首页 > 最新文献

2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing最新文献

英文 中文
Guess and Determine Attack on Trivium Family 猜测并确定对Trivium家族的攻击
Neda Rohani, Zainab Noferesti, J. Mohajeri, M. Aref
Trivium is a hardware profile finalist of eSTREAM project. It is a synchronous bit-oriented stream cipher. The cipher’s internal state has 288 bits. Bivium is a simplified version of Trivium with a smaller internal state. Both algorithms provide the security level of 80 bits. In this paper we introduce a guess and determine attack on Trivium and Bivium. In our method, we first find the linear approximations for the updating functions. Then by using these approximations, we build a system of linear equations and internal state variables. In order to solve the system, some bits of the internal state should be guessed. Our attack on Trivium is not successful because of the large length of internal state therefore it is resistant to the method. It’s complexity is of order O(2^90.67). But for recovering the state of Bivium, we need to guess only 27.55 bits and other bits will be determined. In order to complete the attack 2^43.99 bits of key stream are needed. The complexity of the attack on Bivium is O(2^27.55), which is an improvement to the previous guess and determine attack with a complexity of order O(2^52.3).
Trivium是eSTREAM项目的硬件配置文件入围者。它是一种同步的面向位的流密码。密码的内部状态是288位。Bivium是Trivium的简化版本,具有更小的内部状态。两种算法都提供80位的安全级别。本文介绍了一种对Trivium和Bivium的猜测和确定攻击。在我们的方法中,我们首先找到更新函数的线性逼近。然后利用这些近似,我们建立了一个由线性方程和内部状态变量组成的系统。为了解决这个系统,内部状态的一些比特应该被猜测出来。我们对Trivium的攻击没有成功,因为内部状态的长度很大,因此它对该方法有抵抗力。其复杂度为O(2^90.67)阶。但是要恢复Bivium的状态,我们只需要猜测27.55比特,其他比特就可以确定了。为了完成攻击,需要2^43.99位密钥流。对Bivium的攻击复杂度为O(2^27.55),比之前的猜测有所改进,确定的攻击复杂度为O(2^52.3)阶。
{"title":"Guess and Determine Attack on Trivium Family","authors":"Neda Rohani, Zainab Noferesti, J. Mohajeri, M. Aref","doi":"10.1109/EUC.2010.123","DOIUrl":"https://doi.org/10.1109/EUC.2010.123","url":null,"abstract":"Trivium is a hardware profile finalist of eSTREAM project. It is a synchronous bit-oriented stream cipher. The cipher’s internal state has 288 bits. Bivium is a simplified version of Trivium with a smaller internal state. Both algorithms provide the security level of 80 bits. In this paper we introduce a guess and determine attack on Trivium and Bivium. In our method, we first find the linear approximations for the updating functions. Then by using these approximations, we build a system of linear equations and internal state variables. In order to solve the system, some bits of the internal state should be guessed. Our attack on Trivium is not successful because of the large length of internal state therefore it is resistant to the method. It’s complexity is of order O(2^90.67). But for recovering the state of Bivium, we need to guess only 27.55 bits and other bits will be determined. In order to complete the attack 2^43.99 bits of key stream are needed. The complexity of the attack on Bivium is O(2^27.55), which is an improvement to the previous guess and determine attack with a complexity of order O(2^52.3).","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123301065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trusted Routing for Resource-Constrained Wireless Sensor Networks 资源受限无线传感器网络的可信路由
K. Daabaj, M. Dixon, Terry Koziniec, Kevin Lee
Designing a reliable and trusted routing scheme for resource-constrained Wireless Sensor Networks (WSNs) is a challenging task due to the lack of infrastructure and the highly dynamic network topology. To ensure trustworthy end-to-end communications between wirelessly connected sensor nodes, a considerable amount of bidirectional traffic must be relayed either between neighboring sensor nodes or between source sensor nodes and the base station. Such scenarios may lead to an added routing overhead, higher energy depletion rate and network life time minimization. The existing trusted routing protocols focus on trusted data dissemination while lacking the consideration of the restricted resources of sensor nodes and low-power radio link failures. To solve this problem, we propose a reliability-oriented routing scheme that takes into account the link reliability and residual energy of sensor nodes, thus allowing for better trustworthy data exchange, traffic balancing and network lifetime extension. Based on real test bed experiments and large-scale simulations, the attained results show the benefits stemming from the adoption of our scheme to be a reliable and energy efficient data delivery platform for potential trusted data exchange models. Our results show that the scheme is able to reduce energy consumption without affecting the connectivity of the network.
