widely used around the world, but problems like low signal intensity or signal been blocked could often cause the users unable to collect enough satellite signal for position purpose. A pseudolite geolocation system is designed which can worked instead of non-line-of-sight (NLOS) satellites, cooperate with on orbit GNSS satellites. We detailed a novel pseudolite system consists and working progress. Through application scenario analysis and simulation we verified that pseudorange errors is the main factor affect position accuracy, therefore, we provide pseudolite testing and correction methods. In addition, we also verified that pseudolite can significantly improve positioning accuracy in high buildings around urban environment.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method 基于插值多项式方法的物理层认证机制
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013332
Yong-Bing Zhang, Liang Jin, Qiang Han
Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.
大多数现有的物理层挑战-响应身份验证方法都假定攻击者无法访问合法双方的通道信息。它们的安全性很大程度上依赖于无线信道的私密性。但在实际通信环境中,上述假设很难保证攻击方在获得合法通道信息的情况下,可以根据认证响应直接破解密钥。针对这些问题,本文提出了一种基于插值多项式方法的物理层认证机制。首先,认证双方提取无线信道特征,并将其与共享密钥组合得到联合密钥。然后双方使用相同的密钥对,用牛顿插值多项式构造各自的曲线方程。随后,发送方随机选择不在联合密钥中的数据代入方程,构造认证向量,发送给认证方。最后,认证方根据需求设置认证阈值,并根据认证向量中的数据计算匹配结果进行判断。仿真结果表明,该方法具有很高的安全性和认证成功率。
{"title":"Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method","authors":"Yong-Bing Zhang, Liang Jin, Qiang Han","doi":"10.1109/IEEECONF52377.2022.10013332","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013332","url":null,"abstract":"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Deployment of Dynamic UAV Base Station based on Mobile Users 基于移动用户的动态无人机基站三维部署
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013331
Fangxu Lu, Zhichao Mi, Ning Zhao, Hai Wang, Yulu Tian
The deployment of multiple dynamic rotary-wing UAV base stations is studied for moving users. The cumulative utility of the communication network is maximized by adding and applying the three paremeters of the UAV base stations in terms of total channel transmission rate, mobile energy consumption, and coverage utility. The UAV base station performs different motions in different time slots, which translates the process into a Markov decision process. Since the user moves randomly within the time slot, the reward function value of the “next two steps” of the dynamic UAV base station is considered. The mobility prediction of the user is taken into account to some extent, and finally the mobile strategy of the UAV base station within the current time slot is selected comprehensively. The simulation results show that the improved algorithm is effective in achieving the best coverage of the UAV base station.
针对移动用户,研究了多动态旋翼无人机基站的部署问题。将无人机基站的信道总传输速率、移动能耗和覆盖效用三个参数相加应用,使通信网络的累积效用最大化。无人机基站在不同时隙进行不同的运动,将其转化为马尔可夫决策过程。由于用户在时隙内的移动是随机的,因此考虑动态无人机基站“下两步”的奖励函数值。在一定程度上考虑用户的移动性预测,最后综合选择无人机基站在当前时隙内的移动策略。仿真结果表明,改进算法能够有效地实现无人机基站的最佳覆盖。
{"title":"3D Deployment of Dynamic UAV Base Station based on Mobile Users","authors":"Fangxu Lu, Zhichao Mi, Ning Zhao, Hai Wang, Yulu Tian","doi":"10.1109/IEEECONF52377.2022.10013331","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013331","url":null,"abstract":"The deployment of multiple dynamic rotary-wing UAV base stations is studied for moving users. The cumulative utility of the communication network is maximized by adding and applying the three paremeters of the UAV base stations in terms of total channel transmission rate, mobile energy consumption, and coverage utility. The UAV base station performs different motions in different time slots, which translates the process into a Markov decision process. Since the user moves randomly within the time slot, the reward function value of the “next two steps” of the dynamic UAV base station is considered. The mobility prediction of the user is taken into account to some extent, and finally the mobile strategy of the UAV base station within the current time slot is selected comprehensively. The simulation results show that the improved algorithm is effective in achieving the best coverage of the UAV base station.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"17 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113931814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical layer key generation for non-codebook transmission mode of 5G TDD system 5G TDD系统非码本传输模式的物理层密钥生成
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013102
Zhi Cao, Liang Jin, Qian Han
The design and analysis of traditional physical layer key generation schemes are mostly based on the general communication models. They did not really consider the actual communication scenarios, such as 5G communication. This paper proposed a physical layer key generation scheme for 5G TDD system in non-codebook transmission mode. In our scheme, the gNB uses SRS to complete downlink channel estimation and generates an adapted precoding matrix to assist the downlink signal transmission. Based on existing parameters obtained in the precoding matrix generation, the gNB predicts the signal received by the UE and uses it as a shared source of randomness. The whole process conforms to the 5G protocol. The key extraction can be completed during the interaction between the communication parties, realizing the unity of security and communication.
