首页 > 最新文献

2017 IEEE 17th International Conference on Communication Technology (ICCT)最新文献

英文 中文
Edge aggregation based Bayesian modeling of cyber attacks in hypervisor-enabled IaaS cloud networks 在支持管理程序的IaaS云网络中,基于边缘聚合的网络攻击贝叶斯建模
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359847
Aaron Zimba, Chen Hongsong, Wang Zhao-shun
The Infrastructure as a Service (IaaS) offering of cloud computing has come to alleviate some of the challenges associated with infrastructural investments and other related costs for enterprise users. However, hypervisor networks in IaaS environments are not immune to security breaches as the components therein tend to exhibit vulnerabilities which are exploited by attackers. Attackers chain together these vulnerabilities for effective attack path traversal in a given attack. The challenge has not been in identifying the vulnerable components but in capturing the dependencies amongst the vulnerabilities and statistically evaluating the effect exerted by one vulnerability unto another. In this paper, we capture the dependencies between vulnerabilities in hypervisor networks by aggregating incoming attack edges via disjunction and conjunction of attack events in the resultant Bayesian attack network. We illustrate the use of local conditional probabilities distributions at a given node to evaluate the likelihood of node exploitation for attack propagation under varying conditions. We further identify critical nodes and edges without which a given attack will not materialize and show how a security analyst can use such in the security mitigation process. We model the security status of the target node using a finite state machine where state transitions are induced by attack instances in the aggregated critical edge.
云计算的基础设施即服务(IaaS)产品减轻了企业用户与基础设施投资和其他相关成本相关的一些挑战。然而,IaaS环境中的虚拟机监控程序网络也不能幸免于安全漏洞,因为其中的组件往往会显示出被攻击者利用的漏洞。攻击者将这些漏洞链接在一起,以便在给定的攻击中有效地遍历攻击路径。挑战不在于识别易受攻击的组件,而在于捕获漏洞之间的依赖关系,并统计地评估一个漏洞对另一个漏洞所产生的影响。在本文中,我们通过在最终的贝叶斯攻击网络中通过分离和连接攻击事件来聚合入侵攻击边,从而捕获管理程序网络中漏洞之间的依赖关系。我们演示了在给定节点上使用局部条件概率分布来评估节点在不同条件下利用攻击传播的可能性。我们进一步确定了关键节点和边缘,没有这些节点和边缘,给定的攻击就不会实现,并展示了安全分析师如何在安全缓解过程中使用这些节点和边缘。我们使用有限状态机对目标节点的安全状态进行建模,其中状态转换由聚合临界边缘上的攻击实例引起。
{"title":"Edge aggregation based Bayesian modeling of cyber attacks in hypervisor-enabled IaaS cloud networks","authors":"Aaron Zimba, Chen Hongsong, Wang Zhao-shun","doi":"10.1109/ICCT.2017.8359847","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359847","url":null,"abstract":"The Infrastructure as a Service (IaaS) offering of cloud computing has come to alleviate some of the challenges associated with infrastructural investments and other related costs for enterprise users. However, hypervisor networks in IaaS environments are not immune to security breaches as the components therein tend to exhibit vulnerabilities which are exploited by attackers. Attackers chain together these vulnerabilities for effective attack path traversal in a given attack. The challenge has not been in identifying the vulnerable components but in capturing the dependencies amongst the vulnerabilities and statistically evaluating the effect exerted by one vulnerability unto another. In this paper, we capture the dependencies between vulnerabilities in hypervisor networks by aggregating incoming attack edges via disjunction and conjunction of attack events in the resultant Bayesian attack network. We illustrate the use of local conditional probabilities distributions at a given node to evaluate the likelihood of node exploitation for attack propagation under varying conditions. We further identify critical nodes and edges without which a given attack will not materialize and show how a security analyst can use such in the security mitigation process. We model the security status of the target node using a finite state machine where state transitions are induced by attack instances in the aggregated critical edge.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"99 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131788577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust energy efficiency power allocation algorithm for cognitive radio networks with rate constraints 具有速率约束的认知无线网络鲁棒能效功率分配算法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359755
Mingyue Zhou, Hao Yin, Hongzhi Wang
Most of traditional power allocation algorithms in the cognitive radio networks (CRNs) are often based on the assumption of perfect channel estimation. We investigate the power allocation algorithm by considering channel gain uncertainty where a primary ad-hoc network working in parallel with a secondary ad-hoc network. Reducing interference and saving energy are essential in radio resource management of cognitive radio networks. The objective is to minimum transmit power while guaranteeing both acceptable transmission data rate for secondary users (SUs) and interference constraints for primary users (PUs). Imperfect channel state information is considered by ellipsoid sets and the problem can be formulated to a second-order cone programming problem. We can solve the robust power allocation problem by a distributed algorithm efficiently. Numerical results verify that the proposed algorithm with rate constraints can get higher transmission performance for SUs.
