World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.2.83-90
Hakjun Lee, Jiye Kim, Jongho Moon, Dongwoo Kang, Dongho Won
The number of m-commerce users is exponentially increasing and the m-commerce has become popular because m-commerce allows us to pay for goods or services anytime, anywhere using mobile devices. A number of the mobile payment scheme has been proposed to ensure security requirements on m-commerce. However, several of them are vulnerable to various attacks. This paper proposes an enhanced lightweight mobile payment scheme based on two gateways. We show that the proposed scheme ensures necessary security requirements such as accountability, untraceability, unlinkability and double spending prevention. In addition, it is suitable for lightweight mobile payment environments by analyzing and comparing it with the related mobile payment scheme.
{"title":"A Security Enhanced Lightweight Mobile Payment Scheme Based on Two Gateways","authors":"Hakjun Lee, Jiye Kim, Jongho Moon, Dongwoo Kang, Dongho Won","doi":"10.17706/IJCCE.2017.6.2.83-90","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.2.83-90","url":null,"abstract":"The number of m-commerce users is exponentially increasing and the m-commerce has become popular because m-commerce allows us to pay for goods or services anytime, anywhere using mobile devices. A number of the mobile payment scheme has been proposed to ensure security requirements on m-commerce. However, several of them are vulnerable to various attacks. This paper proposes an enhanced lightweight mobile payment scheme based on two gateways. We show that the proposed scheme ensures necessary security requirements such as accountability, untraceability, unlinkability and double spending prevention. In addition, it is suitable for lightweight mobile payment environments by analyzing and comparing it with the related mobile payment scheme.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82920046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke’s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal.
{"title":"Statistical Modeling of Mobile Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes","authors":"J. Daba, J. Dubois","doi":"10.5281/ZENODO.1128836","DOIUrl":"https://doi.org/10.5281/ZENODO.1128836","url":null,"abstract":"Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke’s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85007841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.3.193-200
Han-Ying Kao, Yumin Yang
{"title":"Dynamic Virtual Machines Placement in a Cloud Environment by Multi-Objective Programming","authors":"Han-Ying Kao, Yumin Yang","doi":"10.17706/IJCCE.2017.6.3.193-200","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.3.193-200","url":null,"abstract":"","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91455795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.4.221-228
A. Hoshino
Chinese aspirates are usually difficult to pronounce for Japanese students. In particular, discriminating between the utterances of aspirated and unaspirated sounds is the most difficult to learn for them. For self-learning, an automatic judgment system was developed that enabled students to check their pronunciations using a computer. We extracted the features of correctly pronounced single-vowel bilabial aspirated sounds pa[p‘a], pi[p‘i], po[p‘o], and pu[p‘u] and unaspirated sounds of ba[pa], bi[pi], bo[po], and bu[pu] by observing the spectrum evolution of breathing power during both voice onset time (VOT), and the voiced period when uttered by 50 native Chinese speakers. We developed a high performance 35-channel computerized filter bank to analyze the evolution of the breathing power spectrum using MATLAB and automatically evaluated the utterances of 50 Japanese students. Using a high-resolution spectrogram, we closely examined the features in VOT closely and improve the criteria for a proper pronunciation. We applied our developed automatic recognition system with improved criteria to the utterances of the students, which passed the screening of native-Chinese speakers. Although our system rejected several samples passing the native speakers’ screening, the success rates were higher than 95% and 98% for aspirated and unaspirated sounds, respectively.
{"title":"Automatic Recognition of Chinese Aspirated Sounds Pronounced by Japanese Students","authors":"A. Hoshino","doi":"10.17706/IJCCE.2017.6.4.221-228","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.4.221-228","url":null,"abstract":"Chinese aspirates are usually difficult to pronounce for Japanese students. In particular, discriminating between the utterances of aspirated and unaspirated sounds is the most difficult to learn for them. For self-learning, an automatic judgment system was developed that enabled students to check their pronunciations using a computer. We extracted the features of correctly pronounced single-vowel bilabial aspirated sounds pa[p‘a], pi[p‘i], po[p‘o], and pu[p‘u] and unaspirated sounds of ba[pa], bi[pi], bo[po], and bu[pu] by observing the spectrum evolution of breathing power during both voice onset time (VOT), and the voiced period when uttered by 50 native Chinese speakers. We developed a high performance 35-channel computerized filter bank to analyze the evolution of the breathing power spectrum using MATLAB and automatically evaluated the utterances of 50 Japanese students. Using a high-resolution spectrogram, we closely examined the features in VOT closely and improve the criteria for a proper pronunciation. We applied our developed automatic recognition system with improved criteria to the utterances of the students, which passed the screening of native-Chinese speakers. Although our system rejected several samples passing the native speakers’ screening, the success rates were higher than 95% and 98% for aspirated and unaspirated sounds, respectively.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91116412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.2.104-110
Huai-yu Wen, Wei Huo
Congestion is an essential problem in Wireless Sensor Networks (WSNs). In this paper, we present a traffic allocation and reallocation algorithm based cross-layer. There are mainly two parts in this framework: Efficient COgestion Traffic Allocation (ECOTA), Efficient COgestion DEection and Mitigation (ECODEM). By measuring Round Time of Trip (RTT), current traffic and node minimum energy of all paths, some low energy consumptions and short delay paths will be selected to increase the success rate of data transmission. When the congestion happens to Sensor Network, the congested areas will be detected by methods of checking node buffer and cross-layer state, and then nodes can quickly recover from congested situations by diverting the traffic to the non-congested area. Simulation results show that the proposed algorithm compared with COTA+CODEM can improve the success rate of packet delivery, reduce the transmission delay of end to end and improve the overall performance of the network.