传统物理层密钥生成方案的设计和分析大多基于通用的通信模型。他们并没有真正考虑实际的通信场景,比如5G通信。提出了一种非码本传输模式下5G TDD系统的物理层密钥生成方案。在我们的方案中,gNB使用SRS完成下行信道估计,并生成自适应的预编码矩阵来辅助下行信号的传输。gNB基于预编码矩阵生成中获得的现有参数,对终端接收到的信号进行预测,并将其作为共享的随机性源。整个过程符合5G协议。密钥提取可以在通信双方交互的过程中完成,实现了安全和通信的统一。
{"title":"Physical layer key generation for non-codebook transmission mode of 5G TDD system","authors":"Zhi Cao, Liang Jin, Qian Han","doi":"10.1109/IEEECONF52377.2022.10013102","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013102","url":null,"abstract":"The design and analysis of traditional physical layer key generation schemes are mostly based on the general communication models. They did not really consider the actual communication scenarios, such as 5G communication. This paper proposed a physical layer key generation scheme for 5G TDD system in non-codebook transmission mode. In our scheme, the gNB uses SRS to complete downlink channel estimation and generates an adapted precoding matrix to assist the downlink signal transmission. Based on existing parameters obtained in the precoding matrix generation, the gNB predicts the signal received by the UE and uses it as a shared source of randomness. The whole process conforms to the 5G protocol. The key extraction can be completed during the interaction between the communication parties, realizing the unity of security and communication.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-performance optimization of SM4-GCM based on FPGA 基于FPGA的SM4-GCM的高性能优化
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013330
S. Lv, Bin Li, Xiaojie Chen, Qinglei Zhou
SM4-GCM is an encryption algorithm with authentication function. The algorithm achieves the purpose of data security and information integrity. The SM4-GCM algorithm, implemented using traditional software methods, has low throughput and high resource consumption. In order to further improve the algorithm performance, this paper uses FPGA to optimize the SM4-GCM algorithm to achieve full-pipeline parallel acceleration. Firstly, the SM4 module is optimized using pipelining techniques. Then, the GHASH module is optimized using the Karatsuba algorithm and fast reduction. Finally, a loosely coupled architecture is used to connect various modules with asynchronous FIFOs, which improves the resource utilization and throughput of the FPGA circuit. The experimental results show that the throughput of the optimized SM4-GCM algorithm reaches 28.8 Gbps. It is better than other schemes, has a higher throughput, and meets the actual application requirements.
