首页 > 最新文献

Future Generation Communication and Networking (FGCN 2007)最新文献

英文 中文
Digital Codec Design for RFID Tag Based on Cryptographic Authentication Protocol 基于加密认证协议的RFID标签数字编解码器设计
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.105
Jin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang
In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three different types of protocol frame formats are formed by extending the ISO/IEC 18000-3 standard[3] for implementing the proposed authentication protocol in RFID system environment. The system has been described in Verilog HDL and also synthesized using Synopsys Design Compiler with Hynix 0.25 mum standard-cell library. From implementation results, we found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.
本文首先提出了一种满足标签持有者隐私保护的加密认证协议,然后基于该协议设计了RFID标签的数字编解码器。该协议采用加密哈希算法,基于三向质询响应认证方案。此外,我们将展示如何通过扩展ISO/IEC 18000-3标准[3]来形成三种不同类型的协议帧格式,以便在RFID系统环境中实现所建议的身份验证协议。该系统用Verilog HDL语言进行了描述,并使用Hynix 0.25 mum标准单元库的Synopsys Design Compiler进行了合成。从实施结果来看,我们发现所提出的方案可以很好地实现健壮的RFID系统抵御主动攻击,如中间人攻击。
{"title":"Digital Codec Design for RFID Tag Based on Cryptographic Authentication Protocol","authors":"Jin-Oh Jeon, Su-Bong Ryu, Tae-Min Chang, Ho-Yong Choi, Min-Sup Kang","doi":"10.1109/FGCN.2007.105","DOIUrl":"https://doi.org/10.1109/FGCN.2007.105","url":null,"abstract":"In this paper, we first propose a cryptographic authentication protocol which meets the privacy protection for tag bearers, and then a digital Codec for RFID tag is designed based on the protocol. The protocol which uses cryptographic hash algorithm is based on a three-way challenge response authentication scheme. In addition, we will show how the three different types of protocol frame formats are formed by extending the ISO/IEC 18000-3 standard[3] for implementing the proposed authentication protocol in RFID system environment. The system has been described in Verilog HDL and also synthesized using Synopsys Design Compiler with Hynix 0.25 mum standard-cell library. From implementation results, we found that the proposed scheme is well suite to implement robust RFID system against active attacks such as the man-in-the-middle attack.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130530555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Home Device Authentication Method Based on PKI 基于PKI的家庭设备认证方法
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.143
Yun-kyung Lee, Deok-Gyu Lee, J. Han
As home network service is popularized, the kind of smart device is rising up and home appliances are becoming intelligent. Device authentication process is necessary that we safely use these devices and construct secure home network environment. In this paper, we proposed home device authentication framework and home device certificate profile. And also we describe home device registration process and home device certificate issuing process. Our home device certificate profile is based on the internet X.509 version 3 certificate. And our device authentication framework adheres to basic concept of general PKI.
随着家庭网络服务的普及,智能设备的种类越来越多,家电也越来越智能化。设备认证过程是我们安全使用这些设备和构建安全的家庭网络环境所必需的。本文提出了家庭设备认证框架和家庭设备证书配置文件。介绍了家用设备注册流程和家用设备证书颁发流程。我们的家庭设备证书配置文件基于internet X.509版本3证书。我们的设备认证框架遵循了一般PKI的基本概念。
{"title":"Home Device Authentication Method Based on PKI","authors":"Yun-kyung Lee, Deok-Gyu Lee, J. Han","doi":"10.1109/FGCN.2007.143","DOIUrl":"https://doi.org/10.1109/FGCN.2007.143","url":null,"abstract":"As home network service is popularized, the kind of smart device is rising up and home appliances are becoming intelligent. Device authentication process is necessary that we safely use these devices and construct secure home network environment. In this paper, we proposed home device authentication framework and home device certificate profile. And also we describe home device registration process and home device certificate issuing process. Our home device certificate profile is based on the internet X.509 version 3 certificate. And our device authentication framework adheres to basic concept of general PKI.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130621408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Research on a Model of Context-driven Similarities Computation between Data Objects 一种上下文驱动的数据对象相似度计算模型研究
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.192
Haixue Liu, Zhao Lv, Junzhong Gu
A practical problem that has been more and more acknowledged is how to measure similarities of data objects. With high interconnectivity to heterogeneous information sources, the primary issue in many applications such as retrieval, interoperability, etc, is focused on determining which data is relevant. Many methods for measuring have been investigated. We propose a complementary approach, based on context information to enhance "understanding" of object-to-object associations, which measures similarities of data objects that are an abstraction from real world. In our method, confidence level on similarities can be greatly improved by "observing" data objects from multi-perspectives. It is also demonstrated by our experiments that this approach is effective as compared to other computation approaches.