在认知无线网络中,传统的功率分配算法大多基于完美信道估计的假设。在主自组网与从自组网并行工作的情况下,考虑信道增益的不确定性,对功率分配算法进行了研究。减少干扰和节约能源是认知无线网络无线电资源管理的关键。目标是在保证辅助用户(su)可接受的传输数据速率和主用户(pu)的干扰约束的同时,使传输功率最小。利用椭球集考虑不完全信道状态信息,将该问题转化为二阶锥规划问题。采用分布式算法可以有效地解决鲁棒功率分配问题。数值结果验证了该算法在速率约束下可以获得较高的单单元传输性能。
{"title":"Robust energy efficiency power allocation algorithm for cognitive radio networks with rate constraints","authors":"Mingyue Zhou, Hao Yin, Hongzhi Wang","doi":"10.1109/ICCT.2017.8359755","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359755","url":null,"abstract":"Most of traditional power allocation algorithms in the cognitive radio networks (CRNs) are often based on the assumption of perfect channel estimation. We investigate the power allocation algorithm by considering channel gain uncertainty where a primary ad-hoc network working in parallel with a secondary ad-hoc network. Reducing interference and saving energy are essential in radio resource management of cognitive radio networks. The objective is to minimum transmit power while guaranteeing both acceptable transmission data rate for secondary users (SUs) and interference constraints for primary users (PUs). Imperfect channel state information is considered by ellipsoid sets and the problem can be formulated to a second-order cone programming problem. We can solve the robust power allocation problem by a distributed algorithm efficiently. Numerical results verify that the proposed algorithm with rate constraints can get higher transmission performance for SUs.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132618596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the miller loop optimization of SM9 bilinear pairings SM9双线性配对铣床回路优化研究
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359619
P. Zhen, Yinzi Tu, Bingbing Xia, Jie Gan, Xiaoke Tang
SM9 is identity-based cryptography designed by bilinear pairing, which can effectively solve the certificates management problems of the PKI and constitutes an important part of Chinese commercial cryptography system. Due to the high complexity of bilinear pairing, SM9 still faces the problem of low efficiency, especially in resource-constrained environments, so performance becomes the key factor that hinders its wide application. This paper has explicitly analyzed detailed computation process of Miller loop in SM9 bilinear pairings and proposed the optimization methods for the point addition, point doubling and line function computation on BN curves. Furthermore, we compare the computational cost of Miller loop under the projective coordinate system and the Jacobian coordinate system and the results show that the latter can improve the efficiency by 5% than the former. The research is very important to optimize the SM9 the performance.
