首页 > 最新文献

2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)最新文献

英文 中文
Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach 软件定义网络中的高效快速恢复机制:多路径路由方法
Aiman Ghannami, C. Shao
Although Software-Defined Networking (SDN) is a mature paradigm, failure recovery and management in SDN still need much research attention. OpenFlow, as an implementation of SDN, provides flexible and abstracted approach to configure SDN networks. This Paper focuses on failure recovery mechanism using OpenFlow. The proposed mechanism is divided into: (a) computing the working paths proactively between each source-destination pair and return a list of paths ordered by-path latency from shortest to longest path, (b)implement per-Link Bidirectional Forwarding Detection(BFD) for failure detection, to enable fast detection time, thus fast recovery time, (d) configure OpenFlow Fast Failover Group for restoration such that, the highest-priority bucket to be linked to the shortest path, the second highest-priority bucket linked to the second shortest path and so on. Upon failure, the switch will revert to the second fastest path, (e) to achieve high resource utilization, OpenFlow Select Group used to split the flow among the working paths. The proposed architecture of this work provides high utilization of network resources in addition to efficient fast detection and recovery time. As the evaluation shows, the usage of multipath routing with fast failover scheme provide much resource utilization and fast recovery time.
虽然软件定义网络(SDN)是一种成熟的模式,但SDN中的故障恢复和管理仍然需要更多的研究。OpenFlow作为SDN的实现,为SDN网络的配置提供了灵活、抽象的方法。本文重点研究了基于OpenFlow的故障恢复机制。建议的机制分为:(a)主动计算每个源-目的对之间的工作路径,并返回按路径延迟从最短到最长排序的路径列表;(b)实现逐链路双向转发检测(BFD)进行故障检测,使检测时间更快,从而恢复时间更快;(d)配置OpenFlow快速故障切换组进行恢复,使最高优先级的桶链接到最短路径;第二个最高优先级的桶链接到第二个最短路径,以此类推。发生故障时,交换机将恢复到第二快的路径,(e)为了实现高资源利用率,OpenFlow Select Group用于在工作路径之间分割流。本工作提出的架构除了提供高效率的快速检测和恢复时间外,还提供了高的网络资源利用率。评估结果表明,采用多路径路由和快速故障转移方案,资源利用率高,恢复时间短。
{"title":"Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach","authors":"Aiman Ghannami, C. Shao","doi":"10.1109/ICITST.2016.7856747","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856747","url":null,"abstract":"Although Software-Defined Networking (SDN) is a mature paradigm, failure recovery and management in SDN still need much research attention. OpenFlow, as an implementation of SDN, provides flexible and abstracted approach to configure SDN networks. This Paper focuses on failure recovery mechanism using OpenFlow. The proposed mechanism is divided into: (a) computing the working paths proactively between each source-destination pair and return a list of paths ordered by-path latency from shortest to longest path, (b)implement per-Link Bidirectional Forwarding Detection(BFD) for failure detection, to enable fast detection time, thus fast recovery time, (d) configure OpenFlow Fast Failover Group for restoration such that, the highest-priority bucket to be linked to the shortest path, the second highest-priority bucket linked to the second shortest path and so on. Upon failure, the switch will revert to the second fastest path, (e) to achieve high resource utilization, OpenFlow Select Group used to split the flow among the working paths. The proposed architecture of this work provides high utilization of network resources in addition to efficient fast detection and recovery time. As the evaluation shows, the usage of multipath routing with fast failover scheme provide much resource utilization and fast recovery time.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"170 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121431505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Facing lateral movements using widespread behavioral probes 使用广泛的行为探针来面对横向运动
Alessandro Greco, A. Caponi, G. Bianchi
The fast evolving nature and the growing complexity of modern offensive techniques used in Advanced Persistent Threats attacks calls for innovative approaches to defense techniques. Common network monitoring solutions fail in case of attacks able to remain silent and quietly control the network for long periods of time. Indeed, such type of attacks requires the deployment of security functionality able to recognize the so called lateral movements, exploited by the attackers to spread the infection inside the network. The implementation of a distributed monitoring infrastructure exploiting innovative detection approaches allows to overcome the lack of a single monitoring point and successfully detect complex behavior of lateral movements. In this paper we demonstrate how to effectively use eXtended Finite State Machine patterns to face a set of commonly used lateral movement techniques, including IP spoofing ones.
