首页 > 最新文献

2012 Fourth International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Improving Compression Using Words 使用单词改进压缩
J. Platoš, P. Krömer
General compression algorithms were designed for usage characters as basic symbols. Later, algorithm which used words were developed. The problem is that there is no clear line which defines if is better to use characters or words. In this paper, we developed optimization algorithm based on simulated annealing that selects only several words from all possible words and combine them with character to improve overall compression. The achieved results are very promising.
针对常用字符作为基本符号,设计了通用的压缩算法。后来,使用文字的算法被开发出来。问题是,没有明确的界限来定义使用字符或单词是否更好。在本文中,我们开发了一种基于模拟退火的优化算法,从所有可能的单词中只选择几个单词并将它们与字符组合以提高整体压缩。取得的成果是很有希望的。
{"title":"Improving Compression Using Words","authors":"J. Platoš, P. Krömer","doi":"10.1109/iNCoS.2012.103","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.103","url":null,"abstract":"General compression algorithms were designed for usage characters as basic symbols. Later, algorithm which used words were developed. The problem is that there is no clear line which defines if is better to use characters or words. In this paper, we developed optimization algorithm based on simulated annealing that selects only several words from all possible words and combine them with character to improve overall compression. The achieved results are very promising.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126702016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Key Recovery Attack on a Knapsack Public Key Cryptosystem 一种背包式公钥密码系统的密钥恢复攻击
Chunfei Ju, Hui Yuan
A new knapsack public key cryptosystem is crypt analyzed. The cryptanalytic attack uses the Euclidean algorithm to obtain the greatest common divisor of some integers, and thus recovers the modulus. Then the attack reconstructs the multiplier by solving a linear congruence. Therefore, all the secret keys can be retrieved in polynomial time. Hence, the public key cryptosystem is insecure.
分析了一种新的背负式公钥密码体制。密码分析攻击利用欧几里得算法求出某些整数的最大公因数,从而恢复其模量。然后通过求解线性同余重构乘数。因此,所有密钥都可以在多项式时间内检索到。因此,公钥密码系统是不安全的。
{"title":"Key Recovery Attack on a Knapsack Public Key Cryptosystem","authors":"Chunfei Ju, Hui Yuan","doi":"10.1109/iNCoS.2012.89","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.89","url":null,"abstract":"A new knapsack public key cryptosystem is crypt analyzed. The cryptanalytic attack uses the Euclidean algorithm to obtain the greatest common divisor of some integers, and thus recovers the modulus. Then the attack reconstructs the multiplier by solving a linear congruence. Therefore, all the secret keys can be retrieved in polynomial time. Hence, the public key cryptosystem is insecure.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125514179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme 一种多用途cca安全代理重加密方案的安全性研究
Jindan Zhang, Xu An Wang
In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the corresponding plaintext. PREcan be classified as single-use PRE and multi-use PRE according to the times the cipher text can be transformed. In multi-use PRE schemes, the cipher text can be transformed from A to B and to C and so on. In CCS'09 (post session), Wan get al. proposed a multi-use unidirectional CCA-secure proxy re-encryption scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.