SM9是采用双线性配对设计的基于身份的密码体制,能有效解决PKI的证书管理问题,是我国商用密码体制的重要组成部分。由于双线性配对的高复杂性,SM9仍然面临效率低下的问题,特别是在资源受限的环境下,因此性能成为阻碍其广泛应用的关键因素。本文明确分析了SM9双线性配对中Miller环的详细计算过程,提出了BN曲线上点加法、点加倍和线函数计算的优化方法。对比了投影坐标系和雅可比坐标系下米勒环的计算成本,结果表明,雅可比坐标系下米勒环的计算效率比雅可比坐标系下米勒环的计算效率提高5%。该研究对优化SM9的性能具有重要意义。
{"title":"Research on the miller loop optimization of SM9 bilinear pairings","authors":"P. Zhen, Yinzi Tu, Bingbing Xia, Jie Gan, Xiaoke Tang","doi":"10.1109/ICCT.2017.8359619","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359619","url":null,"abstract":"SM9 is identity-based cryptography designed by bilinear pairing, which can effectively solve the certificates management problems of the PKI and constitutes an important part of Chinese commercial cryptography system. Due to the high complexity of bilinear pairing, SM9 still faces the problem of low efficiency, especially in resource-constrained environments, so performance becomes the key factor that hinders its wide application. This paper has explicitly analyzed detailed computation process of Miller loop in SM9 bilinear pairings and proposed the optimization methods for the point addition, point doubling and line function computation on BN curves. Furthermore, we compare the computational cost of Miller loop under the projective coordinate system and the Jacobian coordinate system and the results show that the latter can improve the efficiency by 5% than the former. The research is very important to optimize the SM9 the performance.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130862031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An optimized algorithm based on generalized difference expansion method used for HEVC reversible video information hiding 一种基于广义差分展开法的HEVC可逆视频信息隐藏优化算法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359914
Bo Peng, Jie Yang
HEVC, the latest video coding standard, is jointly developed by ISO/IEC and ITU-T. Based on HEVC, an optimized generalized difference expansion method for reversible video information hiding is realized. Firstly, 2N+1 values of the spatial point are obtained by constructing the N-dimensional motion vector space. Then the optimized generalized difference extended algorithm is used to embed the secret information into the value of the spatial point. Finally, without using the location map, this method can help to embed 2N + 1 bit secret information into the motion vector N-tuple C, and can recover the carrier video with little distortion during the extracting process. The experimental results show that the false noise ratio of the video image is more than 32db after the steganography process, and the bit rate is no more than 0.77%. These characteristics mean that the implement of the method will not distort the video and has good visual invisibility. During the extracting process, the embedded secret information can be extracted accurately. What's more, the original video can be restored without distortion. Therefore, this method is very useful for realizing the secret information hidden and restoring the carrier video without distortion.
HEVC是由ISO/IEC和ITU-T联合开发的最新视频编码标准。基于HEVC,实现了一种优化的可逆视频信息隐藏的广义差分展开方法。首先,通过构造n维运动向量空间,得到空间点的2N+1个值;然后利用优化后的广义差分扩展算法将秘密信息嵌入到空间点的值中。最后,在不使用位置图的情况下,该方法可以将2N + 1比特的秘密信息嵌入到运动向量n元组C中,并且可以在提取过程中以很小的失真恢复载体视频。实验结果表明,经过隐写处理后的视频图像的假噪声比大于32db,码率不大于0.77%。这些特点意味着该方法的实现不会使视频失真,具有良好的视觉不可见性。在提取过程中,可以准确地提取嵌入的秘密信息。更重要的是,原始视频可以不失真地恢复。因此,该方法对于实现隐藏的秘密信息和不失真地恢复载波视频是非常有用的。
{"title":"An optimized algorithm based on generalized difference expansion method used for HEVC reversible video information hiding","authors":"Bo Peng, Jie Yang","doi":"10.1109/ICCT.2017.8359914","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359914","url":null,"abstract":"HEVC, the latest video coding standard, is jointly developed by ISO/IEC and ITU-T. Based on HEVC, an optimized generalized difference expansion method for reversible video information hiding is realized. Firstly, 2N+1 values of the spatial point are obtained by constructing the N-dimensional motion vector space. Then the optimized generalized difference extended algorithm is used to embed the secret information into the value of the spatial point. Finally, without using the location map, this method can help to embed 2N + 1 bit secret information into the motion vector N-tuple C, and can recover the carrier video with little distortion during the extracting process. The experimental results show that the false noise ratio of the video image is more than 32db after the steganography process, and the bit rate is no more than 0.77%. These characteristics mean that the implement of the method will not distort the video and has good visual invisibility. During the extracting process, the embedded secret information can be extracted accurately. What's more, the original video can be restored without distortion. Therefore, this method is very useful for realizing the secret information hidden and restoring the carrier video without distortion.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"801 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133303137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Path planning under obstacle-avoidance constraints based on ant colony optimization algorithm 基于蚁群优化算法的避障约束下路径规划
