首页 > 最新文献

World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering最新文献

英文 中文
A Security Enhanced Lightweight Mobile Payment Scheme Based on Two Gateways 基于双网关的安全增强轻量级移动支付方案
Hakjun Lee, Jiye Kim, Jongho Moon, Dongwoo Kang, Dongho Won
The number of m-commerce users is exponentially increasing and the m-commerce has become popular because m-commerce allows us to pay for goods or services anytime, anywhere using mobile devices. A number of the mobile payment scheme has been proposed to ensure security requirements on m-commerce. However, several of them are vulnerable to various attacks. This paper proposes an enhanced lightweight mobile payment scheme based on two gateways. We show that the proposed scheme ensures necessary security requirements such as accountability, untraceability, unlinkability and double spending prevention. In addition, it is suitable for lightweight mobile payment environments by analyzing and comparing it with the related mobile payment scheme.
移动商务用户的数量呈指数级增长,移动商务已经变得流行,因为移动商务允许我们随时随地使用移动设备支付商品或服务。一些移动支付方案已经提出,以确保移动商务的安全要求。然而,其中一些很容易受到各种攻击。提出了一种基于双网关的增强型轻量级移动支付方案。我们表明,所提出的方案确保了必要的安全要求,如问责制、不可追溯性、不可链接性和双重支出预防。此外,通过与相关移动支付方案的分析和比较,该方案适用于轻量级移动支付环境。
{"title":"A Security Enhanced Lightweight Mobile Payment Scheme Based on Two Gateways","authors":"Hakjun Lee, Jiye Kim, Jongho Moon, Dongwoo Kang, Dongho Won","doi":"10.17706/IJCCE.2017.6.2.83-90","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.2.83-90","url":null,"abstract":"The number of m-commerce users is exponentially increasing and the m-commerce has become popular because m-commerce allows us to pay for goods or services anytime, anywhere using mobile devices. A number of the mobile payment scheme has been proposed to ensure security requirements on m-commerce. However, several of them are vulnerable to various attacks. This paper proposes an enhanced lightweight mobile payment scheme based on two gateways. We show that the proposed scheme ensures necessary security requirements such as accountability, untraceability, unlinkability and double spending prevention. In addition, it is suitable for lightweight mobile payment environments by analyzing and comparing it with the related mobile payment scheme.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82920046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Statistical Modeling of Mobile Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes 基于三重随机滤波标记泊松点过程的移动衰落信道统计建模
J. Daba, J. Dubois
Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke’s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal.
了解移动环境中随时间、频率和空间随机衰减的非各向同性散射多径信道的统计数据,对于准确检测无线和蜂窝通信系统中的接收信号至关重要。在本文中,我们推导了在优势视线存在的情况下,由多普勒效应对接收的照明信号引起的载频偏移的概率密度函数的随机模型。我们的推导是基于广义的克拉克散射模型和两波部分开发的散射模型,其中频移的统计分布显示与多普勒频移信号的功率谱密度一致。
{"title":"Statistical Modeling of Mobile Fading Channels Based on Triply Stochastic Filtered Marked Poisson Point Processes","authors":"J. Daba, J. Dubois","doi":"10.5281/ZENODO.1128836","DOIUrl":"https://doi.org/10.5281/ZENODO.1128836","url":null,"abstract":"Understanding the statistics of non-isotropic scattering multipath channels that fade randomly with respect to time, frequency, and space in a mobile environment is very crucial for the accurate detection of received signals in wireless and cellular communication systems. In this paper, we derive stochastic models for the probability density function (PDF) of the shift in the carrier frequency caused by the Doppler Effect on the received illuminating signal in the presence of a dominant line of sight. Our derivation is based on a generalized Clarke’s and a two-wave partially developed scattering models, where the statistical distribution of the frequency shift is shown to be consistent with the power spectral density of the Doppler shifted signal.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85007841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Dynamic Virtual Machines Placement in a Cloud Environment by Multi-Objective Programming 基于多目标规划的云环境下动态虚拟机布局
Han-Ying Kao, Yumin Yang