在代理再加密(PRE)中,一个半可信的代理可以将原本为Alice准备的密文转换为Bob可以解密的密文,而代理不知道对应的明文。根据密文转换次数的不同,PRE可以分为单次PRE和多次PRE。在多用途PRE方案中,可以将密文从A转换为B、转换为C等。在CCS'09 (post session)中,Wan等人提出了一种多用途单向ca安全代理重加密方案。不幸的是,我们通过给出具体的攻击来证明他们的提议在相应的安全模型中不是cca安全的。
{"title":"On the Security of a Multi-use CCA-Secure Proxy Re-encryption Scheme","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/iNCoS.2012.53","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.53","url":null,"abstract":"In proxy re-encryption (PRE), a semi-trusted proxy can convert a cipher text originally intended for Alice into one which can be decrypted by Bob, while the proxy can not know the corresponding plaintext. PREcan be classified as single-use PRE and multi-use PRE according to the times the cipher text can be transformed. In multi-use PRE schemes, the cipher text can be transformed from A to B and to C and so on. In CCS'09 (post session), Wan get al. proposed a multi-use unidirectional CCA-secure proxy re-encryption scheme. Unfortunately, we show their proposal is not CCA-secure in the corresponding security models by giving concrete attacks.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124365472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improving Cloud Datacentre Scalability, Agility and Performance Using OpenFlow 使用OpenFlow改进云数据中心的可伸缩性、敏捷性和性能
Charlie Baker, A. Anjum, Richard Hill, N. Bessis, Saad Liaquat
With network infrastructure reaching capacity limits, new ways of managing network traffic and devices in Cloud data centres need to be investigated to better scale and manage the data centre resources. Open Flow can be a good fit for the usage within a datacentre due to its promise to reduce the cost of operations by reducing the time needed to configure network resources and flexibly managing the operations. Open Flow allows a programmable Software Defined Network to be implemented and network resources such as switches can be remotely and collectively configured, controlled and monitored. With increasing number of resources in data centres, and by consequence the networking hardware and software, Open Flow can be used to manage the network devices and the flow of traffic throughout the network. This paper investigates if Open Flow based switches allow for flexible networking and administration to enable quick network segmentation, packet re-routing, permit scalability and allow for quick network setup in Cloud data centres. With the help of experiments, this work also investigates what design and implementation considerations need to be made to achieve scalability, agility and performance in Cloud data centres.
随着网络基础设施达到容量限制,需要研究管理云数据中心网络流量和设备的新方法,以更好地扩展和管理数据中心资源。Open Flow非常适合在数据中心内使用,因为它承诺通过减少配置网络资源所需的时间和灵活管理操作来降低操作成本。Open Flow允许实现可编程的软件定义网络,并且可以远程和集体配置、控制和监视交换机等网络资源。随着数据中心资源数量的增加,以及网络硬件和软件的结果,Open Flow可以用于管理网络设备和整个网络的流量。本文研究了基于Open Flow的交换机是否允许灵活的网络和管理,以实现快速的网络分段、数据包重路由、允许可扩展性和允许快速的云数据中心网络设置。在实验的帮助下,本工作还研究了在云数据中心中实现可伸缩性、敏捷性和性能需要考虑哪些设计和实现因素。
{"title":"Improving Cloud Datacentre Scalability, Agility and Performance Using OpenFlow","authors":"Charlie Baker, A. Anjum, Richard Hill, N. Bessis, Saad Liaquat","doi":"10.1109/iNCoS.2012.118","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.118","url":null,"abstract":"With network infrastructure reaching capacity limits, new ways of managing network traffic and devices in Cloud data centres need to be investigated to better scale and manage the data centre resources. Open Flow can be a good fit for the usage within a datacentre due to its promise to reduce the cost of operations by reducing the time needed to configure network resources and flexibly managing the operations. Open Flow allows a programmable Software Defined Network to be implemented and network resources such as switches can be remotely and collectively configured, controlled and monitored. With increasing number of resources in data centres, and by consequence the networking hardware and software, Open Flow can be used to manage the network devices and the flow of traffic throughout the network. This paper investigates if Open Flow based switches allow for flexible networking and administration to enable quick network segmentation, packet re-routing, permit scalability and allow for quick network setup in Cloud data centres. With the help of experiments, this work also investigates what design and implementation considerations need to be made to achieve scalability, agility and performance in Cloud data centres.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127762786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Dynamic Group Based Authentication Protocol for Machine Type Communications 基于动态组的机器类型通信认证协议
Yueyu Zhang, Jing Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai
In cellular networks, Machine-Type Communication (MTC) has shown the advantages, including better coverage and lower network deployment cost, which makes it become the hotspot in industry area. However, the current cellular network is designed for human-to-human communication (H2H), and less optimal for machine-to-machine, machine-to-human or human-to-machine applications. One of the most urgent issues, which network operators are currently facing, is MTC related signalling congestion and overload. Especially, when a large co-located MTC group almost simultaneously accesses or periodically transmits, masses authentication data may cause a serious congestion in VLR/SGSN node and overload of link between serving network (SN) and home environment (HE). This paper provides a practical group based authentication and key agreement for MTC roaming scenario. In the group, each MTC device not only shares a secret key with home environment, but also a group secret key with home environment and other MTC devices belong to the same group. Then signalling data is reduced between serving network and home environment, by the MTC device using this group key as an authentication key and authenticating locally. Furthermore, a method of group key update is proposed to suit for dynamic MTC group. Finally, the analysis shows that the proposal can remarkably lower the effort of handling large MTC group, and minimize the change of operator's core network(CN).