如何度量数据对象的相似度是一个越来越受到重视的实际问题。由于与异构信息源的高度互连性,许多应用程序(如检索、互操作性等)中的主要问题集中在确定哪些数据是相关的。人们研究了许多测量方法。我们提出了一种基于上下文信息的补充方法,以增强对对象到对象关联的“理解”,该方法测量来自现实世界的抽象数据对象的相似性。在我们的方法中,通过从多角度“观察”数据对象,相似性的置信度可以大大提高。实验也证明了该方法与其他计算方法相比是有效的。
{"title":"Research on a Model of Context-driven Similarities Computation between Data Objects","authors":"Haixue Liu, Zhao Lv, Junzhong Gu","doi":"10.1109/FGCN.2007.192","DOIUrl":"https://doi.org/10.1109/FGCN.2007.192","url":null,"abstract":"A practical problem that has been more and more acknowledged is how to measure similarities of data objects. With high interconnectivity to heterogeneous information sources, the primary issue in many applications such as retrieval, interoperability, etc, is focused on determining which data is relevant. Many methods for measuring have been investigated. We propose a complementary approach, based on context information to enhance \"understanding\" of object-to-object associations, which measures similarities of data objects that are an abstraction from real world. In our method, confidence level on similarities can be greatly improved by \"observing\" data objects from multi-perspectives. It is also demonstrated by our experiments that this approach is effective as compared to other computation approaches.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124030106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Numerical Methods for Efficient and Reliable Segmentation 高效可靠分割的新数值方法
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.171
Hongseok Choi, Seongjai Kim
This article is concerned with efficiency and reliability issues related to level set-based segmentation methods. Geometric active contour methods show some desirable characteristics: flexibility in the topological changes of contours, capability of detecting interior boundaries, and a low sensitivity to noise. However, they tend to detect undesired boundaries when applied to general images. In order to overcome the drawback, we introduce the method of background subtraction (MBS), which transforms a general image to an essentially binary image and therefore conventional segmentation methods can detect desired edges more effectively. An effective initialization technique for the level set function and a hybridization of information from both the intensity and statistical properties (distributions) are also introduced to improve efficiency and reliability of level set-based segmentation methods. The resulting algorithm has proved to locate the desired edges in 2-4 iterations, for various images.
本文研究了基于水平集的分割方法的效率和可靠性问题。几何主动轮廓法具有轮廓拓扑变化的灵活性、检测内部边界的能力和对噪声的低灵敏度等优点。然而,当应用于一般图像时,它们倾向于检测不需要的边界。为了克服这一缺点,我们引入了背景减除(MBS)方法,该方法将一般图像转换为本质上的二值图像,因此传统的分割方法可以更有效地检测到所需的边缘。为了提高基于水平集的分割方法的效率和可靠性,还引入了一种有效的水平集函数初始化技术以及强度和统计属性(分布)信息的杂交。所得到的算法已被证明可以在2-4次迭代中定位所需的边缘,适用于各种图像。
{"title":"Novel Numerical Methods for Efficient and Reliable Segmentation","authors":"Hongseok Choi, Seongjai Kim","doi":"10.1109/FGCN.2007.171","DOIUrl":"https://doi.org/10.1109/FGCN.2007.171","url":null,"abstract":"This article is concerned with efficiency and reliability issues related to level set-based segmentation methods. Geometric active contour methods show some desirable characteristics: flexibility in the topological changes of contours, capability of detecting interior boundaries, and a low sensitivity to noise. However, they tend to detect undesired boundaries when applied to general images. In order to overcome the drawback, we introduce the method of background subtraction (MBS), which transforms a general image to an essentially binary image and therefore conventional segmentation methods can detect desired edges more effectively. An effective initialization technique for the level set function and a hybridization of information from both the intensity and statistical properties (distributions) are also introduced to improve efficiency and reliability of level set-based segmentation methods. The resulting algorithm has proved to locate the desired edges in 2-4 iterations, for various images.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"54 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120913866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation 防止移动Ad Hoc网络中的协同黑洞攻击:仿真实现与评估
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.184
H. Weerasinghe, Huirong Fu
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. In S. Ramaswamy et al. (2003), we proposed a solution to identifying and preventing the cooperative black hole attack. Our solution discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. In this paper, via simulation, we evaluate the proposed solution and compare it with other existing solutions in terms of throughput, packet loss percentage, average end-to-end delay and route request overhead. The experiments show that (1) the AODV greatly suffers from cooperative black holes in terms of throughput and packet losses, and (2) our solution proposed in S. Ramaswamy et al. (2003) presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution can accurately prevent the cooperative black hole attacks. The example findings are: (1) the proposed scheme presents 5 - 8% more communication overhead of route request; and (2) The secure route discovery delay slightly increases the packet loss percentage.