由于缺乏基础设施和高度动态的网络拓扑结构,为资源受限的无线传感器网络(WSNs)设计可靠可信的路由方案是一项具有挑战性的任务。为了确保无线连接的传感器节点之间可信的端到端通信,必须在相邻传感器节点之间或源传感器节点与基站之间中继相当数量的双向流量。这种情况可能导致额外的路由开销、更高的能量消耗率和网络生命周期最小化。现有可信路由协议主要关注可信数据的传播,缺乏对传感器节点资源受限和低功率无线链路故障的考虑。为了解决这一问题,我们提出了一种面向可靠性的路由方案,该方案考虑了传感器节点的链路可靠性和剩余能量,从而实现更好的可信数据交换、流量均衡和网络生命周期延长。基于真实的试验台实验和大规模仿真,所获得的结果表明,采用该方案可以为潜在的可信数据交换模型提供可靠且节能的数据传输平台。结果表明,该方案能够在不影响网络连通性的情况下降低能耗。
{"title":"Trusted Routing for Resource-Constrained Wireless Sensor Networks","authors":"K. Daabaj, M. Dixon, Terry Koziniec, Kevin Lee","doi":"10.1109/EUC.2010.106","DOIUrl":"https://doi.org/10.1109/EUC.2010.106","url":null,"abstract":"Designing a reliable and trusted routing scheme for resource-constrained Wireless Sensor Networks (WSNs) is a challenging task due to the lack of infrastructure and the highly dynamic network topology. To ensure trustworthy end-to-end communications between wirelessly connected sensor nodes, a considerable amount of bidirectional traffic must be relayed either between neighboring sensor nodes or between source sensor nodes and the base station. Such scenarios may lead to an added routing overhead, higher energy depletion rate and network life time minimization. The existing trusted routing protocols focus on trusted data dissemination while lacking the consideration of the restricted resources of sensor nodes and low-power radio link failures. To solve this problem, we propose a reliability-oriented routing scheme that takes into account the link reliability and residual energy of sensor nodes, thus allowing for better trustworthy data exchange, traffic balancing and network lifetime extension. Based on real test bed experiments and large-scale simulations, the attained results show the benefits stemming from the adoption of our scheme to be a reliable and energy efficient data delivery platform for potential trusted data exchange models. Our results show that the scheme is able to reduce energy consumption without affecting the connectivity of the network.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125305918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Co-Simulation of Self-Adaptive Automotive Embedded Systems 自适应汽车嵌入式系统的联合仿真
M. Zeller, Gereon Weiss, D. Eilers, R. Knorr
The complexity of modern vehicular embedded systems is constantly rising. In addition, distributed embedded systems like automobiles often implement safety-relevant applications which have a high demands on safety and reliability. This poses a great challenge for the design of these systems. Self-adaptation may overcome these challenges and enhance the flexibility and robustness of automotive embedded systems. To design such systems in an efficient way, an adaptive system has to be verified and validated even in early stages of the development process. Co-simulation enables such an approach. In this paper, we outline a concept for iterative virtual prototyping of the entire automotive in-vehicle network including hardware components, software functions and interconnection networks. Furthermore, we present an approach to simulate self-adaptive behavior of the automotive embedded system.
现代车载嵌入式系统的复杂性不断提高。此外,像汽车这样的分布式嵌入式系统经常实现与安全相关的应用,这些应用对安全性和可靠性有很高的要求。这对这些系统的设计提出了很大的挑战。自适应可以克服这些挑战,提高汽车嵌入式系统的灵活性和鲁棒性。为了以有效的方式设计这样的系统,甚至在开发过程的早期阶段就必须对自适应系统进行验证和确认。联合仿真实现了这种方法。在本文中,我们概述了整个汽车车载网络的迭代虚拟样机概念,包括硬件组件,软件功能和互连网络。此外,我们还提出了一种模拟汽车嵌入式系统自适应行为的方法。
{"title":"Co-Simulation of Self-Adaptive Automotive Embedded Systems","authors":"M. Zeller, Gereon Weiss, D. Eilers, R. Knorr","doi":"10.1109/EUC.2010.21","DOIUrl":"https://doi.org/10.1109/EUC.2010.21","url":null,"abstract":"The complexity of modern vehicular embedded systems is constantly rising. In addition, distributed embedded systems like automobiles often implement safety-relevant applications which have a high demands on safety and reliability. This poses a great challenge for the design of these systems. Self-adaptation may overcome these challenges and enhance the flexibility and robustness of automotive embedded systems. To design such systems in an efficient way, an adaptive system has to be verified and validated even in early stages of the development process. Co-simulation enables such an approach. In this paper, we outline a concept for iterative virtual prototyping of the entire automotive in-vehicle network including hardware components, software functions and interconnection networks. Furthermore, we present an approach to simulate self-adaptive behavior of the automotive embedded system.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127788094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Trust-Based Authentication for Secure Communication in Cognitive Radio Networks 认知无线网络中基于信任的安全通信认证
S. Parvin, Song Han, B. Tian, F. Hussain
Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof.