高级持续威胁攻击中使用的现代攻击技术的快速发展性质和日益增长的复杂性要求创新的防御技术方法。常见的网络监控解决方案,在攻击发生后,能够保持静默,长时间地悄无声息地控制网络。事实上,这种类型的攻击需要部署能够识别所谓的横向移动的安全功能,攻击者利用横向移动在网络内传播感染。分布式监测基础设施的实施利用了创新的检测方法,克服了单个监测点的不足,成功地检测了横向运动的复杂行为。在本文中,我们演示了如何有效地使用扩展有限状态机模式来面对一组常用的横向移动技术,包括IP欺骗技术。
{"title":"Facing lateral movements using widespread behavioral probes","authors":"Alessandro Greco, A. Caponi, G. Bianchi","doi":"10.1109/ICITST.2016.7856688","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856688","url":null,"abstract":"The fast evolving nature and the growing complexity of modern offensive techniques used in Advanced Persistent Threats attacks calls for innovative approaches to defense techniques. Common network monitoring solutions fail in case of attacks able to remain silent and quietly control the network for long periods of time. Indeed, such type of attacks requires the deployment of security functionality able to recognize the so called lateral movements, exploited by the attackers to spread the infection inside the network. The implementation of a distributed monitoring infrastructure exploiting innovative detection approaches allows to overcome the lack of a single monitoring point and successfully detect complex behavior of lateral movements. In this paper we demonstrate how to effectively use eXtended Finite State Machine patterns to face a set of commonly used lateral movement techniques, including IP spoofing ones.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115337024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Virtualization technologies in web conferencing systems: A performance overview web会议系统中的虚拟化技术:性能概述
Pedro Roger Magalhães Vasconcelos, G. A. Freitas, T. Marques
Virtualization is an important technology in data center environment due to its useful features such as server consolidation, power saving, live migration and faster server provisioning. However, virtualization sometimes incurs some performance loss. There are many virtualization approaches including full virtualization and operating system-level virtualization. Different virtualization platforms differ in terms of features, performance and virtualization overhead. Thus, one platform can be more suitable to certain kind of application than another. Applications being virtualized also differ in resource usage. Web conferencing systems become popular as the clients' bandwidth has increased in last years, in educational, researching and business fields. The BigBlueButton is a web conferencing system that allows multiple users join a conference room, having classes and share their microphone, webcam, desktop and files. In this paper, we use KVM and OpenVZ as virtualization platforms to deploy conference systems using BigBlueButton. We explore its virtual performance under a real-world workload and a set of benchmarks that stress different aspects such as computing power, latency and memory, I/O and network bandwidth. These results can be a valuable information to be taken in account by systems administrators, for capacity planning and systems designing. Which, in turn, lead to cost savings for companies.