拥塞是无线传感器网络中的一个重要问题。本文提出了一种基于跨层的流量分配和再分配算法。该框架主要包括两个部分:高效拥塞流量分配(ECOTA)和高效拥塞检测与缓解(ECODEM)。通过测量各路径的RTT (Round Time of Trip)、当前流量和节点最小能量,选择一些能耗低、时延短的路径,提高数据传输成功率。当传感器网络发生拥塞时,通过检查节点缓冲区和跨层状态的方法来检测拥塞区域,然后通过将流量引导到非拥塞区域来快速恢复拥塞状态。仿真结果表明,与COTA+CODEM相比,所提算法能够提高分组分发成功率,降低端到端传输延迟,提高网络整体性能。
{"title":"A Cross-Layer Congestion Control Algorithm Based on Traffic Reallocation in Wireless Sensor Network","authors":"Huai-yu Wen, Wei Huo","doi":"10.17706/IJCCE.2017.6.2.104-110","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.2.104-110","url":null,"abstract":"Congestion is an essential problem in Wireless Sensor Networks (WSNs). In this paper, we present a traffic allocation and reallocation algorithm based cross-layer. There are mainly two parts in this framework: Efficient COgestion Traffic Allocation (ECOTA), Efficient COgestion DEection and Mitigation (ECODEM). By measuring Round Time of Trip (RTT), current traffic and node minimum energy of all paths, some low energy consumptions and short delay paths will be selected to increase the success rate of data transmission. When the congestion happens to Sensor Network, the congested areas will be detected by methods of checking node buffer and cross-layer state, and then nodes can quickly recover from congested situations by diverting the traffic to the non-congested area. Simulation results show that the proposed algorithm compared with COTA+CODEM can improve the success rate of packet delivery, reduce the transmission delay of end to end and improve the overall performance of the network.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81356888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.1.19-28
Yunping Zheng, Yi-Hsin Chang, M. Sarem
Accurate computation of geometric moments is very important in computer vision, image processing and pattern recognition. In this paper, inspired by the idea of bit-plane decomposition and accurate computation of geometric moments on binary images, we put forward an accurate and fast algorithm for the computation of geometric moments using Non-symmetry and Anti-packing Model (NAM) for color images, which takes O(N) time where N is the number of all NAM blocks. By taking four color images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’ as typical test objects, and by comparing our proposed NAM-based accurate algorithm with the popular Binary Tree (BT)-based accurate algorithm for computing the geometric moments, the theoretical and experimental results presented in this paper show that our NAM-based accurate algorithm can significantly improve the execution speed by 43.71%, 41.93%, 41.01%, and 38.63% over the BT-based accurate algorithm in images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’, respectively. Also, our NAM-based accurate algorithm can significantly improve the average execution speed by 41.32% over the BT-based accurate algorithm. Therefore, in the case of computing lower order moments of color images, our proposed accurate algorithm is much faster than the BT-based accurate algorithm.
