Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061457
Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang
The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.
{"title":"A High-Performance Parallel Hardware Architecture of SHA-256 Hash in ASIC","authors":"Ruizhen Wu, Xiaoyong Zhang, Mingming Wang, Lin Wang","doi":"10.23919/ICACT48636.2020.9061457","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061457","url":null,"abstract":"The SHA-256 algorithm is used to ensure the integrity and authenticity of data in order to achieve a good security thus is playing an important role in various applications, such as e-transactions and bitcoins. The SHA-256 computation capacity is a main research direction of Hashing Algorithm. In order to improve the computation capacity of hardware, the proposed design first uses pipeline principle and circuitry of timing prediction to find a most efficient architecture for implementation. Then it is optimized with hash function and hardware characteristics to give a high-performance hardware architecture of SHA-256 hash. Three pipelines are used to replace the critical path in the round functions which can shorten the timing path, and divide the computation chain into independent steps. Multi-computation of SHA-256 is working in parallel pipelines, indicating that the computation capacity can be 3 times of that with standard SHA-256 implementation. The proposed SHA-256 hardware architecture has been implemented and synthesized with Intel 14nm technology. Simulation and synthesis results show the proposed SHA-256 hashing throughput can be improved by 3 times with 50.7% power reduction, at an area cost of 2.9 times compared to that of the standard implementation.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134363407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061540
Xiang Gao, Xiao-peng Yan, Zhiquan Bai
In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.
{"title":"Spatial Modulation Based Color-Intensity Shift Keying in VLC System","authors":"Xiang Gao, Xiao-peng Yan, Zhiquan Bai","doi":"10.23919/ICACT48636.2020.9061540","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061540","url":null,"abstract":"In this paper, a modulation scheme referred as spatial modulation based color-intensity shift keying (SM CISK) is proposed for visible light communication (VLC) systems. The proposed scheme amalgamates conventional color shift keying (CSK), pulse amplitude modulation (PAM), and SM together to efficiently exploit the degrees of freedom in the color, the intensity, and the spatial domains. It maintains a constant average transmit power to fulfill the non-flickering requirement for the normal illumination. The bit error rate (BER) of the proposed scheme is studied based on the maximal likelihood (ML) detection. Simulation results verify that the proposed scheme outperforms the joint color-and-spatial modulation (SM CSK) and CISK modulation scheme.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"212 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134258195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061283
WooHyun Park
Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.
{"title":"A Study on Analytical Visualization of Deep Web","authors":"WooHyun Park","doi":"10.23919/ICACT48636.2020.9061283","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061283","url":null,"abstract":"Nowadays, there is a flood of data such as naked body photos and child pornography, which is making people bloodless. In addition, people also distribute drugs through unknown dark channels. In particular, most transactions are being made through the Deep Web, the dark path. “Deep Web refers to an encrypted network that is not detected on search engine like Google etc. Users must use Tor to visit sites on the dark web” [4]. In other words, the Dark Web uses Tor's encryption client. Therefore, users can visit multiple sites on the dark Web, but not know the initiator of the site. In this paper, we propose the key idea based on the current status of such crimes and a crime information visual system for Deep Web has been developed. The status of deep web is analyzed and data is visualized using Java. It is expected that the program will help more efficient management and monitoring of crime in unkown web such as deep web, torrent etc.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133388874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061437
Da-Yu Kao, Ting-Chi Wang, Fuching Tsai
Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.