在过去的几年里,认知无线电(CR)被认为是一个要求很高的概念,以提高有限的无线电频谱资源的利用率,用于未来的无线通信和移动计算。由于认知无线网络的成员可以随时加入或离开网络,因此支持crn中安全通信的问题变得比其他传统无线网络更加关键。因此,这项工作为crn提出了一种安全的基于信任的身份验证方法。CR节点的信任值由其在网络中的先前信任行为确定,并根据该信任值决定该CR节点是否可以访问主用户的自由频谱。进行了安全性分析,以保证所提出的方法达到安全证明。
{"title":"Trust-Based Authentication for Secure Communication in Cognitive Radio Networks","authors":"S. Parvin, Song Han, B. Tian, F. Hussain","doi":"10.1109/EUC.2010.95","DOIUrl":"https://doi.org/10.1109/EUC.2010.95","url":null,"abstract":"Over the past few years, Cognitive Radio (CR) has been considered as a demanding concept for improving the utilization of limited radio spectrum resources for future wireless communications and mobile computing. Since a member of Cognitive Radio Networks may join or leave the network at any time, the issue of supporting secure communication in CRNs becomes more critical than for the other conventional wireless networks. This work thus proposes a secure trust-based authentication approach for CRNs. A CR node’s trust value is determined from its previous trust behavior in the network and depending on this trust value, it is decided whether or not this CR node will obtain access to the Primary User’s free spectrum. The security analysis is performed to guarantee that the proposed approach achieves security proof.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126020561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Architectural Support for Reducing Parallel Processing Overhead in an Embedded Multiprocessor 减少嵌入式多处理器并行处理开销的体系结构支持
Jian Wang, Joar Sohl, Dake Liu
The host-multi-SIMD chip multiprocessor (CMP) architecture has been proved to be an efficient architecture for high performance signal processing which explores both task level parallelism by multi-core processing and data level parallelism by SIMD processors. Different from the cache-based memory subsystem in most general purpose processors, this architecture uses on-chip scratchpad memory (SPM) as processor local data buffer and allows software to explicitly control the data movements in the memory hierarchy. This SPM-based solution is more efficient for predictable signal processing in embedded systems where data access patterns are known at design time. The predictable performance is especially important for real time signal processing. According to Amdahl¡¯s law, the nonparallelizable part of an algorithm has critical impact on the overall performance. Implementing an algorithm in a parallel platform usually produces control and communication overhead which is not parallelizable. This paper presents the architectural support in an embedded multiprocessor platform to maximally reduce the parallel processing overhead. The effectiveness of these architecture designs in boosting parallel performance is evaluated by an implementation example of 64x64 complex matrix multiplication. The result shows that the parallel processing overhead is reduced from 369% to 28%.