{"title":"Dynamic Virtual Machines Placement in a Cloud Environment by Multi-Objective Programming","authors":"Han-Ying Kao, Yumin Yang","doi":"10.17706/IJCCE.2017.6.3.193-200","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.3.193-200","url":null,"abstract":"","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91455795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automatic Recognition of Chinese Aspirated Sounds Pronounced by Japanese Students 日本学生汉语送音的自动识别
A. Hoshino
Chinese aspirates are usually difficult to pronounce for Japanese students. In particular, discriminating between the utterances of aspirated and unaspirated sounds is the most difficult to learn for them. For self-learning, an automatic judgment system was developed that enabled students to check their pronunciations using a computer. We extracted the features of correctly pronounced single-vowel bilabial aspirated sounds pa[p‘a], pi[p‘i], po[p‘o], and pu[p‘u] and unaspirated sounds of ba[pa], bi[pi], bo[po], and bu[pu] by observing the spectrum evolution of breathing power during both voice onset time (VOT), and the voiced period when uttered by 50 native Chinese speakers. We developed a high performance 35-channel computerized filter bank to analyze the evolution of the breathing power spectrum using MATLAB and automatically evaluated the utterances of 50 Japanese students. Using a high-resolution spectrogram, we closely examined the features in VOT closely and improve the criteria for a proper pronunciation. We applied our developed automatic recognition system with improved criteria to the utterances of the students, which passed the screening of native-Chinese speakers. Although our system rejected several samples passing the native speakers’ screening, the success rates were higher than 95% and 98% for aspirated and unaspirated sounds, respectively.
对日本学生来说,汉语的送气词通常很难发音。特别是,区分送气音和不送气音是他们最难学习的。在自学方面,开发了自动判断系统,使学生能够使用计算机检查自己的发音。通过观察50名母语为汉语的人在发声时间(VOT)和发声周期中呼吸力量的频谱演变,提取了正确发音的单元音双音送气音pa[p 'a]、pi[p 'i]、po[p 'o]和pu[p 'u]和非送气音ba[pa]、bi[pi]、bo[po]和bu[pu]的特征。我们开发了一个高性能的35通道计算机滤波组,利用MATLAB分析了呼吸功率谱的演变,并自动评估了50名日本学生的话语。使用高分辨率谱图,我们仔细检查了VOT的特征,并改进了正确发音的标准。我们将开发的自动识别系统应用于经改进的标准的学生语音识别系统,这些语音通过了母语为中文人士的筛选。虽然我们的系统拒绝了几个通过母语者筛选的样本,但对于送气音和非送气音,成功率分别高于95%和98%。
{"title":"Automatic Recognition of Chinese Aspirated Sounds Pronounced by Japanese Students","authors":"A. Hoshino","doi":"10.17706/IJCCE.2017.6.4.221-228","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.4.221-228","url":null,"abstract":"Chinese aspirates are usually difficult to pronounce for Japanese students. In particular, discriminating between the utterances of aspirated and unaspirated sounds is the most difficult to learn for them. For self-learning, an automatic judgment system was developed that enabled students to check their pronunciations using a computer. We extracted the features of correctly pronounced single-vowel bilabial aspirated sounds pa[p‘a], pi[p‘i], po[p‘o], and pu[p‘u] and unaspirated sounds of ba[pa], bi[pi], bo[po], and bu[pu] by observing the spectrum evolution of breathing power during both voice onset time (VOT), and the voiced period when uttered by 50 native Chinese speakers. We developed a high performance 35-channel computerized filter bank to analyze the evolution of the breathing power spectrum using MATLAB and automatically evaluated the utterances of 50 Japanese students. Using a high-resolution spectrogram, we closely examined the features in VOT closely and improve the criteria for a proper pronunciation. We applied our developed automatic recognition system with improved criteria to the utterances of the students, which passed the screening of native-Chinese speakers. Although our system rejected several samples passing the native speakers’ screening, the success rates were higher than 95% and 98% for aspirated and unaspirated sounds, respectively.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91116412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cross-Layer Congestion Control Algorithm Based on Traffic Reallocation in Wireless Sensor Network 基于流量再分配的无线传感器网络跨层拥塞控制算法
Huai-yu Wen, Wei Huo