{"title":"Accurate Computation of Geometric Moments Using Non-symmetry and Anti-packing Model for Color Images","authors":"Yunping Zheng, Yi-Hsin Chang, M. Sarem","doi":"10.17706/IJCCE.2017.6.1.19-28","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.1.19-28","url":null,"abstract":"Accurate computation of geometric moments is very important in computer vision, image processing and pattern recognition. In this paper, inspired by the idea of bit-plane decomposition and accurate computation of geometric moments on binary images, we put forward an accurate and fast algorithm for the computation of geometric moments using Non-symmetry and Anti-packing Model (NAM) for color images, which takes O(N) time where N is the number of all NAM blocks. By taking four color images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’ as typical test objects, and by comparing our proposed NAM-based accurate algorithm with the popular Binary Tree (BT)-based accurate algorithm for computing the geometric moments, the theoretical and experimental results presented in this paper show that our NAM-based accurate algorithm can significantly improve the execution speed by 43.71%, 41.93%, 41.01%, and 38.63% over the BT-based accurate algorithm in images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’, respectively. Also, our NAM-based accurate algorithm can significantly improve the average execution speed by 41.32% over the BT-based accurate algorithm. Therefore, in the case of computing lower order moments of color images, our proposed accurate algorithm is much faster than the BT-based accurate algorithm.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86293638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.1.1-18
S. Ajila, Yoonsoon Chang
Ethernet has evolved to support various network topologies while maintaining its backward compatibility and simplicity. Virtualization of the provider’s Ethernet network enables support for finegrained services for different users. Spanning Tree Protocol (STP) meets these properties but, still could benefit from improvements on utilization and convergence time. Shortest Path Bridging (SPB, IEEE 802.1aq) has been developed to overcome the shortcomings of STP. This paper presents the design and implementation of an SPB simulator for NS-3. The modified version of Floyd-Warshall algorithm is used to compute routes. Multicast and unicast communications are simulated in SPBM (SPB Mac-in-Mac) mode to show the simulator’s capability. The results prove that the communication maintains the crucial property of SPB; congruency between multicast and unicast, and symmetry between forward and backward paths. The traffic route selected among candidate paths with the same cost is in accordance with the SPB standard. The contribution of this work is a powerful simulator that can be used to conduct experiments without the usual cost attached to the physical implementation.
{"title":"Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1aq Protocol Simulator on NS-3","authors":"S. Ajila, Yoonsoon Chang","doi":"10.17706/IJCCE.2017.6.1.1-18","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.1.1-18","url":null,"abstract":"Ethernet has evolved to support various network topologies while maintaining its backward compatibility and simplicity. Virtualization of the provider’s Ethernet network enables support for finegrained services for different users. Spanning Tree Protocol (STP) meets these properties but, still could benefit from improvements on utilization and convergence time. Shortest Path Bridging (SPB, IEEE 802.1aq) has been developed to overcome the shortcomings of STP. This paper presents the design and implementation of an SPB simulator for NS-3. The modified version of Floyd-Warshall algorithm is used to compute routes. Multicast and unicast communications are simulated in SPBM (SPB Mac-in-Mac) mode to show the simulator’s capability. The results prove that the communication maintains the crucial property of SPB; congruency between multicast and unicast, and symmetry between forward and backward paths. The traffic route selected among candidate paths with the same cost is in accordance with the SPB standard. The contribution of this work is a powerful simulator that can be used to conduct experiments without the usual cost attached to the physical implementation.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86301211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/ijcce.2017.6.2.127-136
A. Iqbal, Steve Benoit, U. Dar
VPLS/ MPLS is one of the most popular Wide Area Network (WAN) technologies used today by service providers. VPLS depends on pseudowires (PW) within Multiprotocol Label Switching (MPLS) network to emulate Ethernet connectivity in a full mesh topology, to multiple remote sites, sharing an Ethernet broadcast domain. As IP multicast services continue to be offered, many customers find it desirable to extend their multicast applications to remote sites, where traditional technologies fail to support such connectivity. A layer-2 VPN service using VPLS supports the extension of multicast services to remote sites. In this paper, the impact of a full mesh VPLS with the interoperability of Cisco Overlay Transport Virtualization (OTV) and multicast traffic has been analyzed. The paper concludes that an inadequately designed full mesh VPLS based WAN can have a significant negative impact on overall WAN performance in terms of reachability and packet loss for data, voice, and multicast traffic on the same customer edge (CE) device. The paper further proposes a design solution to avoid drastic impacts on the overall WAN performance when a large amount of multicast traffic is to be transported.