在蜂窝网络中,机器类型通信(MTC)显示出覆盖范围广、网络部署成本低等优势,成为工业领域的热点。然而,目前的蜂窝网络是为人与人之间的通信(H2H)而设计的,对于机器对机器、机器对人或人与人之间的应用来说并不理想。与MTC相关的信令拥塞和过载是当前网络运营商面临的最紧迫的问题之一。特别是当一个大型的共址MTC组几乎同时访问或周期性传输时,大量的认证数据可能会导致VLR/SGSN节点严重拥塞,导致业务网络(SN)和归属环境(HE)之间的链路过载。针对MTC漫游场景,提出了一种实用的基于组的身份验证和密钥协议。在组中,每个MTC设备不仅与家庭环境共享一个秘钥,而且与家庭环境和属于同一组的其他MTC设备共享一个组秘钥。然后MTC设备使用此组密钥作为认证密钥并进行本地认证,从而减少服务网络和家庭环境之间的信令数据。在此基础上,提出了一种适用于动态MTC组的组密钥更新方法。最后,分析表明,该方案可以显著降低处理大型MTC组的工作量,并最大限度地减少运营商核心网(CN)的变化。
{"title":"Dynamic Group Based Authentication Protocol for Machine Type Communications","authors":"Yueyu Zhang, Jing Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai","doi":"10.1109/iNCoS.2012.86","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.86","url":null,"abstract":"In cellular networks, Machine-Type Communication (MTC) has shown the advantages, including better coverage and lower network deployment cost, which makes it become the hotspot in industry area. However, the current cellular network is designed for human-to-human communication (H2H), and less optimal for machine-to-machine, machine-to-human or human-to-machine applications. One of the most urgent issues, which network operators are currently facing, is MTC related signalling congestion and overload. Especially, when a large co-located MTC group almost simultaneously accesses or periodically transmits, masses authentication data may cause a serious congestion in VLR/SGSN node and overload of link between serving network (SN) and home environment (HE). This paper provides a practical group based authentication and key agreement for MTC roaming scenario. In the group, each MTC device not only shares a secret key with home environment, but also a group secret key with home environment and other MTC devices belong to the same group. Then signalling data is reduced between serving network and home environment, by the MTC device using this group key as an authentication key and authenticating locally. Furthermore, a method of group key update is proposed to suit for dynamic MTC group. Finally, the analysis shows that the proposal can remarkably lower the effort of handling large MTC group, and minimize the change of operator's core network(CN).","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131079352","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Learning the Classification of Traffic Accident Types 学习交通事故类型的分类
Tibebe Beshah, D. Ejigu, P. Krömer, V. Snás̃el, J. Platoš, A. Abraham
This paper presents an application of evolutionary fuzzy classifier design to a road accident data analysis. A fuzzy classifier evolved by the genetic programming was used to learn the labeling of data in a real world road accident data set. The symbolic classifier was inspected in order to select important features and the relations among them. Selected features provide a feedback for traffic management authorities that can exploit the knowledge to improve road safety and mitigate the severity of traffic accidents.