Congestion is an essential problem in Wireless Sensor Networks (WSNs). In this paper, we present a traffic allocation and reallocation algorithm based cross-layer. There are mainly two parts in this framework: Efficient COgestion Traffic Allocation (ECOTA), Efficient COgestion DEection and Mitigation (ECODEM). By measuring Round Time of Trip (RTT), current traffic and node minimum energy of all paths, some low energy consumptions and short delay paths will be selected to increase the success rate of data transmission. When the congestion happens to Sensor Network, the congested areas will be detected by methods of checking node buffer and cross-layer state, and then nodes can quickly recover from congested situations by diverting the traffic to the non-congested area. Simulation results show that the proposed algorithm compared with COTA+CODEM can improve the success rate of packet delivery, reduce the transmission delay of end to end and improve the overall performance of the network.
拥塞是无线传感器网络中的一个重要问题。本文提出了一种基于跨层的流量分配和再分配算法。该框架主要包括两个部分:高效拥塞流量分配(ECOTA)和高效拥塞检测与缓解(ECODEM)。通过测量各路径的RTT (Round Time of Trip)、当前流量和节点最小能量,选择一些能耗低、时延短的路径,提高数据传输成功率。当传感器网络发生拥塞时,通过检查节点缓冲区和跨层状态的方法来检测拥塞区域,然后通过将流量引导到非拥塞区域来快速恢复拥塞状态。仿真结果表明,与COTA+CODEM相比,所提算法能够提高分组分发成功率,降低端到端传输延迟,提高网络整体性能。
{"title":"A Cross-Layer Congestion Control Algorithm Based on Traffic Reallocation in Wireless Sensor Network","authors":"Huai-yu Wen, Wei Huo","doi":"10.17706/IJCCE.2017.6.2.104-110","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.2.104-110","url":null,"abstract":"Congestion is an essential problem in Wireless Sensor Networks (WSNs). In this paper, we present a traffic allocation and reallocation algorithm based cross-layer. There are mainly two parts in this framework: Efficient COgestion Traffic Allocation (ECOTA), Efficient COgestion DEection and Mitigation (ECODEM). By measuring Round Time of Trip (RTT), current traffic and node minimum energy of all paths, some low energy consumptions and short delay paths will be selected to increase the success rate of data transmission. When the congestion happens to Sensor Network, the congested areas will be detected by methods of checking node buffer and cross-layer state, and then nodes can quickly recover from congested situations by diverting the traffic to the non-congested area. Simulation results show that the proposed algorithm compared with COTA+CODEM can improve the success rate of packet delivery, reduce the transmission delay of end to end and improve the overall performance of the network.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81356888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accurate Computation of Geometric Moments Using Non-symmetry and Anti-packing Model for Color Images 基于非对称和反填充模型的彩色图像几何矩精确计算
Yunping Zheng, Yi-Hsin Chang, M. Sarem
Accurate computation of geometric moments is very important in computer vision, image processing and pattern recognition. In this paper, inspired by the idea of bit-plane decomposition and accurate computation of geometric moments on binary images, we put forward an accurate and fast algorithm for the computation of geometric moments using Non-symmetry and Anti-packing Model (NAM) for color images, which takes O(N) time where N is the number of all NAM blocks. By taking four color images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’ as typical test objects, and by comparing our proposed NAM-based accurate algorithm with the popular Binary Tree (BT)-based accurate algorithm for computing the geometric moments, the theoretical and experimental results presented in this paper show that our NAM-based accurate algorithm can significantly improve the execution speed by 43.71%, 41.93%, 41.01%, and 38.63% over the BT-based accurate algorithm in images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’, respectively. Also, our NAM-based accurate algorithm can significantly improve the average execution speed by 41.32% over the BT-based accurate algorithm. Therefore, in the case of computing lower order moments of color images, our proposed accurate algorithm is much faster than the BT-based accurate algorithm.