虚拟化是数据中心环境中的一项重要技术,因为它具有服务器整合、节能、实时迁移和更快的服务器供应等有用特性。然而,虚拟化有时会导致一些性能损失。有许多虚拟化方法,包括完全虚拟化和操作系统级虚拟化。不同的虚拟化平台在特性、性能和虚拟化开销方面有所不同。因此,一个平台可能比另一个平台更适合某种类型的应用程序。被虚拟化的应用程序在资源使用方面也有所不同。近年来,随着用户端带宽的增加,网络会议系统在教育、研究和商业领域得到了广泛的应用。BigBlueButton是一个网络会议系统,它允许多个用户加入一个会议室,上课并共享他们的麦克风、网络摄像头、桌面和文件。在本文中,我们使用KVM和OpenVZ作为虚拟化平台,使用BigBlueButton来部署会议系统。我们在真实的工作负载和一组强调计算能力、延迟和内存、I/O和网络带宽等不同方面的基准测试下探索其虚拟性能。这些结果可能是系统管理员在进行容量规划和系统设计时需要考虑的有价值的信息。这反过来又为公司节省了成本。
{"title":"Virtualization technologies in web conferencing systems: A performance overview","authors":"Pedro Roger Magalhães Vasconcelos, G. A. Freitas, T. Marques","doi":"10.1109/ICITST.2016.7856734","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856734","url":null,"abstract":"Virtualization is an important technology in data center environment due to its useful features such as server consolidation, power saving, live migration and faster server provisioning. However, virtualization sometimes incurs some performance loss. There are many virtualization approaches including full virtualization and operating system-level virtualization. Different virtualization platforms differ in terms of features, performance and virtualization overhead. Thus, one platform can be more suitable to certain kind of application than another. Applications being virtualized also differ in resource usage. Web conferencing systems become popular as the clients' bandwidth has increased in last years, in educational, researching and business fields. The BigBlueButton is a web conferencing system that allows multiple users join a conference room, having classes and share their microphone, webcam, desktop and files. In this paper, we use KVM and OpenVZ as virtualization platforms to deploy conference systems using BigBlueButton. We explore its virtual performance under a real-world workload and a set of benchmarks that stress different aspects such as computing power, latency and memory, I/O and network bandwidth. These results can be a valuable information to be taken in account by systems administrators, for capacity planning and systems designing. Which, in turn, lead to cost savings for companies.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"317 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131052154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Adaptive image compression in wireless sensor networks 无线传感器网络中的自适应图像压缩
Benfilali Mostefa, Sofiane Boukli-Hacene
The main obstacle to transmit images in wireless sensor networks is the lack of an appropriate strategy for processing the large volume of data such as images. The high rate packets errors because of what numbers very high packets carrying the data of the captured images and the need for retransmission in case of errors, and more, the energy reserve and band bandwidth is insufficient to accomplish these tasks. This paper presents new effective technique called “Background subtraction” to compress, process and transmit the images in a wireless sensor network. The practical results show the effectiveness of this approach to make the image compression in the networks of wireless sensors achievable, reliable and efficient in terms of energy and the minimization of amount of image data.
在无线传感器网络中传输图像的主要障碍是缺乏适当的策略来处理大量的数据,如图像。高速率数据包的误码率是因为多少非常高的数据包携带了捕获图像的数据,并且在误码率很高的情况下需要重传,而且能量储备和频带带宽不足以完成这些任务。本文提出了一种新的有效的无线传感器网络图像压缩、处理和传输技术——“背景减法”。实际结果表明,该方法可以有效地实现无线传感器网络中的图像压缩,并且在能量和图像数据量方面是可靠和高效的。
{"title":"Adaptive image compression in wireless sensor networks","authors":"Benfilali Mostefa, Sofiane Boukli-Hacene","doi":"10.1109/ICITST.2016.7856749","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856749","url":null,"abstract":"The main obstacle to transmit images in wireless sensor networks is the lack of an appropriate strategy for processing the large volume of data such as images. The high rate packets errors because of what numbers very high packets carrying the data of the captured images and the need for retransmission in case of errors, and more, the energy reserve and band bandwidth is insufficient to accomplish these tasks. This paper presents new effective technique called “Background subtraction” to compress, process and transmit the images in a wireless sensor network. The practical results show the effectiveness of this approach to make the image compression in the networks of wireless sensors achievable, reliable and efficient in terms of energy and the minimization of amount of image data.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115037167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Key requirements for the design of robust chaotic PRNG 鲁棒混沌PRNG设计的关键要求
Oleg Garasym, I. Taralova, R. Lozi
The increasing number of e-transactions requires more secure and innovative schemes for secure information storage and transmission. Since the encryption should be unique for each transaction, there is a big necessity of new generators of very huge numbers of encryption keys, and chaotic random number generators seem to be perfectly suitable for this application. In this paper a new robust, gigaperiodic and simple in implementation chaotic generator is proposed. The generator construction is based on the principle of ring-coupling. The proposed chaotic generator successfully passed statistical and analytical tests: NIST, largest Lyapunov exponent, autocorrelation, cross-correlation, uniform distribution. For the best precision of uniform distribution, approximate density function has been applied, the distribution errors are analyzed by written software. The resulting chaotic system promises the designed robust implementation to cryptosystems.