黑洞攻击是一种很容易被用来攻击移动自组织网络中的路由的严重攻击。黑洞是一种恶意节点,它在没有指定目的地的活动路由的情况下,错误地响应任何路由请求,并丢弃所有接收到的数据包。如果这些恶意节点组成一个小组一起工作,那么破坏将是非常严重的。这种类型的攻击被称为合作黑洞攻击。S. Ramaswamy et al.(2003)提出了一种识别和防止协同黑洞攻击的解决方案。该方案通过识别和隔离合作黑洞节点,发现源和目的之间的安全路由。在本文中,通过仿真,我们评估了所提出的解决方案,并将其与其他现有解决方案在吞吐量,丢包率,平均端到端延迟和路由请求开销方面进行了比较。实验表明:(1)AODV在吞吐量和丢包方面受到合作黑洞的严重影响;(2)S. Ramaswamy et al.(2003)提出的解决方案在吞吐量和丢包率方面比其他解决方案表现出较好的性能;(3)我们的解决方案可以准确地防止合作黑洞攻击。实例结果表明:(1)该方案路由请求的通信开销增加5 ~ 8%;(2)安全路由发现延迟会略微增加丢包率。
{"title":"Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation","authors":"H. Weerasinghe, Huirong Fu","doi":"10.1109/FGCN.2007.184","DOIUrl":"https://doi.org/10.1109/FGCN.2007.184","url":null,"abstract":"A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to specified destination and drops all the receiving packets. If these malicious nodes work together as a group then the damage will be very serious. This type of attack is called cooperative black hole attack. In S. Ramaswamy et al. (2003), we proposed a solution to identifying and preventing the cooperative black hole attack. Our solution discovers the secure route between source and destination by identifying and isolating cooperative black hole nodes. In this paper, via simulation, we evaluate the proposed solution and compare it with other existing solutions in terms of throughput, packet loss percentage, average end-to-end delay and route request overhead. The experiments show that (1) the AODV greatly suffers from cooperative black holes in terms of throughput and packet losses, and (2) our solution proposed in S. Ramaswamy et al. (2003) presents good performance in terms of better throughput rate and minimum packet loss percentage over other solutions, and (3) our solution can accurately prevent the cooperative black hole attacks. The example findings are: (1) the proposed scheme presents 5 - 8% more communication overhead of route request; and (2) The secure route discovery delay slightly increases the packet loss percentage.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 216
An Analysis of RFID Tag Authentication Protocols Using Secret Value 基于秘密值的RFID标签认证协议分析
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.55
Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim
RFID (Radio Frequency Identification) system is contactless automatic identification system used by small and low-cost RFID tag. An RFID tag can be stuck on or incorporated into a product, animal, or person and identify tag information by using radio frequency. RFID system will be able to replace barcode system for many merits. But the most important problem of RFID system is that unauthorized readers can access to tag information, which should be possible to produce privacy problem. Presently many researches about RFID tag authentication for solving privacy problem are going on, but these researches have many difficulties for limited hardware resource. In this paper, we analyzed RFID tag authentication protocols using secret value of many proposed. And we also dealt with many problems in the protocols and propose the future research for problem solving.