几何矩的精确计算在计算机视觉、图像处理和模式识别中具有十分重要的意义。本文利用位平面分解和二值图像几何矩精确计算的思想,提出了一种基于非对称反填充模型(NAM)的彩色图像几何矩精确快速计算算法,该算法耗时O(N),其中N为所有NAM块的个数。以“Lena”、“Peppers”、“Frog”和“Fish”4张彩色图像为典型测试对象,将本文提出的基于nama的精确算法与流行的基于二叉树(Binary Tree, BT)的几何矩计算精确算法进行比较,理论和实验结果表明,在“Lena”图像上,基于nama的精确算法的执行速度比基于BT的精确算法显著提高43.71%、41.93%、41.01%和38.63%。分别是“辣椒”、“青蛙”和“鱼”。基于nama的精确算法比基于bt的精确算法平均执行速度提高了41.32%。因此,在计算彩色图像的低阶矩时,我们提出的精确算法比基于bp的精确算法要快得多。
{"title":"Accurate Computation of Geometric Moments Using Non-symmetry and Anti-packing Model for Color Images","authors":"Yunping Zheng, Yi-Hsin Chang, M. Sarem","doi":"10.17706/IJCCE.2017.6.1.19-28","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.1.19-28","url":null,"abstract":"Accurate computation of geometric moments is very important in computer vision, image processing and pattern recognition. In this paper, inspired by the idea of bit-plane decomposition and accurate computation of geometric moments on binary images, we put forward an accurate and fast algorithm for the computation of geometric moments using Non-symmetry and Anti-packing Model (NAM) for color images, which takes O(N) time where N is the number of all NAM blocks. By taking four color images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’ as typical test objects, and by comparing our proposed NAM-based accurate algorithm with the popular Binary Tree (BT)-based accurate algorithm for computing the geometric moments, the theoretical and experimental results presented in this paper show that our NAM-based accurate algorithm can significantly improve the execution speed by 43.71%, 41.93%, 41.01%, and 38.63% over the BT-based accurate algorithm in images ‘Lena’, ‘Peppers’, ‘Frog’, and ‘Fish’, respectively. Also, our NAM-based accurate algorithm can significantly improve the average execution speed by 41.32% over the BT-based accurate algorithm. Therefore, in the case of computing lower order moments of color images, our proposed accurate algorithm is much faster than the BT-based accurate algorithm.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86293638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1aq Protocol Simulator on NS-3 利用改进的Floyd-Warshall算法在NS-3上实现SPB IEEE 802.1aq协议模拟器
S. Ajila, Yoonsoon Chang
Ethernet has evolved to support various network topologies while maintaining its backward compatibility and simplicity. Virtualization of the provider’s Ethernet network enables support for finegrained services for different users. Spanning Tree Protocol (STP) meets these properties but, still could benefit from improvements on utilization and convergence time. Shortest Path Bridging (SPB, IEEE 802.1aq) has been developed to overcome the shortcomings of STP. This paper presents the design and implementation of an SPB simulator for NS-3. The modified version of Floyd-Warshall algorithm is used to compute routes. Multicast and unicast communications are simulated in SPBM (SPB Mac-in-Mac) mode to show the simulator’s capability. The results prove that the communication maintains the crucial property of SPB; congruency between multicast and unicast, and symmetry between forward and backward paths. The traffic route selected among candidate paths with the same cost is in accordance with the SPB standard. The contribution of this work is a powerful simulator that can be used to conduct experiments without the usual cost attached to the physical implementation.