越来越多的电子交易需要更安全及创新的方案,以确保资讯储存及传输的安全。由于每个事务的加密必须是唯一的,因此非常需要生成大量加密密钥的新生成器,而混沌随机数生成器似乎非常适合这种应用。本文提出了一种新的鲁棒、超周期、实现简单的混沌发生器。发电机结构基于环耦合原理。所提出的混沌发生器成功地通过了统计和分析测试:NIST,最大李雅普诺夫指数,自相关,互相关,均匀分布。为了获得最佳的均匀分布精度,采用了近似密度函数,并通过编写软件对分布误差进行了分析。由此产生的混沌系统保证了所设计的对密码系统的鲁棒实现。
{"title":"Key requirements for the design of robust chaotic PRNG","authors":"Oleg Garasym, I. Taralova, R. Lozi","doi":"10.1109/ICITST.2016.7856660","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856660","url":null,"abstract":"The increasing number of e-transactions requires more secure and innovative schemes for secure information storage and transmission. Since the encryption should be unique for each transaction, there is a big necessity of new generators of very huge numbers of encryption keys, and chaotic random number generators seem to be perfectly suitable for this application. In this paper a new robust, gigaperiodic and simple in implementation chaotic generator is proposed. The generator construction is based on the principle of ring-coupling. The proposed chaotic generator successfully passed statistical and analytical tests: NIST, largest Lyapunov exponent, autocorrelation, cross-correlation, uniform distribution. For the best precision of uniform distribution, approximate density function has been applied, the distribution errors are analyzed by written software. The resulting chaotic system promises the designed robust implementation to cryptosystems.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115436983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Smartphone's hotspot security issues and challenges 智能手机的热点安全问题与挑战
Al Harthy Khoula, N. Shah, Arun Shankarappa
Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited research efforts in threat detection mechanisms for smartphone hotspot connections. This paper will propose a smartphone hotspot Intrusion Detection system (IDS) which simulates the detection of the attacks (especially DOS attacks), on smartphone hotspot connections. The proposed architecture is realized into a prototype, which takes into account primary and secondary data collected related to threats. The novelty of the proposed system is in utilization of historical logs to take decisions regarding user access to hotspot connections.