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359869
Jie Chen, Fang Ye, T. Jiang
Taking the unmanned aerial vehicle (UAV) mission planning as the research background, we adopt the ant colony optimization algorithm (ACO) to establish an effective UAV path planning scheme under obstacle-avoidance constraint in this paper. UAV path planning is the basis and premise of UAV mission execution. The essence of UAV path planning is to obtain the feasible flight path planning from the starting point to the target point according to the specific task of UAV. Simultaneously, effective UAV path planning should reach the optimal performance while meeting the demand of different constraints. ACO is a swarm intelligence algorithm that ants cooperate with pheromone. That is, ACO has great scalability and robustness, which is compatible to UAV path planning problem. In this paper, taking the obstacle-avoidance constraint into consideration, we build an effective UAV path planning strategy based on ACO to acquire the shortest UAV route. Experiments and analyses demonstrate that, when the obstacle number gradually increased from one to three, the proposed algorithm can all achieve the optimal UAV path planning. Hence, the rationality and applicability of the proposed algorithm are verified. Besides, the proposed algorithm can still realize the optimal UAV path planning when further adding the obstacle number and increasing the complexity of multiple obstacles. Thus, the effectiveness and robustness of the proposed algorithm are ulteriorly proved. Accordingly, the proposed algorithm has certain practical significance.
本文以无人机(UAV)任务规划为研究背景,采用蚁群优化算法(ACO)建立了一种有效的避障约束下的无人机路径规划方案。无人机路径规划是无人机执行任务的基础和前提。无人机航迹规划的本质是根据无人机的具体任务,获得从起点到目标点的可行航迹规划。同时,有效的无人机路径规划应在满足不同约束条件的情况下达到最优性能。蚁群算法是蚂蚁与信息素合作的群体智能算法。即蚁群算法具有良好的可扩展性和鲁棒性,适用于无人机路径规划问题。本文在考虑避障约束的情况下,建立了一种有效的基于蚁群算法的无人机路径规划策略,以获取最短的无人机路径。实验和分析表明,当障碍物数从1个逐渐增加到3个时,所提算法均能实现无人机的最优路径规划。从而验证了所提算法的合理性和适用性。此外,在进一步增加障碍物数量和增加多障碍物复杂度的情况下,所提算法仍能实现无人机的最优路径规划。从而进一步证明了该算法的有效性和鲁棒性。因此,所提出的算法具有一定的实际意义。
{"title":"Path planning under obstacle-avoidance constraints based on ant colony optimization algorithm","authors":"Jie Chen, Fang Ye, T. Jiang","doi":"10.1109/ICCT.2017.8359869","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359869","url":null,"abstract":"Taking the unmanned aerial vehicle (UAV) mission planning as the research background, we adopt the ant colony optimization algorithm (ACO) to establish an effective UAV path planning scheme under obstacle-avoidance constraint in this paper. UAV path planning is the basis and premise of UAV mission execution. The essence of UAV path planning is to obtain the feasible flight path planning from the starting point to the target point according to the specific task of UAV. Simultaneously, effective UAV path planning should reach the optimal performance while meeting the demand of different constraints. ACO is a swarm intelligence algorithm that ants cooperate with pheromone. That is, ACO has great scalability and robustness, which is compatible to UAV path planning problem. In this paper, taking the obstacle-avoidance constraint into consideration, we build an effective UAV path planning strategy based on ACO to acquire the shortest UAV route. Experiments and analyses demonstrate that, when the obstacle number gradually increased from one to three, the proposed algorithm can all achieve the optimal UAV path planning. Hence, the rationality and applicability of the proposed algorithm are verified. Besides, the proposed algorithm can still realize the optimal UAV path planning when further adding the obstacle number and increasing the complexity of multiple obstacles. Thus, the effectiveness and robustness of the proposed algorithm are ulteriorly proved. Accordingly, the proposed algorithm has certain practical significance.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127812564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