以太网已经发展到支持各种网络拓扑结构,同时保持其向后兼容性和简单性。提供商的以太网网络的虚拟化支持为不同用户提供细粒度服务。生成树协议(STP)满足这些特性,但仍然可以从利用率和收敛时间的改进中获益。最短路径桥接(SPB, IEEE 802.1aq)是为了克服STP的缺点而发展起来的。本文介绍了NS-3的SPB模拟器的设计与实现。采用改进的Floyd-Warshall算法进行路由计算。在SPBM (SPB Mac-in-Mac)模式下对多播和单播通信进行了仿真,以展示模拟器的功能。结果表明,通信保持了SPB的关键特性;组播和单播之间的一致性,以及前后路径之间的对称性。在具有相同开销的候选路径中选择的流量路由符合SPB标准。这项工作的贡献是一个强大的模拟器,可以用来进行实验,而不需要通常的物理实现成本。
{"title":"Using Modified Floyd-Warshall Algorithm to Implement SPB IEEE 802.1aq Protocol Simulator on NS-3","authors":"S. Ajila, Yoonsoon Chang","doi":"10.17706/IJCCE.2017.6.1.1-18","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.1.1-18","url":null,"abstract":"Ethernet has evolved to support various network topologies while maintaining its backward compatibility and simplicity. Virtualization of the provider’s Ethernet network enables support for finegrained services for different users. Spanning Tree Protocol (STP) meets these properties but, still could benefit from improvements on utilization and convergence time. Shortest Path Bridging (SPB, IEEE 802.1aq) has been developed to overcome the shortcomings of STP. This paper presents the design and implementation of an SPB simulator for NS-3. The modified version of Floyd-Warshall algorithm is used to compute routes. Multicast and unicast communications are simulated in SPBM (SPB Mac-in-Mac) mode to show the simulator’s capability. The results prove that the communication maintains the crucial property of SPB; congruency between multicast and unicast, and symmetry between forward and backward paths. The traffic route selected among candidate paths with the same cost is in accordance with the SPB standard. The contribution of this work is a powerful simulator that can be used to conduct experiments without the usual cost attached to the physical implementation.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86301211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Considerations in Designing DCI (Data Centre Interconnect) in Full Mesh VPLS/ Multicast Enable WAN over OTV Tunne 在全网状VPLS/多播使能WAN over OTV隧道中设计DCI(数据中心互连)的考虑
A. Iqbal, Steve Benoit, U. Dar
VPLS/ MPLS is one of the most popular Wide Area Network (WAN) technologies used today by service providers. VPLS depends on pseudowires (PW) within Multiprotocol Label Switching (MPLS) network to emulate Ethernet connectivity in a full mesh topology, to multiple remote sites, sharing an Ethernet broadcast domain. As IP multicast services continue to be offered, many customers find it desirable to extend their multicast applications to remote sites, where traditional technologies fail to support such connectivity. A layer-2 VPN service using VPLS supports the extension of multicast services to remote sites. In this paper, the impact of a full mesh VPLS with the interoperability of Cisco Overlay Transport Virtualization (OTV) and multicast traffic has been analyzed. The paper concludes that an inadequately designed full mesh VPLS based WAN can have a significant negative impact on overall WAN performance in terms of reachability and packet loss for data, voice, and multicast traffic on the same customer edge (CE) device. The paper further proposes a design solution to avoid drastic impacts on the overall WAN performance when a large amount of multicast traffic is to be transported.