SM4-GCM是一种具有认证功能的加密算法。该算法达到了数据安全和信息完整的目的。采用传统软件实现的SM4-GCM算法具有吞吐量低、资源消耗大的缺点。为了进一步提高算法性能,本文利用FPGA对SM4-GCM算法进行优化,实现全流水线并行加速。首先,采用流水线技术对SM4模块进行了优化。然后,利用Karatsuba算法和快速约简对GHASH模块进行优化。最后,采用松耦合结构将各模块与异步fifo连接起来,提高了FPGA电路的资源利用率和吞吐量。实验结果表明,优化后的SM4-GCM算法的吞吐量达到28.8 Gbps。该方案优于其他方案,具有更高的吞吐量,能够满足实际应用需求。
{"title":"High-performance optimization of SM4-GCM based on FPGA","authors":"S. Lv, Bin Li, Xiaojie Chen, Qinglei Zhou","doi":"10.1109/IEEECONF52377.2022.10013330","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013330","url":null,"abstract":"SM4-GCM is an encryption algorithm with authentication function. The algorithm achieves the purpose of data security and information integrity. The SM4-GCM algorithm, implemented using traditional software methods, has low throughput and high resource consumption. In order to further improve the algorithm performance, this paper uses FPGA to optimize the SM4-GCM algorithm to achieve full-pipeline parallel acceleration. Firstly, the SM4 module is optimized using pipelining techniques. Then, the GHASH module is optimized using the Karatsuba algorithm and fast reduction. Finally, a loosely coupled architecture is used to connect various modules with asynchronous FIFOs, which improves the resource utilization and throughput of the FPGA circuit. The experimental results show that the throughput of the optimized SM4-GCM algorithm reaches 28.8 Gbps. It is better than other schemes, has a higher throughput, and meets the actual application requirements.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Localization Algorithm Based on UAV Platform 基于无人机平台的协同定位算法
Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013095
Lu Zhang, Jianbo Yang, Ziyan Zhang, Peng Cai
Aiming at the location of fixed radiation source, a cooperative location method combining TDOA location and FDOA (frequency difference location) is proposed based on UAV platform and directional antenna. Firstly, relying on the directional antenna of the UAV platform and based on the received signal strength, the method roughly locates the radiation source and searches the best location point, so that the radiation source is located at the vertical position of the two location points; Then, according to the TDOA location and FDOA algorithms, the emitter location is calculated cooperatively; Finally, the positioning accuracy is simulated and analyzed. The results show that when the time difference measurement and frequency difference measurement are controlled within a certain range, the error of joint positioning can be controlled in a small range, which is inversely proportional to the distance between the two positioning points and directly proportional to the distance between the radiation source and the positioning point. This method makes full use of the UAV mobile search function to optimize the positioning points, and then cooperates with TDOA and frequency difference positioning, which can effectively improve the positioning efficiency while reducing the point position error.
针对固定辐射源的定位问题,提出了一种基于无人机平台和定向天线的TDOA定位和FDOA(频差定位)相结合的协同定位方法。首先,该方法依托无人机平台定向天线,根据接收到的信号强度,对辐射源进行粗略定位并搜索最佳定位点,使辐射源位于两个定位点的垂直位置;然后,根据TDOA定位算法和FDOA算法协同计算发射极位置;最后对定位精度进行了仿真分析。结果表明,当时差测量和频差测量控制在一定范围内时,可将联合定位误差控制在较小的范围内,该范围与两个定位点之间的距离成反比,与辐射源与定位点之间的距离成正比。该方法充分利用无人机移动搜索功能对定位点进行优化,再配合TDOA和频差定位,可有效提高定位效率,同时减小点位误差。
{"title":"A Cooperative Localization Algorithm Based on UAV Platform","authors":"Lu Zhang, Jianbo Yang, Ziyan Zhang, Peng Cai","doi":"10.1109/IEEECONF52377.2022.10013095","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013095","url":null,"abstract":"Aiming at the location of fixed radiation source, a cooperative location method combining TDOA location and FDOA (frequency difference location) is proposed based on UAV platform and directional antenna. Firstly, relying on the directional antenna of the UAV platform and based on the received signal strength, the method roughly locates the radiation source and searches the best location point, so that the radiation source is located at the vertical position of the two location points; Then, according to the TDOA location and FDOA algorithms, the emitter location is calculated cooperatively; Finally, the positioning accuracy is simulated and analyzed. The results show that when the time difference measurement and frequency difference measurement are controlled within a certain range, the error of joint positioning can be controlled in a small range, which is inversely proportional to the distance between the two positioning points and directly proportional to the distance between the radiation source and the positioning point. This method makes full use of the UAV mobile search function to optimize the positioning points, and then cooperates with TDOA and frequency difference positioning, which can effectively improve the positioning efficiency while reducing the point position error.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117135152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2021 International Conference on Advanced Computing and Endogenous Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1