提出了一种基于进化模糊分类器的道路交通事故数据分析方法。利用遗传规划进化出的模糊分类器,对实际道路交通事故数据集进行标注学习。对符号分类器进行了检验,以选择重要特征及其之间的关系。选定的功能可以为交通管理部门提供反馈,从而可以利用这些知识来改善道路安全和减轻交通事故的严重程度。
{"title":"Learning the Classification of Traffic Accident Types","authors":"Tibebe Beshah, D. Ejigu, P. Krömer, V. Snás̃el, J. Platoš, A. Abraham","doi":"10.1109/INCOS.2012.75","DOIUrl":"https://doi.org/10.1109/INCOS.2012.75","url":null,"abstract":"This paper presents an application of evolutionary fuzzy classifier design to a road accident data analysis. A fuzzy classifier evolved by the genetic programming was used to learn the labeling of data in a real world road accident data set. The symbolic classifier was inspected in order to select important features and the relations among them. Selected features provide a feedback for traffic management authorities that can exploit the knowledge to improve road safety and mitigate the severity of traffic accidents.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132493704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
A Normalized Local Binary Fitting Model for Image Segmentation 图像分割的归一化局部二值拟合模型
Yali Peng, Fang Liu, Shigang Liu
A normalized local binary fitting (NLBF) model is proposed for image segmentation in this paper. The proposed model can effectively and efficiently segment images with intensity in homogeneity because the image local characteristics are considered. At the same time, we use a Gaussian filtering process instead of the regularization to keep the level set function smooth in the evolution process. The strategy can reduce computational cost. Comparative experimental results on synthetic and real images demonstrate that the proposed model outperforms the well-known local binary fitting (LBF) model in computational efficiency and robustness to the initial contour.
提出了一种用于图像分割的归一化局部二值拟合(NLBF)模型。该模型考虑了图像局部特征,能够有效地分割出均匀性较强的图像。同时,我们用高斯滤波代替正则化来保持水平集函数在进化过程中的平滑性。该策略可以降低计算成本。在合成图像和真实图像上的对比实验结果表明,该模型在计算效率和对初始轮廓的鲁棒性方面优于著名的局部二值拟合(LBF)模型。
{"title":"A Normalized Local Binary Fitting Model for Image Segmentation","authors":"Yali Peng, Fang Liu, Shigang Liu","doi":"10.1109/iNCoS.2012.119","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.119","url":null,"abstract":"A normalized local binary fitting (NLBF) model is proposed for image segmentation in this paper. The proposed model can effectively and efficiently segment images with intensity in homogeneity because the image local characteristics are considered. At the same time, we use a Gaussian filtering process instead of the regularization to keep the level set function smooth in the evolution process. The strategy can reduce computational cost. Comparative experimental results on synthetic and real images demonstrate that the proposed model outperforms the well-known local binary fitting (LBF) model in computational efficiency and robustness to the initial contour.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131904691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies 基于等基因的抗量子强指定验证者签名
Xi Sun, Haibo Tian, Yumin Wang
This paper proposes a strong designated verifier signature (SDVS) based on a recently proposed mathematical problem. It consists in searching for an isogeny between super singular elliptic curves. The problem is hypothetically strong against a quantum computer. This makes our proposal the first SDVS scheme that may be secure against a quantum computer.
基于最近提出的一个数学问题,提出了一种强指定验证者签名(sdv)。它包括在超奇异椭圆曲线之间寻找等根。假设这个问题在量子计算机上很强大。这使得我们的提议成为第一个可能对量子计算机安全的sdv方案。
{"title":"Toward Quantum-Resistant Strong Designated Verifier Signature from Isogenies","authors":"Xi Sun, Haibo Tian, Yumin Wang","doi":"10.1109/iNCoS.2012.70","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.70","url":null,"abstract":"This paper proposes a strong designated verifier signature (SDVS) based on a recently proposed mathematical problem. It consists in searching for an isogeny between super singular elliptic curves. The problem is hypothetically strong against a quantum computer. This makes our proposal the first SDVS scheme that may be secure against a quantum computer.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124425976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 37
Lattice Attack on the Knapsack Cipher 0/255 背包密码0/255的点阵攻击
Baocang Wang, H. Lei
A recently-proposed knapsack public key cryptosystem called knapsack cipher 0/255 is crypt analyzed. It is pointed out that a lattice can be derived from the public key of the knapsack cipher 0/255. The corresponding secret key can be recovered by finding the shortest nonzero vector with lattice basis reduction algorithms. Thus the knapsack cipher 0/255 is insecure.