VPLS/ MPLS是目前服务提供商使用的最流行的广域网(WAN)技术之一。VPLS依赖于多协议标签交换(MPLS)网络中的伪线(PW)来模拟全网状拓扑中的以太网连接,到多个远程站点,共享以太网广播域。随着IP多播服务的不断提供,许多客户发现将他们的多播应用程序扩展到远程站点是可取的,而传统技术无法支持这种连接。使用VPLS的二层VPN业务支持将组播业务扩展到远端站点。本文分析了全网状VPLS对思科覆盖传输虚拟化(OTV)和多播业务互操作性的影响。本文的结论是,设计不充分的基于全网状VPLS的广域网会对同一客户边缘(CE)设备上的数据、语音和多播流量的可达性和数据包丢失方面的整体广域网性能产生重大负面影响。本文进一步提出了一种设计方案,以避免在大量组播流量传输时对广域网整体性能造成严重影响。
{"title":"Considerations in Designing DCI (Data Centre Interconnect) in Full Mesh VPLS/ Multicast Enable WAN over OTV Tunne","authors":"A. Iqbal, Steve Benoit, U. Dar","doi":"10.17706/ijcce.2017.6.2.127-136","DOIUrl":"https://doi.org/10.17706/ijcce.2017.6.2.127-136","url":null,"abstract":"VPLS/ MPLS is one of the most popular Wide Area Network (WAN) technologies used today by service providers. VPLS depends on pseudowires (PW) within Multiprotocol Label Switching (MPLS) network to emulate Ethernet connectivity in a full mesh topology, to multiple remote sites, sharing an Ethernet broadcast domain. As IP multicast services continue to be offered, many customers find it desirable to extend their multicast applications to remote sites, where traditional technologies fail to support such connectivity. A layer-2 VPN service using VPLS supports the extension of multicast services to remote sites. In this paper, the impact of a full mesh VPLS with the interoperability of Cisco Overlay Transport Virtualization (OTV) and multicast traffic has been analyzed. The paper concludes that an inadequately designed full mesh VPLS based WAN can have a significant negative impact on overall WAN performance in terms of reachability and packet loss for data, voice, and multicast traffic on the same customer edge (CE) device. The paper further proposes a design solution to avoid drastic impacts on the overall WAN performance when a large amount of multicast traffic is to be transported.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80659269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High-Performance and Robust Strategy of Active Location Detection in WLAN 无线局域网主动位置检测的高性能鲁棒策略
Siyu Zhan, Xufa Wang, Jianming Liao, Jieyan Liu, Yalan Ye
The development of wireless network technologies gives attackers the convenience to use advanced radio technologies to hide their positions in wireless networks. While location service is a hot research currently, there are few location strategies concentrate on locating an attacker equipped with advanced radio technologies. In order to locate the attackers and make a security wireless network environment, we present a localization strategy, named as Active Location Detection (ALD), to locate attackers, without depending on the true features of attackers’ signal. This process is robust against the attacks from these malicious users, using a finite horizon discrete Markov decision process (MDP). Furthermore, we qualitatively analyze the lower bound of ALD’s error rate. After our analysis, a common formula of the lower bound of ALD’s error rate is proved. Our simulations about ALD’s error rate demonstrate that ALD’s error rate is close to the lower bound of ALD’s error rate. As further noted, the theories about the lower bound of ALD’s error rate can also be applied to the range-free location systems.