自组织网络是20世纪90年代初出现的一个网络概念。也被称为点对点(P2P)网络,这些类型的网络促进了计算机之间的连接。目前,智能手机之间通过无线连接,通过热点特设功能共享信息。这些类型的连接导致了许多威胁和攻击。智能手机热点连接的威胁检测机制研究有限。本文将提出一种智能手机热点入侵检测系统(IDS),该系统模拟对智能手机热点连接的攻击(特别是DOS攻击)进行检测。提出的体系结构被实现为一个原型,该原型考虑了与威胁相关的主要和次要数据收集。该系统的新颖之处在于利用历史日志对用户访问热点连接做出决策。
{"title":"Smartphone's hotspot security issues and challenges","authors":"Al Harthy Khoula, N. Shah, Arun Shankarappa","doi":"10.1109/ICITST.2016.7856680","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856680","url":null,"abstract":"Ad hoc network is a networking concept, which emerged in the beginning of the 1990's. Also known as Peer to Peer (P2P) network, these types of networks have facilitated connections among computers. Currently, smartphones are connected to each other wirelessly to share information through hotspot ad hoc feature. These types of connections have led to many threats and attacks. There have been limited research efforts in threat detection mechanisms for smartphone hotspot connections. This paper will propose a smartphone hotspot Intrusion Detection system (IDS) which simulates the detection of the attacks (especially DOS attacks), on smartphone hotspot connections. The proposed architecture is realized into a prototype, which takes into account primary and secondary data collected related to threats. The novelty of the proposed system is in utilization of historical logs to take decisions regarding user access to hotspot connections.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"582 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122844762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study 基于方面的酒店评论情感分析的增强框架:阿拉伯评论案例研究
Mohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa
This research proposes a framework for aspect-based sentiment analysis (ABSA) of Hotels' reviews. The proposed framework consists of: (a) a reference human annotated Arabic dataset to support ABSA tasks such as aspect category identification, opinion target expression extraction, and opinion sentiment polarity. The dataset was annotated on both sentence-level and text-level, (b) baseline approach where a Support Vector Machine (SVM) was trained as part of the ABSA tasks, (c) baseline experiments and results, and (d) a common evaluation technique to provide a unified evaluation of future research working on the same dataset and ABSA tasks.
本研究提出了一个基于方面的酒店评论情感分析(ABSA)框架。提出的框架包括:(a)一个参考的人类注释的阿拉伯语数据集,以支持ABSA任务,如方面类别识别、意见目标表达提取和意见情感极性。在句子级和文本级对数据集进行注释,(b)基线方法,其中支持向量机(SVM)作为ABSA任务的一部分进行训练,(c)基线实验和结果,以及(d)一种通用评估技术,为在相同数据集和ABSA任务上工作的未来研究提供统一的评估。
{"title":"An enhanced framework for aspect-based sentiment analysis of Hotels' reviews: Arabic reviews case study","authors":"Mohammad Al-Smadi, Omar Qawasmeh, Bashar Talafha, M. Al-Ayyoub, Y. Jararweh, E. Benkhelifa","doi":"10.1109/ICITST.2016.7856675","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856675","url":null,"abstract":"This research proposes a framework for aspect-based sentiment analysis (ABSA) of Hotels' reviews. The proposed framework consists of: (a) a reference human annotated Arabic dataset to support ABSA tasks such as aspect category identification, opinion target expression extraction, and opinion sentiment polarity. The dataset was annotated on both sentence-level and text-level, (b) baseline approach where a Support Vector Machine (SVM) was trained as part of the ABSA tasks, (c) baseline experiments and results, and (d) a common evaluation technique to provide a unified evaluation of future research working on the same dataset and ABSA tasks.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122694384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
A secure and QoS aware routing protocol for Wireless Sensor Network 一种安全的无线传感器网络路由协议
Adnan Ahmed, Pardeep Kumar, Ali Raza Bhangwar, M. Channa
Wireless Sensor Network (WSN) has emerged as useful alternative to provide prompt communication services in mission critical applications such as post disaster relief operations where reliably data delivery in timely manner is utmost important. However, unsupervised nature of such environments makes security of node vulnerable and exposes them various threats such as damage, physical capture and node's misbehavior attacks. Moreover, the data delivery with higher end-to-end delays undermines the benefits of such networks. Recently, trust aware protocols have proved their efficacy in countering node misbehavior attacks. The existing trust aware routing protocols either use single metric (trust) or composite metric (trust and hop count, trust and energy or trust and geographical information) thereby overlooking QoS requirements. Recent research has proved that there can be significant variations in wireless links such as delay, capacity and loss ratio thereby leading to high route instability. Therefore, this paper presents the Secure and QoS aware Routing Protocol (SQRP) that takes into consideration the trust and QoS parameters pertaining to link's quality (transmission rate, link capacity and loss ratio) to select an optimized end-to-end route. This multi-facet strategy helps to maintain the trusted network environment while routing the data using the links that satisfy QoS requirements. Simulation results demonstrate that SQRP achieves improved performance in terms of throughput, delay and link stability.