主机-多SIMD芯片多处理器(CMP)架构既探索了多核处理的任务级并行性,又探索了SIMD处理器的数据级并行性,已被证明是一种高效的高性能信号处理架构。与大多数通用处理器中基于缓存的内存子系统不同,该体系结构使用片上刮板内存(SPM)作为处理器本地数据缓冲区,并允许软件显式地控制内存层次结构中的数据移动。这种基于spm的解决方案对于在设计时就知道数据访问模式的嵌入式系统中的可预测信号处理更有效。可预测的性能对实时信号处理尤为重要。根据Amdahl定律,算法的不可并行部分对整体性能有关键影响。在并行平台上实现算法通常会产生不可并行化的控制和通信开销。本文提出了嵌入式多处理器平台的架构支持,以最大限度地减少并行处理开销。通过一个64 × 64复矩阵乘法的实现实例,评估了这些架构设计在提高并行性能方面的有效性。结果表明,并行处理开销从369%降低到28%。
{"title":"Architectural Support for Reducing Parallel Processing Overhead in an Embedded Multiprocessor","authors":"Jian Wang, Joar Sohl, Dake Liu","doi":"10.1109/EUC.2010.17","DOIUrl":"https://doi.org/10.1109/EUC.2010.17","url":null,"abstract":"The host-multi-SIMD chip multiprocessor (CMP) architecture has been proved to be an efficient architecture for high performance signal processing which explores both task level parallelism by multi-core processing and data level parallelism by SIMD processors. Different from the cache-based memory subsystem in most general purpose processors, this architecture uses on-chip scratchpad memory (SPM) as processor local data buffer and allows software to explicitly control the data movements in the memory hierarchy. This SPM-based solution is more efficient for predictable signal processing in embedded systems where data access patterns are known at design time. The predictable performance is especially important for real time signal processing. According to Amdahl¡¯s law, the nonparallelizable part of an algorithm has critical impact on the overall performance. Implementing an algorithm in a parallel platform usually produces control and communication overhead which is not parallelizable. This paper presents the architectural support in an embedded multiprocessor platform to maximally reduce the parallel processing overhead. The effectiveness of these architecture designs in boosting parallel performance is evaluated by an implementation example of 64x64 complex matrix multiplication. The result shows that the parallel processing overhead is reduced from 369% to 28%.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130878697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal Redundancy 具有纠错码的指令级时间冗余容错体系结构
Chao Yan, Hongjun Dai, Tianzhou Chen, Meikang Qiu
Soft error has become an increasingly significant problem in modern computing systems. To overcome soft errors, it has reported that the instruction-level temporal redundancy in out-of-order cores suffers a performance penalty up to 45%. In this work, we propose the fault-tolerant double execution architecture with the fast error correcting code (such as two-dimensional error code) in the instruction reuse buffer. Experimental results show that it gains back IPC loss between 9.14% and 10.15%, with an average around 9.22% compared with the conventional double execution approach.
软误差已成为现代计算系统中日益突出的问题。为了克服软错误,据报道,乱序核中的指令级时间冗余遭受高达45%的性能损失。在这项工作中,我们提出了在指令重用缓冲区中使用快速纠错码(如二维错误码)的容错双执行架构。实验结果表明,与传统的双执行方法相比,该方法可挽回9.14% ~ 10.15%的IPC损失,平均挽回9.22%左右。
{"title":"A Fault-tolerant Architecture with Error Correcting Code for the Instruction-level Temporal Redundancy","authors":"Chao Yan, Hongjun Dai, Tianzhou Chen, Meikang Qiu","doi":"10.1109/EUC.2010.124","DOIUrl":"https://doi.org/10.1109/EUC.2010.124","url":null,"abstract":"Soft error has become an increasingly significant problem in modern computing systems. To overcome soft errors, it has reported that the instruction-level temporal redundancy in out-of-order cores suffers a performance penalty up to 45%. In this work, we propose the fault-tolerant double execution architecture with the fast error correcting code (such as two-dimensional error code) in the instruction reuse buffer. Experimental results show that it gains back IPC loss between 9.14% and 10.15%, with an average around 9.22% compared with the conventional double execution approach.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132296809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Sharing in Hierarchical Wireless Sensor Networks 分层无线传感器网络中的密钥共享
Ya-nan Liu, Jian Wang, He Du, L. Zhang
Hierarchical wireless sensor networks (HSNs) have been widely used in many applications, especially in military areas. They usually consist of different types of nodes and behave better in performances and reliability than traditional flat wireless sensor networks (FSNs). In this paper, a novel key pre-distribution scheme is proposed for a three-tier HSN. Shamir¡¯s secret sharing technique is implemented in intra-cluster pair wise key establishment. Compared with existing key management schemes, our scheme guarantees a fully connected network with less storage requirement and communication overhead of sensors. Besides, it substantially improves the network resilience against nodes capture attack and collusion attack.