无线网络技术的发展为攻击者利用先进的无线电技术隐藏其在无线网络中的位置提供了便利。虽然定位服务是当前研究的热点,但很少有针对先进无线技术的攻击者定位的定位策略。为了对攻击者进行定位,构建安全的无线网络环境,我们提出了一种不依赖攻击者信号真实特征的定位策略——主动定位检测(ALD)。该过程使用有限视界离散马尔可夫决策过程(MDP),对这些恶意用户的攻击具有鲁棒性。此外,我们定性地分析了ALD的误差率下界。经过我们的分析,证明了ALD误差率下界的一个通用公式。我们对ALD的误差率进行了仿真,结果表明ALD的误差率接近于ALD误差率的下界。进一步指出,关于ALD误差率下界的理论也可以应用于无距离定位系统。
{"title":"High-Performance and Robust Strategy of Active Location Detection in WLAN","authors":"Siyu Zhan, Xufa Wang, Jianming Liao, Jieyan Liu, Yalan Ye","doi":"10.17706/IJCCE.2017.6.1.67-74","DOIUrl":"https://doi.org/10.17706/IJCCE.2017.6.1.67-74","url":null,"abstract":"The development of wireless network technologies gives attackers the convenience to use advanced radio technologies to hide their positions in wireless networks. While location service is a hot research currently, there are few location strategies concentrate on locating an attacker equipped with advanced radio technologies. In order to locate the attackers and make a security wireless network environment, we present a localization strategy, named as Active Location Detection (ALD), to locate attackers, without depending on the true features of attackers’ signal. This process is robust against the attacks from these malicious users, using a finite horizon discrete Markov decision process (MDP). Furthermore, we qualitatively analyze the lower bound of ALD’s error rate. After our analysis, a common formula of the lower bound of ALD’s error rate is proved. Our simulations about ALD’s error rate demonstrate that ALD’s error rate is close to the lower bound of ALD’s error rate. As further noted, the theories about the lower bound of ALD’s error rate can also be applied to the range-free location systems.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78928317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment 一种基于NFC的移动支付认证密钥协议的攻击及解决方案
Chien‐Ming Chen, W. Fang, King-Hang Wang, Tsu-Yang Wu
The popularization of the word “Fin-tech” thanks to many non-technical individuals being amazed by the unconventional way of payments, such as mobile payment over NFC. Undoubtedly speaking security/privacy is considered as the most important factor when a new Fin-tech is introduced; at least psychologically, it is. Recently Seo et al. presented an authenticated key agreement protocol for mobile payment over NFC. The protocol intended to provide secure pairing over untrusted devices with client's anonymity and forward secrecy. Unfortunately, in this paper we found that their protocol is indeed very insecure when an attacker has different levels of network controls. We presented the man-in-the-middle attacks and the replay attacks against this protocol. Under these attacks the attackers can successfully impersonate an anonymous client or can tap the communication between two legitimate clients without being detected by anyone. Then we suggested some improvements, with adequate analysis, to avoid these problems.
“金融科技”一词的普及得益于许多非技术人士对非常规支付方式的惊叹,比如通过近场通信(NFC)进行的移动支付。毫无疑问,在引入新的金融技术时,安全/隐私被认为是最重要的因素;至少在心理上是这样的。最近Seo等人提出了一种NFC移动支付的认证密钥协议。该协议旨在为不受信任的设备提供安全的配对,并具有客户端的匿名性和前向保密性。不幸的是,在本文中我们发现,当攻击者拥有不同级别的网络控制时,他们的协议确实非常不安全。我们介绍了针对该协议的中间人攻击和重放攻击。在这些攻击中,攻击者可以成功地冒充一个匿名客户端,或者利用两个合法客户端之间的通信而不被任何人发现。然后我们提出了一些改进建议,并进行了充分的分析,以避免这些问题。
{"title":"Attacks and Solutions of an Authenticated Key Agreement Protocol Based on NFC for Mobile Payment","authors":"Chien‐Ming Chen, W. Fang, King-Hang Wang, Tsu-Yang Wu","doi":"10.17706/ijcce.2017.6.3.173-180","DOIUrl":"https://doi.org/10.17706/ijcce.2017.6.3.173-180","url":null,"abstract":"The popularization of the word “Fin-tech” thanks to many non-technical individuals being amazed by the unconventional way of payments, such as mobile payment over NFC. Undoubtedly speaking security/privacy is considered as the most important factor when a new Fin-tech is introduced; at least psychologically, it is. Recently Seo et al. presented an authenticated key agreement protocol for mobile payment over NFC. The protocol intended to provide secure pairing over untrusted devices with client's anonymity and forward secrecy. Unfortunately, in this paper we found that their protocol is indeed very insecure when an attacker has different levels of network controls. We presented the man-in-the-middle attacks and the replay attacks against this protocol. Under these attacks the attackers can successfully impersonate an anonymous client or can tap the communication between two legitimate clients without being detected by anyone. Then we suggested some improvements, with adequate analysis, to avoid these problems.","PeriodicalId":23787,"journal":{"name":"World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82285464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1