无线传感器网络(WSN)已经成为在关键任务应用中提供快速通信服务的有用替代方案,例如灾后救援行动,其中可靠及时的数据传输至关重要。然而,这种环境的无监督性质使得节点的安全性容易受到攻击,并暴露出各种威胁,如损坏、物理捕获和节点的不当行为攻击。此外,具有较高端到端延迟的数据传输破坏了此类网络的好处。近年来,信任感知协议在对抗节点不当行为攻击方面已经证明了其有效性。现有的信任感知路由协议要么使用单一度量(信任),要么使用复合度量(信任和跳数、信任和能量或信任和地理信息),从而忽略了QoS要求。最近的研究证明,无线链路可能存在显著的延迟、容量和损失率变化,从而导致高路由不稳定性。因此,本文提出了一种安全且QoS感知的路由协议(SQRP),该协议考虑了与链路质量相关的信任和QoS参数(传输速率、链路容量和丢失率),以选择优化的端到端路由。这种多层面的策略有助于维护可信的网络环境,同时使用满足QoS要求的链接路由数据。仿真结果表明,SQRP在吞吐量、时延和链路稳定性方面都取得了较好的性能。
{"title":"A secure and QoS aware routing protocol for Wireless Sensor Network","authors":"Adnan Ahmed, Pardeep Kumar, Ali Raza Bhangwar, M. Channa","doi":"10.1109/ICITST.2016.7856720","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856720","url":null,"abstract":"Wireless Sensor Network (WSN) has emerged as useful alternative to provide prompt communication services in mission critical applications such as post disaster relief operations where reliably data delivery in timely manner is utmost important. However, unsupervised nature of such environments makes security of node vulnerable and exposes them various threats such as damage, physical capture and node's misbehavior attacks. Moreover, the data delivery with higher end-to-end delays undermines the benefits of such networks. Recently, trust aware protocols have proved their efficacy in countering node misbehavior attacks. The existing trust aware routing protocols either use single metric (trust) or composite metric (trust and hop count, trust and energy or trust and geographical information) thereby overlooking QoS requirements. Recent research has proved that there can be significant variations in wireless links such as delay, capacity and loss ratio thereby leading to high route instability. Therefore, this paper presents the Secure and QoS aware Routing Protocol (SQRP) that takes into consideration the trust and QoS parameters pertaining to link's quality (transmission rate, link capacity and loss ratio) to select an optimized end-to-end route. This multi-facet strategy helps to maintain the trusted network environment while routing the data using the links that satisfy QoS requirements. Simulation results demonstrate that SQRP achieves improved performance in terms of throughput, delay and link stability.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"77 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132964600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
An enhanced approach to preserving privacy in social network data publishing 一种在社交网络数据发布中保护隐私的增强方法
Sihem Bensimessaoud, N. Badache, S. Benmeziane, Amina Djellalbia
Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish “the neighborhood attacks” where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edges adding method, but can significantly alter the properties of the original graph. In this work, an enhanced anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves an important utility that is the average path length “APL”.