分层无线传感器网络(HSNs)已广泛应用于许多领域,特别是军事领域。它们通常由不同类型的节点组成,在性能和可靠性方面优于传统的平面无线传感器网络(FSNs)。提出了一种新的三层HSN密钥预分配方案。Shamir的秘密共享技术是在集群内对密钥建立中实现的。与现有的密钥管理方案相比,我们的方案保证了一个完全连接的网络,减少了传感器的存储需求和通信开销。大大提高了网络抵御节点捕获攻击和合谋攻击的弹性。
{"title":"Key Sharing in Hierarchical Wireless Sensor Networks","authors":"Ya-nan Liu, Jian Wang, He Du, L. Zhang","doi":"10.1109/EUC.2010.117","DOIUrl":"https://doi.org/10.1109/EUC.2010.117","url":null,"abstract":"Hierarchical wireless sensor networks (HSNs) have been widely used in many applications, especially in military areas. They usually consist of different types of nodes and behave better in performances and reliability than traditional flat wireless sensor networks (FSNs). In this paper, a novel key pre-distribution scheme is proposed for a three-tier HSN. Shamir¡¯s secret sharing technique is implemented in intra-cluster pair wise key establishment. Compared with existing key management schemes, our scheme guarantees a fully connected network with less storage requirement and communication overhead of sensors. Besides, it substantially improves the network resilience against nodes capture attack and collusion attack.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Detecting Security Attacks in Trusted Virtual Domains 检测受信任虚拟域中的安全攻击
U. Tupakula, V. Varadharajan
A trusted virtual domain (TVD) enables grouping of related virtual machines running on separate physical machine into a single network domain with a unified security policy. Since the virtual machines can be running different operating systems and applications, the attacker can generate attacks in the TVD by exploiting a single vulnerability in any of the operating systems or applications. Our aim in this paper is to consider the design choices and develop an intrusion detection architecture that would enable efficient detection and prevention of different types of attacks in such a TVD based distributed environments. The proposed architecture can capture the knowledge of the operating systems and applications at fine granular level and isolate the malicious entities that are generating the attack traffic. Our model takes into account the security policies that are specific to the virtual machine as well as security policies of the trusted virtual domains to deal with the attacks efficiently.
TVD (trusted virtual domain)支持将运行在独立物理机上的相关虚拟机分组到具有统一安全策略的单个网络域中。由于虚拟机可以运行不同的操作系统和应用程序,因此攻击者可以利用任何操作系统或应用程序中的单个漏洞在TVD中生成攻击。本文的目的是考虑设计选择并开发一种入侵检测体系结构,该体系结构可以在这种基于TVD的分布式环境中有效地检测和预防不同类型的攻击。所提出的体系结构可以在细粒度级别捕获操作系统和应用程序的知识,并隔离生成攻击流量的恶意实体。我们的模型考虑了特定于虚拟机的安全策略以及可信虚拟域的安全策略,以有效地处理攻击。
{"title":"Detecting Security Attacks in Trusted Virtual Domains","authors":"U. Tupakula, V. Varadharajan","doi":"10.1109/EUC.2010.87","DOIUrl":"https://doi.org/10.1109/EUC.2010.87","url":null,"abstract":"A trusted virtual domain (TVD) enables grouping of related virtual machines running on separate physical machine into a single network domain with a unified security policy. Since the virtual machines can be running different operating systems and applications, the attacker can generate attacks in the TVD by exploiting a single vulnerability in any of the operating systems or applications. Our aim in this paper is to consider the design choices and develop an intrusion detection architecture that would enable efficient detection and prevention of different types of attacks in such a TVD based distributed environments. The proposed architecture can capture the knowledge of the operating systems and applications at fine granular level and isolate the malicious entities that are generating the attack traffic. Our model takes into account the security policies that are specific to the virtual machine as well as security policies of the trusted virtual domains to deal with the attacks efficiently.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131536768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Routing Algorithm Based on Trustworthy Core Tree for WSN 基于可信核心树的无线传感器网络路由算法
Jiang-tao Wang, Li-miao Li, Zhigang Chen
A Routing Algorithm base on Trustworthy Core Tree for WSN£¨RATCT£© is proposed in this paper aims to prolong network lifetime as well as increase network security in a hierarchical-cluster sensor network. Cluster heads with higher residual energy and trust level are elected from underlying sensor nodes. A minimum energy consumption spanning tree algorithm is used to organize all cluster heads into a trustworthy core tree with sink node as tree root. The Trustworthy core tree is expanded to cover all nodes so that each node report to sink node along a unique route. A trust model is integrated in RATCT to evaluate node¡¯s trust level and detect evil nodes. Simulation results testify to the effectiveness of the algorithm in producing a longer network lifetime and a safer network.