RFID (Radio Frequency Identification)系统是采用小型低成本RFID标签的非接触式自动识别系统。RFID标签可以贴在产品、动物或人身上,并通过射频识别标签信息。RFID系统将以其诸多优点取代条形码系统。但RFID系统最重要的问题是未经授权的读取器可以访问标签信息,这应该可能产生隐私问题。目前,针对RFID标签隐私问题的认证研究有很多,但由于硬件资源有限,这些研究存在很多困难。本文分析了目前提出的几种使用秘密值的RFID标签认证协议。并对协议中存在的问题进行了分析,提出了今后的研究方向。
{"title":"An Analysis of RFID Tag Authentication Protocols Using Secret Value","authors":"Jung-Sik Cho, Sang-Soo Yeo, Sung Kwon Kim","doi":"10.1109/FGCN.2007.55","DOIUrl":"https://doi.org/10.1109/FGCN.2007.55","url":null,"abstract":"RFID (Radio Frequency Identification) system is contactless automatic identification system used by small and low-cost RFID tag. An RFID tag can be stuck on or incorporated into a product, animal, or person and identify tag information by using radio frequency. RFID system will be able to replace barcode system for many merits. But the most important problem of RFID system is that unauthorized readers can access to tag information, which should be possible to produce privacy problem. Presently many researches about RFID tag authentication for solving privacy problem are going on, but these researches have many difficulties for limited hardware resource. In this paper, we analyzed RFID tag authentication protocols using secret value of many proposed. And we also dealt with many problems in the protocols and propose the future research for problem solving.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116358979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
An Ordered HARQ Scheme for LDPC-Coded OFDM System ldpc编码OFDM系统的有序HARQ方案
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.67
Xuehua Li, Zhensong Li, Yiqing Cao, Dacheng Yang
In this paper, an ordered Hybrid ARQ(HARQ) scheme for LDPC-coded OFDM system is presented , in which the important bits with large degrees have high retransmission priorities and are mapped to the sub-carriers with better CQI levers in OFDM system. The new scheme considers the degree distribution property of LDPC codes and improved the system performance by providing the important bits with more protection. The performance of the new scheme has been investigated by the Gaussian Approximation (GA). The analysis and simulation results prove that the new scheme is practical because it has better performance with low system complexity.
本文提出了一种用于ldpc编码OFDM系统的有序混合ARQ(HARQ)方案,该方案将度较大的重要位具有较高的重传优先级,并映射到OFDM系统中CQI杠杆较好的子载波上。该方案充分考虑了LDPC码的度分布特性,通过对重要比特提供更多的保护,提高了系统性能。利用高斯近似(GA)对新方案的性能进行了研究。分析和仿真结果表明,该方案具有较好的性能和较低的系统复杂度,是切实可行的。
{"title":"An Ordered HARQ Scheme for LDPC-Coded OFDM System","authors":"Xuehua Li, Zhensong Li, Yiqing Cao, Dacheng Yang","doi":"10.1109/FGCN.2007.67","DOIUrl":"https://doi.org/10.1109/FGCN.2007.67","url":null,"abstract":"In this paper, an ordered Hybrid ARQ(HARQ) scheme for LDPC-coded OFDM system is presented , in which the important bits with large degrees have high retransmission priorities and are mapped to the sub-carriers with better CQI levers in OFDM system. The new scheme considers the degree distribution property of LDPC codes and improved the system performance by providing the important bits with more protection. The performance of the new scheme has been investigated by the Gaussian Approximation (GA). The analysis and simulation results prove that the new scheme is practical because it has better performance with low system complexity.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114723233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of TCP over Wireless Network Using Error Model 基于错误模型的无线网络TCP性能分析
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.180
Yu-Doo Kim, Il-Young Moon, Heau-Jo Kang
TCP (Transmission Control Protocol) is one of the protocols which are widely used from the Internet environments. Through the flow control of TCP, it could be increased efficiency for the loss and a retransmission of data and the flow control become accomplished though window technique which puts the limit of size. By the flow control, TCP divided in various versions. In this paper, it is analyzed the simulation result which applies the error model over wireless network in the Newreno which is an improved model of the representative Tahoe, Reno.