SSL transmission delay optimization in multi-core processor based on network path delay prediction 基于网络路径延迟预测的多核处理器SSL传输延迟优化
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359787
Zheng-Zhi Tang, Xuewen Zeng, Jun Chen, Xiaozhou Ye
The secure sockets layer (SSL) protocol as a means of protecting the security of data transmission has been widely used. In this paper, to reduce the impact of poor network transmission on the overall delay of SSL transmission in an unstable network environment, a novel SSL transmission delay optimization algorithm based on network path delay prediction is introduced. We propose a locally weighted linear regression prediction algorithm based on sliding window and singular spectrum analysis to better adapt to the characteristics of network time-delay sequence. In an unstable network transmission environment, when the predicted TCP transmission delay fluctuates beyond a certain threshold, the optimization algorithm will calculate a new parallel degree of SSL data encryption and compression to make sure of an optimized overall delay of SSL transmission. But, in a stable network transmission environment, the TCP transmission delay slightly fluctuates and the parallel process takes no effect. It is significant, especially for a heavy-duty server, that it can dynamically and reasonably use the multi-core resources. The final SSL transmission experiment verifies the effectiveness of the proposed optimization algorithm.
安全套接字层(SSL)协议作为一种保护数据传输安全的手段得到了广泛的应用。为了在不稳定的网络环境下减少网络传输不良对SSL传输整体延迟的影响,本文提出了一种基于网络路径延迟预测的SSL传输延迟优化算法。为了更好地适应网络时延序列的特点,提出了一种基于滑动窗和奇异谱分析的局部加权线性回归预测算法。在不稳定的网络传输环境下,当预测的TCP传输延迟波动超过一定阈值时,优化算法将计算新的SSL数据加密和压缩并行度,以确保优化SSL传输的整体延迟。但是,在稳定的网络传输环境下,TCP的传输延迟会有轻微波动,并行处理不起作用。能够动态、合理地使用多核资源是非常重要的,特别是对于高负荷的服务器。最后的SSL传输实验验证了所提优化算法的有效性。
{"title":"SSL transmission delay optimization in multi-core processor based on network path delay prediction","authors":"Zheng-Zhi Tang, Xuewen Zeng, Jun Chen, Xiaozhou Ye","doi":"10.1109/ICCT.2017.8359787","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359787","url":null,"abstract":"The secure sockets layer (SSL) protocol as a means of protecting the security of data transmission has been widely used. In this paper, to reduce the impact of poor network transmission on the overall delay of SSL transmission in an unstable network environment, a novel SSL transmission delay optimization algorithm based on network path delay prediction is introduced. We propose a locally weighted linear regression prediction algorithm based on sliding window and singular spectrum analysis to better adapt to the characteristics of network time-delay sequence. In an unstable network transmission environment, when the predicted TCP transmission delay fluctuates beyond a certain threshold, the optimization algorithm will calculate a new parallel degree of SSL data encryption and compression to make sure of an optimized overall delay of SSL transmission. But, in a stable network transmission environment, the TCP transmission delay slightly fluctuates and the parallel process takes no effect. It is significant, especially for a heavy-duty server, that it can dynamically and reasonably use the multi-core resources. The final SSL transmission experiment verifies the effectiveness of the proposed optimization algorithm.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124268725","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signatures reconstruction based on parametric scattering model and the application in communication 基于参数散射模型的签名重构及其在通信中的应用
Pub Date : 2017-10-01 DOI: 10.1109/icct.2017.8359841
Shan Cui, Sheng Li, Hua Yan
Electromagnetic signal of target are formed from typical geometric shapes, these typical reflectors can be described as parametric scattering model. The signatures reconstruction method transforms the electromagnetic scattering field of each typical reflector in local coordinate system to the target coordinate system, considering distance difference and occlusion issue, calculates the total electromagnetic scattering field, the root-mean-square error, energy ratio and similarity between theory simulation data and synthesis scattering data fit well. The transmitting procedure only needs the parameters of these typical reflectors, the receiving terminal regenerates the original signal of all the viewing angles and all the frequency. So this signal processing method can be used for communication to improve information compression efficiency.