如今,越来越多的社交网络数据被发布用于数据分析。虽然这种分析很重要,但这些出版物可能成为重新识别攻击的目标,即攻击者试图恢复在匿名化过程中被删除的一些节点的身份。在这些攻击中,我们区分了“邻居攻击”,攻击者可以对目标受害者的邻居有背景知识。研究人员开发了类似于k-匿名的匿名模型,基于边添加方法,但会显著改变原始图的属性。在这项工作中,提出了一种基于添加假节点的增强匿名化算法,该算法确保发布的图保留了一个重要的实用程序,即平均路径长度“APL”。
{"title":"An enhanced approach to preserving privacy in social network data publishing","authors":"Sihem Bensimessaoud, N. Badache, S. Benmeziane, Amina Djellalbia","doi":"10.1109/ICITST.2016.7856671","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856671","url":null,"abstract":"Today, more and more social network data are published for data analysis. Although this analysis is important, these publications may be targeted by re-identification attacks i.e., where an attacker tries to recover the identities of some nodes that were removed during the anonymization process. Among these attacks, we distinguish “the neighborhood attacks” where an attacker can have background knowledge about the neighborhoods of target victims. Researchers have developed anonymization models similar to k-anonymity, based on edges adding method, but can significantly alter the properties of the original graph. In this work, an enhanced anonymization algorithm based on the addition of fake nodes is proposed, which ensures that the published graph preserves an important utility that is the average path length “APL”.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"153 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133414681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Data privacy concerns involving cloud 涉及云的数据隐私问题
S. Srinivasan
Cloud Computing is in widespread use today because of its many benefits. One of the early concerns was security and it has been shown in multiple studies that cloud security is significantly enhanced by the use of cloud service. Organizations are able to enhance security because of the advanced features that a cloud service provider is able to provide. The availability of high-end resources for all users of cloud services requires making adjustments to business processes. The main thrust of this paper is to show that when business processes involve the use of cloud then there is the potential for the loss of privacy. We will address this aspect extensively in this paper and suggest some solutions to preserve privacy of individuals and organizations. One aspect of this involves the use of Big Data in the cloud. We will point out that the benefits of using the cloud for large volume storage and handling multiple sources of data. Big Data involves not only having access to a vast collection of data from multiple sources but also the ability to combine them to draw conclusions. When data collected by a particular source alone is available, it may not violate the privacy of individuals. We have to view this in light of the ability to re-identify individuals based on the volume of data available from multiple sources.
云计算由于其诸多优点而在今天得到了广泛的应用。早期关注的问题之一是安全性,多项研究表明,云服务的使用大大增强了云安全性。由于云服务提供商能够提供高级功能,组织能够增强安全性。为云服务的所有用户提供高端资源,需要对业务流程进行调整。本文的主旨是表明,当业务流程涉及到云的使用时,就有可能失去隐私。我们将在本文中广泛地讨论这方面,并提出一些保护个人和组织隐私的解决方案。其中一个方面涉及在云中使用大数据。我们将指出使用云进行大容量存储和处理多个数据源的好处。大数据不仅涉及访问来自多个来源的大量数据,还涉及将它们结合起来得出结论的能力。当某一特定来源收集的数据是可用的,它可能不会侵犯个人隐私。我们必须根据从多个来源获得的数据量重新识别个人的能力来看待这一点。
{"title":"Data privacy concerns involving cloud","authors":"S. Srinivasan","doi":"10.1109/ICITST.2016.7856665","DOIUrl":"https://doi.org/10.1109/ICITST.2016.7856665","url":null,"abstract":"Cloud Computing is in widespread use today because of its many benefits. One of the early concerns was security and it has been shown in multiple studies that cloud security is significantly enhanced by the use of cloud service. Organizations are able to enhance security because of the advanced features that a cloud service provider is able to provide. The availability of high-end resources for all users of cloud services requires making adjustments to business processes. The main thrust of this paper is to show that when business processes involve the use of cloud then there is the potential for the loss of privacy. We will address this aspect extensively in this paper and suggest some solutions to preserve privacy of individuals and organizations. One aspect of this involves the use of Big Data in the cloud. We will point out that the benefits of using the cloud for large volume storage and handling multiple sources of data. Big Data involves not only having access to a vast collection of data from multiple sources but also the ability to combine them to draw conclusions. When data collected by a particular source alone is available, it may not violate the privacy of individuals. We have to view this in light of the ability to re-identify individuals based on the volume of data available from multiple sources.","PeriodicalId":258740,"journal":{"name":"2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131986458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2016 11th International Conference for Internet Technology and Secured Transactions (ICITST)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1