本文提出了一种基于可信赖核心树的WSN路由算法,目的是在分层集群传感器网络中延长网络寿命,提高网络安全性。从底层传感器节点中选出具有较高剩余能量和信任等级的簇头。采用最小能量消耗生成树算法,将所有簇头组织成以汇聚节点为树根的可靠核心树。守信核心树扩展到覆盖所有节点,以便每个节点沿着唯一的路径向汇聚节点报告。在RATCT中集成了一个信任模型,用于评估节点的信任等级和检测恶意节点。仿真结果证明了该算法在提高网络生存期和网络安全性方面的有效性。
{"title":"A Routing Algorithm Based on Trustworthy Core Tree for WSN","authors":"Jiang-tao Wang, Li-miao Li, Zhigang Chen","doi":"10.1109/EUC.2010.120","DOIUrl":"https://doi.org/10.1109/EUC.2010.120","url":null,"abstract":"A Routing Algorithm base on Trustworthy Core Tree for WSN£¨RATCT£© is proposed in this paper aims to prolong network lifetime as well as increase network security in a hierarchical-cluster sensor network. Cluster heads with higher residual energy and trust level are elected from underlying sensor nodes. A minimum energy consumption spanning tree algorithm is used to organize all cluster heads into a trustworthy core tree with sink node as tree root. The Trustworthy core tree is expanded to cover all nodes so that each node report to sink node along a unique route. A trust model is integrated in RATCT to evaluate node¡¯s trust level and detect evil nodes. Simulation results testify to the effectiveness of the algorithm in producing a longer network lifetime and a safer network.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134542167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Capability-Role-Based Delegation in Workflow Systems 工作流系统中基于能力-角色的委托
Koji Hasebe, Mitsuhiro Mabuchi
Various security models for supporting delegation in workflow systems have been proposed to achieve flexible access control in collaborative business processes. Since workflow systems come into their own when controlling large-scale business processes in a well-structured organization, these models are often based on role-based access control (RBAC). However, to realize a higher level of collaboration enabling users in different organizations to complete a common workflow, it is necessary to support cross-domain delegation of tasks. For this purpose, we propose a delegation model for workflow systems that extends the capability-role-based access control (CRBAC) model introduced in our previous work. The central idea behind our proposed model is that authority to perform tasks, as well as roles, are mapped to capabilities, thereby realizing delegation by capability transfer. By adopting the approach of a capability-based access control mechanism, our model provides both flexibility and reduced administration costs, thus allowing it to cope with unexpected changes in task assignments. We demonstrate these advantages by considering an example.
为了在协作业务流程中实现灵活的访问控制,提出了支持工作流系统中委托的各种安全模型。由于工作流系统在控制结构良好的组织中的大规模业务流程时发挥了自己的作用,因此这些模型通常基于基于角色的访问控制(RBAC)。然而,为了实现更高级别的协作,使不同组织中的用户能够完成一个共同的工作流,有必要支持跨领域的任务委派。为此,我们提出了工作流系统的委托模型,该模型扩展了我们之前工作中介绍的基于能力-角色的访问控制(CRBAC)模型。我们提出的模型背后的中心思想是,执行任务和角色的权限被映射到能力,从而通过能力转移实现委托。通过采用基于功能的访问控制机制,我们的模型既提供了灵活性,又降低了管理成本,从而允许它处理任务分配中的意外变化。我们通过一个例子来说明这些优点。
{"title":"Capability-Role-Based Delegation in Workflow Systems","authors":"Koji Hasebe, Mitsuhiro Mabuchi","doi":"10.1109/EUC.2010.112","DOIUrl":"https://doi.org/10.1109/EUC.2010.112","url":null,"abstract":"Various security models for supporting delegation in workflow systems have been proposed to achieve flexible access control in collaborative business processes. Since workflow systems come into their own when controlling large-scale business processes in a well-structured organization, these models are often based on role-based access control (RBAC). However, to realize a higher level of collaboration enabling users in different organizations to complete a common workflow, it is necessary to support cross-domain delegation of tasks. For this purpose, we propose a delegation model for workflow systems that extends the capability-role-based access control (CRBAC) model introduced in our previous work. The central idea behind our proposed model is that authority to perform tasks, as well as roles, are mapped to capabilities, thereby realizing delegation by capability transfer. By adopting the approach of a capability-based access control mechanism, our model provides both flexibility and reduced administration costs, thus allowing it to cope with unexpected changes in task assignments. We demonstrate these advantages by considering an example.","PeriodicalId":265175,"journal":{"name":"2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2010-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115178334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1