{"title":"Forensic Artifacts of Network Traffic on WeChat Calls","authors":"Da-Yu Kao, Ting-Chi Wang, Fuching Tsai","doi":"10.23919/ICACT48636.2020.9061437","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061437","url":null,"abstract":"Voice over Internet Protocol (VoIP) applications, such as WeChat, Whatsapp, or LINE, have gained increasing popularity during the last few years. Packets analysis of VoIP is one of the critical criminal investigation strategies for law enforcement agencies (LEAs). Due to its convenience and multi-functionality, the WeChat application is accessible by a massive amount of people in Asia, especially in Taiwan and China. Therefore, this study uses Wireshark to reveal the tool marks behind the WeChat messages and voice calls. It will be an excellent help for LEAs to identify cybercriminals and bring them to justice.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130393502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061274
Maxim Zakharov, A. Muthanna, R. Kirichek, A. Koucheryavy
Today, quite a lot of attention is paid to the integration of information technology and medicine. E-health network development makes it possible. The principles of e-health networks imply the use of small-sized mobile medical devices - sensors and actuators. As a rule, sensors, and actuators are combined into a network and operate with other network devices: gateways, cloud servers, etc. The article discusses the network scheme, including a portable near-infrared spectrometer for molecular analysis of food products and its interaction with the Internet in the process of data collection and processing.
{"title":"Real-time Molecular Analysis Methods Based on Cloud Computing","authors":"Maxim Zakharov, A. Muthanna, R. Kirichek, A. Koucheryavy","doi":"10.23919/ICACT48636.2020.9061274","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061274","url":null,"abstract":"Today, quite a lot of attention is paid to the integration of information technology and medicine. E-health network development makes it possible. The principles of e-health networks imply the use of small-sized mobile medical devices - sensors and actuators. As a rule, sensors, and actuators are combined into a network and operate with other network devices: gateways, cloud servers, etc. The article discusses the network scheme, including a portable near-infrared spectrometer for molecular analysis of food products and its interaction with the Internet in the process of data collection and processing.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134129302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061227
Geng Zhang, Yanan Wang, Yang Wang, Huixia Ding, Weidong Wang, Zhiquan Bai
In order to maximize the capacity of the cooperative communication system, a power allocation scheme for multi-relay AF cooperative system based on blind relays is presented in this paper. Under the premise that the source power is known, the power allocation problem is modeled to maximize the capacity of the system and transformed into the standard convex optimization. The power allocation factors of each relay is obtained by solving the Karush-Kuhn-Tucher (KKT) condition. Finally, the capacity and outage probability of the proposed scheme are provided for the proposed power allocation scheme. Compared with the typical equal power allocation, the proposed convex optimization-based power allocation scheme achieves better performance.
{"title":"Power Allocation for Multi-Relay AF Cooperative System with Maximum System Capacity","authors":"Geng Zhang, Yanan Wang, Yang Wang, Huixia Ding, Weidong Wang, Zhiquan Bai","doi":"10.23919/ICACT48636.2020.9061227","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061227","url":null,"abstract":"In order to maximize the capacity of the cooperative communication system, a power allocation scheme for multi-relay AF cooperative system based on blind relays is presented in this paper. Under the premise that the source power is known, the power allocation problem is modeled to maximize the capacity of the system and transformed into the standard convex optimization. The power allocation factors of each relay is obtained by solving the Karush-Kuhn-Tucher (KKT) condition. Finally, the capacity and outage probability of the proposed scheme are provided for the proposed power allocation scheme. Compared with the typical equal power allocation, the proposed convex optimization-based power allocation scheme achieves better performance.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131673418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061455
Samba Diouf, Kéba Gueye, S. Ouya, G. Mendy
The purpose of this article is to contribute to the access to quality education in Mathematics and Philosophy for all children in the country, including those in remote areas of the capital, through an IPTV platform. To do this, we offer an SDN network integrated into an IPTV infrastructure in order to have an agile and automated interactive platform, but capable of video streaming. Interactivity is managed by Verto-FreeSwitch, agility, streaming and automation are the responsibility of SDN. The interactive IPTV server performs a multicast broadcast for learners. With a web browser or an IPTV client, learners can follow courses and interact in real time with teachers via the Verto-FreeSwitch module. The use of SDN allows to benefit from a better configuration of equipment to optimize data storage servers, but when coupled with IPTV they allow democratization of access to Mathematics and Philosophy courses.