TCP (Transmission Control Protocol,传输控制协议)是Internet环境中广泛使用的协议之一。通过TCP的流量控制,可以提高数据丢失和重传的效率,并通过限制大小的窗口技术来实现流量控制。根据流量控制,TCP分为不同的版本。本文分析了将误差模型应用于具有代表性的美国里诺市塔霍市的改进模型——纽里诺市无线网络的仿真结果。
{"title":"Performance Analysis of TCP over Wireless Network Using Error Model","authors":"Yu-Doo Kim, Il-Young Moon, Heau-Jo Kang","doi":"10.1109/FGCN.2007.180","DOIUrl":"https://doi.org/10.1109/FGCN.2007.180","url":null,"abstract":"TCP (Transmission Control Protocol) is one of the protocols which are widely used from the Internet environments. Through the flow control of TCP, it could be increased efficiency for the loss and a retransmission of data and the flow control become accomplished though window technique which puts the limit of size. By the flow control, TCP divided in various versions. In this paper, it is analyzed the simulation result which applies the error model over wireless network in the Newreno which is an improved model of the representative Tahoe, Reno.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121441339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering Methodology and Scenario to Detect Covert Database System 发现隐蔽数据库系统的方法和场景
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.106
G. Lee, Seokhee Lee, E. Tsomko, Sangjin Lee
When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.
当数字取证调查员对包括公司在内的可疑组织进行调查时,重要的是获取具有组织信息概览的数据。由于组织的计算机和网络系统结构复杂,不了解其结构的调查人员很难发现有数据的数据库系统。特别是,如果该组织故意建立隐蔽数据库系统,以隐藏数据,那么调查将更加困难。在本文中,我们描述了用于隐藏组织中欺诈信息的隐蔽数据库系统的结构。接下来,我们展示了检测隐蔽数据库系统的技术并提出了我们的工具。然后,我们建议使用我们的工具的调查程序的场景。
{"title":"Discovering Methodology and Scenario to Detect Covert Database System","authors":"G. Lee, Seokhee Lee, E. Tsomko, Sangjin Lee","doi":"10.1109/FGCN.2007.106","DOIUrl":"https://doi.org/10.1109/FGCN.2007.106","url":null,"abstract":"When the digital forensic investigator looks into the suspicious organization including the company, it is important to obtain the data which has the overview of information of the organization. Since system structure of computer and network about the organization is complicated, the investigator who does not know its structure has a difficulty to detect the database system which has the data. In particular, if the organization intentionally builds the covert database system in order to hide data, then the investigator would have a more difficulty. In this paper, we describe structures of the covert database system for hiding fraud information in the organization. Next, we show techniques and propose our tool for detecting the covert database system. And then we suggest scenarios about investigation procedure using our tool.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113933072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
RFID Based Object Localization System Using Ceiling Cameras with Particle Filter 基于RFID的粒子滤波天花板相机目标定位系统
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.194
Prachya Kamol, S. Nikolaidis, R. Ueda, T. Arai
In this paper, we propose an object localization method for home environments. This method utilizes RFID equipments, a mobile robot and some ceiling cameras. The RFID system estimates a rough position of each object. The autonomous robot with RFID antennas explores the environment so as to detect other objects on the floor. Each object that is attached an RFID tag, is then recognized by utilizing its feature information stored in this tag. Finally, the precise localization of each object is achieved by the ceiling cameras with particle filters. The accuracy and the robustness of the proposed method are verified through an experiment.
本文提出了一种适用于家庭环境的目标定位方法。该方法利用RFID设备、移动机器人和一些天花板摄像头。RFID系统估计每个物体的大致位置。带有RFID天线的自主机器人探索环境,以检测地板上的其他物体。每个附加了RFID标签的对象,然后利用存储在该标签中的特征信息进行识别。最后,利用带有粒子滤波的天花板摄像机对每个物体进行精确定位。通过实验验证了该方法的准确性和鲁棒性。
{"title":"RFID Based Object Localization System Using Ceiling Cameras with Particle Filter","authors":"Prachya Kamol, S. Nikolaidis, R. Ueda, T. Arai","doi":"10.1109/FGCN.2007.194","DOIUrl":"https://doi.org/10.1109/FGCN.2007.194","url":null,"abstract":"In this paper, we propose an object localization method for home environments. This method utilizes RFID equipments, a mobile robot and some ceiling cameras. The RFID system estimates a rough position of each object. The autonomous robot with RFID antennas explores the environment so as to detect other objects on the floor. Each object that is attached an RFID tag, is then recognized by utilizing its feature information stored in this tag. Finally, the precise localization of each object is achieved by the ceiling cameras with particle filters. The accuracy and the robustness of the proposed method are verified through an experiment.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"368 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132806488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 53
期刊
Future Generation Communication and Networking (FGCN 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1