目标的电磁信号是由典型的几何形状形成的,这些典型的反射面可以用参数散射模型来描述。特征重构方法将各典型反射体在局部坐标系下的电磁散射场转换为目标坐标系,考虑距离差和遮挡问题,计算出理论仿真数据与综合散射数据的总电磁散射场、均方根误差、能量比和相似度均拟合良好。发射过程只需要这些典型反射器的参数,接收端就能再生出所有视角和所有频率的原始信号。因此,这种信号处理方法可以用于通信,提高信息压缩效率。
{"title":"Signatures reconstruction based on parametric scattering model and the application in communication","authors":"Shan Cui, Sheng Li, Hua Yan","doi":"10.1109/icct.2017.8359841","DOIUrl":"https://doi.org/10.1109/icct.2017.8359841","url":null,"abstract":"Electromagnetic signal of target are formed from typical geometric shapes, these typical reflectors can be described as parametric scattering model. The signatures reconstruction method transforms the electromagnetic scattering field of each typical reflector in local coordinate system to the target coordinate system, considering distance difference and occlusion issue, calculates the total electromagnetic scattering field, the root-mean-square error, energy ratio and similarity between theory simulation data and synthesis scattering data fit well. The transmitting procedure only needs the parameters of these typical reflectors, the receiving terminal regenerates the original signal of all the viewing angles and all the frequency. So this signal processing method can be used for communication to improve information compression efficiency.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124388989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A user mode implementation of filtering rule management plane using key-value store 一个使用键值存储的过滤规则管理平面的用户模式实现
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359974
R. Ando, Yuuki Takano, Shinsuke Miwa
With the rapid advance of network virtualization technology which realizes SDN (Software Defined Network) and Cloud computing, current networking environment has become more flexible, diversified and complex. At the same time, complex networking environment sometimes imposes a great burden on network administrators for coping with complicated filtering rules. In this paper we present a user mode support for centralized filtering rule management base. Proposed system enables us to handle fine grained traffic engineering functionality for diversified environment of Cloud and SDN. Our architecture adopts KV (Key-Value) based Datastore for handling a large scale of filtering rules. By leveraging Datastore for centralized access control of instances on virtualized environment, we can provide alternative access control framework for reducing the burden of managing complicated and dynamic filtering policy on instances (virtual machine) on virtualized networking environment. Besides, KV representation can simplify the filtering rule set and provide generic interfaces for querying. In experiment, we have prototyped a lightweight management plane for IP filtering. Access filtering rules including target IP address, prefix and gateway is represented as radix tree. It is shown that proposed method can achieve reasonable utilization in filtering IP packets.