{"title":"Proposal for a solution to improve access to mathematics and philosophy education in Senegal thanks to SDN and IPTV","authors":"Samba Diouf, Kéba Gueye, S. Ouya, G. Mendy","doi":"10.23919/ICACT48636.2020.9061455","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061455","url":null,"abstract":"The purpose of this article is to contribute to the access to quality education in Mathematics and Philosophy for all children in the country, including those in remote areas of the capital, through an IPTV platform. To do this, we offer an SDN network integrated into an IPTV infrastructure in order to have an agile and automated interactive platform, but capable of video streaming. Interactivity is managed by Verto-FreeSwitch, agility, streaming and automation are the responsibility of SDN. The interactive IPTV server performs a multicast broadcast for learners. With a web browser or an IPTV client, learners can follow courses and interact in real time with teachers via the Verto-FreeSwitch module. The use of SDN allows to benefit from a better configuration of equipment to optimize data storage servers, but when coupled with IPTV they allow democratization of access to Mathematics and Philosophy courses.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120986122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061261
Kuang-yao Lin, Wei-Ren Huang
In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.
{"title":"Using Federated Learning on Malware Classification","authors":"Kuang-yao Lin, Wei-Ren Huang","doi":"10.23919/ICACT48636.2020.9061261","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061261","url":null,"abstract":"In recent years, everything has been more and more systematic, and it would generate many cyber security issues. One of the most important of these is the malware. Modern malware has switched to a high-growth phase. According to the AV-TEST Institute showed that there are over 350,000 new malicious programs (malware) and potentially unwanted applications (PUA) be registered every day. This threat was presented and discussed in the present paper. In addition, we also considered data privacy by using federated learning. Feature extraction can be performed based on malware. The proposed method achieves very high accuracy (≈0.9167) on the dataset provided by VirusTotal.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115273336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061439
Yoon-Ji Kim, Geunbae Kim, D. Yoon
In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.
{"title":"Estimation of Convolutional Interleaver in a Non-cooperative Context","authors":"Yoon-Ji Kim, Geunbae Kim, D. Yoon","doi":"10.23919/ICACT48636.2020.9061439","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061439","url":null,"abstract":"In this paper, we propose the method for blind estimation of convolutional interleaver parameters in a noncooperative context by analysing repetitive patterns in interleaved sequences. Simulation results verify that proposed method could effectively estimate convolutional interleaver parameters in a noisy environment.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116743329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-02-01DOI: 10.23919/ICACT48636.2020.9061282
Chaehong Chung, J. Jeong
The rapid growth of IoT (Internet of Things) makes life better, but it can be a burden for IoT users to manage heterogeneous IoT devices in a timely and appropriate manner. In this paper, we propose an IoT device configuration translator for IoT-cloud services that enables IoT users who do not have expertise in IoT environments to efficiently configure their IoT devices. The user's high-level configuration based on natural language is delivered to the translator in IoT-cloud platform using NETCONF (Network Configuration Protocol). The translator, which is designed with three components using automata theory and database mapping information, translates the high-level configuration into a low-level configuration applicable to the IoT devices. This allows IoT users to configure their IoT devices without considering which protocols and platforms they work on.
{"title":"A Design of IoT Device Configuration Translator for Intent-Based IoT-Cloud Services","authors":"Chaehong Chung, J. Jeong","doi":"10.23919/ICACT48636.2020.9061282","DOIUrl":"https://doi.org/10.23919/ICACT48636.2020.9061282","url":null,"abstract":"The rapid growth of IoT (Internet of Things) makes life better, but it can be a burden for IoT users to manage heterogeneous IoT devices in a timely and appropriate manner. In this paper, we propose an IoT device configuration translator for IoT-cloud services that enables IoT users who do not have expertise in IoT environments to efficiently configure their IoT devices. The user's high-level configuration based on natural language is delivered to the translator in IoT-cloud platform using NETCONF (Network Configuration Protocol). The translator, which is designed with three components using automata theory and database mapping information, translates the high-level configuration into a low-level configuration applicable to the IoT devices. This allows IoT users to configure their IoT devices without considering which protocols and platforms they work on.","PeriodicalId":296763,"journal":{"name":"2020 22nd International Conference on Advanced Communication Technology (ICACT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116932834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}