本文分析了最近提出的背包公钥密码系统——背包密码0/255。指出从背包密码0/255的公钥可以导出一个格。利用格基约简算法,通过寻找最短的非零向量来恢复相应的密钥。因此背包密码0/255是不安全的。
{"title":"Lattice Attack on the Knapsack Cipher 0/255","authors":"Baocang Wang, H. Lei","doi":"10.1109/iNCoS.2012.90","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.90","url":null,"abstract":"A recently-proposed knapsack public key cryptosystem called knapsack cipher 0/255 is crypt analyzed. It is pointed out that a lattice can be derived from the public key of the knapsack cipher 0/255. The corresponding secret key can be recovered by finding the shortest nonzero vector with lattice basis reduction algorithms. Thus the knapsack cipher 0/255 is insecure.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"12 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116808175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing Virtual Networks for Multi-owner Wireless Sensor Networks 保护多所有者无线传感器网络的虚拟网络
L. Gheorghe, D. Tudose, Markus Wehner, S. Zeisberg
Multi-Owner Wireless Sensor Networks consist of devices owned by different entities. They have the purpose of covering large areas and reducing energy consumption associated with transmission over long distances. We propose the use of Virtual Networks with the purpose of grouping resources in a Multi-Owner Wireless Sensor Network and delivering a service to the associated owner. We designed a scheme for securing communication in a Virtual Network. The nodes that belong to a specific owner must authenticate themselves before receiving the Virtual Network credentials and the Service Description. We investigated the impact of false data injection and eavesdropping attacks generated by external or internal compromised nodes. We conclude that our security scheme minimizes the impact of attacks against Multi-Owner Wireless Sensor Networks, while allowing data aggregation for efficiency purposes.
多所有者无线传感器网络由不同实体拥有的设备组成。它们的目的是覆盖大面积,减少与长距离传输相关的能源消耗。我们建议使用虚拟网络,目的是在多所有者无线传感器网络中分组资源,并向相关所有者提供服务。我们设计了一种在虚拟网络中保护通信安全的方案。属于特定所有者的节点必须在接收虚拟网络凭据和服务描述之前对自己进行身份验证。我们调查了由外部或内部受损节点产生的虚假数据注入和窃听攻击的影响。我们得出的结论是,我们的安全方案最大限度地减少了针对多所有者无线传感器网络的攻击的影响,同时允许出于效率目的的数据聚合。
{"title":"Securing Virtual Networks for Multi-owner Wireless Sensor Networks","authors":"L. Gheorghe, D. Tudose, Markus Wehner, S. Zeisberg","doi":"10.1109/iNCoS.2012.91","DOIUrl":"https://doi.org/10.1109/iNCoS.2012.91","url":null,"abstract":"Multi-Owner Wireless Sensor Networks consist of devices owned by different entities. They have the purpose of covering large areas and reducing energy consumption associated with transmission over long distances. We propose the use of Virtual Networks with the purpose of grouping resources in a Multi-Owner Wireless Sensor Network and delivering a service to the associated owner. We designed a scheme for securing communication in a Virtual Network. The nodes that belong to a specific owner must authenticate themselves before receiving the Virtual Network credentials and the Service Description. We investigated the impact of false data injection and eavesdropping attacks generated by external or internal compromised nodes. We conclude that our security scheme minimizes the impact of attacks against Multi-Owner Wireless Sensor Networks, while allowing data aggregation for efficiency purposes.","PeriodicalId":287478,"journal":{"name":"2012 Fourth International Conference on Intelligent Networking and Collaborative Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116942637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2012 Fourth International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1