随着实现软件定义网络(SDN)和云计算的网络虚拟化技术的飞速发展,当前的网络环境变得更加灵活、多样化和复杂。同时,复杂的网络环境有时会给网络管理员带来很大的负担,因为他们需要处理复杂的过滤规则。本文提出了一种用户模式支持的集中式过滤规则管理库。提出的系统使我们能够处理细粒度的流量工程功能,以适应云和SDN的多样化环境。我们的架构采用基于KV (Key-Value)的数据存储来处理大规模的过滤规则。通过利用Datastore对虚拟化环境中的实例进行集中访问控制,我们可以提供另一种访问控制框架,以减轻管理虚拟化网络环境中实例(虚拟机)上复杂的动态过滤策略的负担。此外,KV表示可以简化过滤规则集,并提供通用的查询接口。在实验中,我们建立了一个用于IP过滤的轻量级管理平面原型。接入过滤规则包括目的IP地址、前缀和网关,用基数树表示。实验结果表明,该方法在IP包过滤中得到了合理的利用。
{"title":"A user mode implementation of filtering rule management plane using key-value store","authors":"R. Ando, Yuuki Takano, Shinsuke Miwa","doi":"10.1109/ICCT.2017.8359974","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359974","url":null,"abstract":"With the rapid advance of network virtualization technology which realizes SDN (Software Defined Network) and Cloud computing, current networking environment has become more flexible, diversified and complex. At the same time, complex networking environment sometimes imposes a great burden on network administrators for coping with complicated filtering rules. In this paper we present a user mode support for centralized filtering rule management base. Proposed system enables us to handle fine grained traffic engineering functionality for diversified environment of Cloud and SDN. Our architecture adopts KV (Key-Value) based Datastore for handling a large scale of filtering rules. By leveraging Datastore for centralized access control of instances on virtualized environment, we can provide alternative access control framework for reducing the burden of managing complicated and dynamic filtering policy on instances (virtual machine) on virtualized networking environment. Besides, KV representation can simplify the filtering rule set and provide generic interfaces for querying. In experiment, we have prototyped a lightweight management plane for IP filtering. Access filtering rules including target IP address, prefix and gateway is represented as radix tree. It is shown that proposed method can achieve reasonable utilization in filtering IP packets.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114423844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel reciprocity improvement of secret key generation with loop-back transmissions 环回传输密钥生成的信道互易性改进
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359629
Linning Peng, Guyue Li, A. Hu
Secret key generation from wireless channel is an emerging technique to provide secure keys for message encryption. However, the measured channel state information (CSI) requires high reciprocity in order to obtain symmetric keys. In this paper, we propose a novel loop-back transmission scheme for time division duplex (TDD) systems, which is named as LB-TDD. The proposed LB-TDD scheme can effectively reduce the CSI non-reciprocity due to the hardware fingerprint interference and system synchronization offset. We initially discuss the benefits and optimizations of using LB-TDD for CSI reciprocity enhancement. After that, a secret key generation method based on orthogonal frequency division multiplexing (OFDM) probing signals is introduced. Finally, a channel model and a practical universal software radio peripheral (USRP) system is setup for both simulation and experimental verification. Evaluation results show that our proposed LB-TDD scheme can effectively eliminate CSI non-reciprocity for secret key generation.
无线信道密钥生成技术是一种新兴的为信息加密提供安全密钥的技术。然而,为了获得对称密钥,测量通道状态信息(CSI)需要高互易性。本文提出了一种新的时分双工(TDD)系统环路传输方案,称为LB-TDD。提出的LB-TDD方案可以有效地降低由于硬件指纹干扰和系统同步偏移造成的CSI非互易性。我们首先讨论了使用LB-TDD增强CSI互易性的好处和优化。然后,介绍了一种基于正交频分复用(OFDM)探测信号的密钥生成方法。最后,建立了信道模型和实用的通用软件无线电外设(USRP)系统,并进行了仿真和实验验证。评估结果表明,我们提出的LB-TDD方案可以有效地消除密钥生成中的CSI非互易性。
{"title":"Channel reciprocity improvement of secret key generation with loop-back transmissions","authors":"Linning Peng, Guyue Li, A. Hu","doi":"10.1109/ICCT.2017.8359629","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359629","url":null,"abstract":"Secret key generation from wireless channel is an emerging technique to provide secure keys for message encryption. However, the measured channel state information (CSI) requires high reciprocity in order to obtain symmetric keys. In this paper, we propose a novel loop-back transmission scheme for time division duplex (TDD) systems, which is named as LB-TDD. The proposed LB-TDD scheme can effectively reduce the CSI non-reciprocity due to the hardware fingerprint interference and system synchronization offset. We initially discuss the benefits and optimizations of using LB-TDD for CSI reciprocity enhancement. After that, a secret key generation method based on orthogonal frequency division multiplexing (OFDM) probing signals is introduced. Finally, a channel model and a practical universal software radio peripheral (USRP) system is setup for both simulation and experimental verification. Evaluation results show that our proposed LB-TDD scheme can effectively eliminate CSI non-reciprocity for secret key generation.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117020396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A D-S evidence theory fault diagnosis method based on MapReduce for SF6 high voltage switchgear 基于MapReduce的SF6高压开关柜D-S证据理论故障诊断方法
Pub Date : 2017-10-01 DOI: 10.1109/ICCT.2017.8359944
Hongxia Miao, Rui Ni, Kangkang Liu, Long He
As one of the AC and DC switching devices in power system, high voltage switchgear is mainly used for the control and protection of power systems. In order to meet the demand of large amount of data, many types, fast processing speed and high quality of fault diagnosis in large data environment, a parallel processing framework based on a data fusion fault diagnosis algorithm designed by D-S Evidence Theory is introduced, taking SF6 high voltage circuit breaker as an example in this paper. SF6 high voltage circuit breaker trip(closing) coil current, voltage and current time are selected as input of the diagnosis system, and six main fault types are selected as output of the diagnosis system in this paper. Considering the multi-level, multi-layer and multi-faceted advantages of multi-sensor data fusion, D-S evidence theory based on MapReduce framework is designed. The simulation shows that the requirements of mass rapid diagnosis of high voltage switch equipment can be satisfied. Compared with the traditional serial processing method, processing time can be reduced by 95 percent under situation of hundreds of megabytes data.
高压开关柜作为电力系统中交直流开关设备之一,主要用于电力系统的控制和保护。为了满足大数据环境下数据量大、类型多、处理速度快、故障诊断质量高的需求,本文以SF6高压断路器为例,介绍了一种基于D-S证据理论设计的数据融合故障诊断算法并行处理框架。本文选取SF6高压断路器脱扣(合闸)线圈电流、电压和电流时间作为诊断系统的输入,选取六种主要故障类型作为诊断系统的输出。考虑到多传感器数据融合多层次、多层、多方位的优势,设计了基于MapReduce框架的D-S证据理论。仿真结果表明,该方法能够满足高压开关设备批量快速诊断的要求。与传统的串行处理方法相比,在数百兆数据的情况下,处理时间可缩短95%。
{"title":"A D-S evidence theory fault diagnosis method based on MapReduce for SF6 high voltage switchgear","authors":"Hongxia Miao, Rui Ni, Kangkang Liu, Long He","doi":"10.1109/ICCT.2017.8359944","DOIUrl":"https://doi.org/10.1109/ICCT.2017.8359944","url":null,"abstract":"As one of the AC and DC switching devices in power system, high voltage switchgear is mainly used for the control and protection of power systems. In order to meet the demand of large amount of data, many types, fast processing speed and high quality of fault diagnosis in large data environment, a parallel processing framework based on a data fusion fault diagnosis algorithm designed by D-S Evidence Theory is introduced, taking SF6 high voltage circuit breaker as an example in this paper. SF6 high voltage circuit breaker trip(closing) coil current, voltage and current time are selected as input of the diagnosis system, and six main fault types are selected as output of the diagnosis system in this paper. Considering the multi-level, multi-layer and multi-faceted advantages of multi-sensor data fusion, D-S evidence theory based on MapReduce framework is designed. The simulation shows that the requirements of mass rapid diagnosis of high voltage switch equipment can be satisfied. Compared with the traditional serial processing method, processing time can be reduced by 95 percent under situation of hundreds of megabytes data.","PeriodicalId":199874,"journal":{"name":"2017 IEEE 17th International Conference on Communication Technology (ICCT)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117264893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 IEEE 17th International Conference on Communication Technology (ICCT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1