{"title":"Considerations in Designing DCI (Data Centre Interconnect) in Full Mesh VPLS/ Multicast Enable WAN over OTV Tunne","authors":"A. Iqbal, Steve Benoit, U. Dar","doi":"10.17706/ijcce.2017.6.2.127-136","DOIUrl":"https://doi.org/10.17706/ijcce.2017.6.2.127-136","url":null,"abstract":"VPLS/ MPLS is one of the most popular Wide Area Network (WAN) technologies used today by service providers. VPLS depends on pseudowires (PW) within Multiprotocol Label Switching (MPLS) network to emulate Ethernet connectivity in a full mesh topology, to multiple remote sites, sharing an Ethernet broadcast domain. As IP multicast services continue to be offered, many customers find it desirable to extend their multicast applications to remote sites, where traditional technologies fail to support such connectivity. A layer-2 VPN service using VPLS supports the extension of multicast services to remote sites. In this paper, the impact of a full mesh VPLS with the interoperability of Cisco Overlay Transport Virtualization (OTV) and multicast traffic has been analyzed. The paper concludes that an inadequately designed full mesh VPLS based WAN can have a significant negative impact on overall WAN performance in terms of reachability and packet loss for data, voice, and multicast traffic on the same customer edge (CE) device. The paper further proposes a design solution to avoid drastic impacts on the overall WAN performance when a large amount of multicast traffic is to be transported.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80659269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/IJCCE.2017.6.1.67-74
Siyu Zhan, Xufa Wang, Jianming Liao, Jieyan Liu, Yalan Ye
The development of wireless network technologies gives attackers the convenience to use advanced radio technologies to hide their positions in wireless networks. While location service is a hot research currently, there are few location strategies concentrate on locating an attacker equipped with advanced radio technologies. In order to locate the attackers and make a security wireless network environment, we present a localization strategy, named as Active Location Detection (ALD), to locate attackers, without depending on the true features of attackers’ signal. This process is robust against the attacks from these malicious users, using a finite horizon discrete Markov decision process (MDP). Furthermore, we qualitatively analyze the lower bound of ALD’s error rate. After our analysis, a common formula of the lower bound of ALD’s error rate is proved. Our simulations about ALD’s error rate demonstrate that ALD’s error rate is close to the lower bound of ALD’s error rate. As further noted, the theories about the lower bound of ALD’s error rate can also be applied to the range-free location systems.
{"title":"High-Performance and Robust Strategy of Active Location Detection in WLAN","authors":"Siyu Zhan, Xufa Wang, Jianming Liao, Jieyan Liu, Yalan Ye","doi":"10.17706/IJCCE.2017.6.1.67-74","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.1.67-74","url":null,"abstract":"The development of wireless network technologies gives attackers the convenience to use advanced radio technologies to hide their positions in wireless networks. While location service is a hot research currently, there are few location strategies concentrate on locating an attacker equipped with advanced radio technologies. In order to locate the attackers and make a security wireless network environment, we present a localization strategy, named as Active Location Detection (ALD), to locate attackers, without depending on the true features of attackers’ signal. This process is robust against the attacks from these malicious users, using a finite horizon discrete Markov decision process (MDP). Furthermore, we qualitatively analyze the lower bound of ALD’s error rate. After our analysis, a common formula of the lower bound of ALD’s error rate is proved. Our simulations about ALD’s error rate demonstrate that ALD’s error rate is close to the lower bound of ALD’s error rate. As further noted, the theories about the lower bound of ALD’s error rate can also be applied to the range-free location systems.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78928317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-01-01DOI: 10.17706/ijcce.2017.6.3.173-180
Chien‐Ming Chen, W. Fang, King-Hang Wang, Tsu-Yang Wu
The popularization of the word “Fin-tech” thanks to many non-technical individuals being amazed by the unconventional way of payments, such as mobile payment over NFC. Undoubtedly speaking security/privacy is considered as the most important factor when a new Fin-tech is introduced; at least psychologically, it is. Recently Seo et al. presented an authenticated key agreement protocol for mobile payment over NFC. The protocol intended to provide secure pairing over untrusted devices with client's anonymity and forward secrecy. Unfortunately, in this paper we found that their protocol is indeed very insecure when an attacker has different levels of network controls. We presented the man-in-the-middle attacks and the replay attacks against this protocol. Under these attacks the attackers can successfully impersonate an anonymous client or can tap the communication between two legitimate clients without being detected by anyone. Then we suggested some improvements, with adequate analysis, to avoid these problems.
{"title":"Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment","authors":"Chien‐Ming Chen, W. Fang, King-Hang Wang, Tsu-Yang Wu","doi":"10.17706/ijcce.2017.6.3.173-180","DOIUrl":"https://doi.org/10.17706/ijcce.2017.6.3.173-180","url":null,"abstract":"The popularization of the word “Fin-tech” thanks to many non-technical individuals being amazed by the unconventional way of payments, such as mobile payment over NFC. Undoubtedly speaking security/privacy is considered as the most important factor when a new Fin-tech is introduced; at least psychologically, it is. Recently Seo et al. presented an authenticated key agreement protocol for mobile payment over NFC. The protocol intended to provide secure pairing over untrusted devices with client's anonymity and forward secrecy. Unfortunately, in this paper we found that their protocol is indeed very insecure when an attacker has different levels of network controls. We presented the man-in-the-middle attacks and the replay attacks against this protocol. Under these attacks the attackers can successfully impersonate an anonymous client or can tap the communication between two legitimate clients without being detected by anyone. Then we suggested some improvements, with adequate analysis, to avoid these problems.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82285464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering