首页 > 最新文献

2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications最新文献

英文 中文
IPAS: Implicit Password Authentication System IPAS:隐式密码认证系统
Sadiq Almuairfi, P. Veeraraghavan, N. Chilamkurti
Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, viz. graphical scheme was introduced. But it also suffered due to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit Password Authentication System, which is immune to the common attacks suffered by other authentication schemes.
身份验证是防止危及机密性和完整性的第一道防线。虽然传统的基于登录/密码的方案很容易实现,但它们已经受到了几次攻击。作为替代方案,引入了基于令牌和生物识别的身份验证系统。然而,它们并没有显著改善,不足以证明投资是合理的。因此,引入了登录/密码方案的一种变体,即图形方案。但它也受到肩部冲浪和屏幕转储攻击的影响。在本文中,我们介绍了我们提出的隐式密码认证系统(IPAS)的框架,它不受其他认证方案所遭受的常见攻击。
{"title":"IPAS: Implicit Password Authentication System","authors":"Sadiq Almuairfi, P. Veeraraghavan, N. Chilamkurti","doi":"10.1109/WAINA.2011.36","DOIUrl":"https://doi.org/10.1109/WAINA.2011.36","url":null,"abstract":"Authentication is the first line of defense against compromising confidentiality and integrity. Though traditional login/password based schemes are easy to implement, they have been subjected to several attacks. As an alternative, token and biometric based authentication systems were introduced. However, they have not improved substantially to justify the investment. Thus, a variation to the login/password scheme, viz. graphical scheme was introduced. But it also suffered due to shoulder-surfing and screen dump attacks. In this paper, we introduce a framework of our proposed (IPAS) Implicit Password Authentication System, which is immune to the common attacks suffered by other authentication schemes.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121767329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
Improvement and Evaluation of a Method to Manage Multiple Types of Logs 多类型日志管理方法的改进与评价
Akihiro Tomono, M. Uehara, Y. Shimada
In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for internal control is growing steadily. In particular, auditing logs are important for internal control, since internal control without audit evidence is incomplete. Moreover, logs are necessary not only as a defense mechanism, but also since they contain much information that can lead to improvements in the company. Consequently, the correct use of logs can be beneficial to a company. However, the cost of an information system is dependent on the amount of data, which in the case of log data can be very large. There are many different kinds of logs and storing them long term is necessary to realize an internal control system based on logs. Previously, we proposed a low cost system to store logs semi-permanently using a Virtual Large Scale Disk. However, this method has problems with cross-sectional searches of different formats and its overall effectiveness. Therefore, we proposed a log that can cope with changing schema on demand by integrating several kinds of logs into YAML format. We also proposed a log format able to search across several kinds of logs by consolidating the log format and combining the logs into a single file. However, this proposal is not usable in practice, instead an integrated log is needed. Thus, in this paper, we implement a method that ensures consistency when a log is converted into YAML format from a raw log and vice versa and a command to search the integrated log. We also present an evaluation of the proposed method.
近年来,不仅在美国,而且在日本,许多公司都出现了会计丑闻。对内部控制的需求正在稳步增长。审计日志对内部控制尤其重要,因为没有审计证据的内部控制是不完整的。此外,日志不仅作为一种防御机制是必要的,而且因为它们包含了许多可以导致公司改进的信息。因此,正确使用日志对公司是有益的。然而,信息系统的成本取决于数据量,对于日志数据来说,数据量可能非常大。日志的种类繁多,要实现基于日志的内部控制系统,必须对日志进行长期存储。以前,我们提出了一种低成本的系统,使用虚拟大规模磁盘来半永久地存储日志。然而,这种方法在不同格式的横断面搜索和整体有效性方面存在问题。因此,我们提出了一种日志,它可以通过将几种日志集成到YAML格式中来应对模式的随需变化。我们还提出了一种日志格式,可以通过整合日志格式并将日志合并到单个文件中来搜索多种日志。然而,这个建议在实践中是不可用的,而是需要一个集成的日志。因此,在本文中,我们实现了一种方法,以确保日志从原始日志转换为YAML格式时的一致性,反之亦然,并实现了搜索集成日志的命令。我们还对所提出的方法进行了评估。
{"title":"Improvement and Evaluation of a Method to Manage Multiple Types of Logs","authors":"Akihiro Tomono, M. Uehara, Y. Shimada","doi":"10.1109/WAINA.2011.51","DOIUrl":"https://doi.org/10.1109/WAINA.2011.51","url":null,"abstract":"In recent years, many accounting scandals have been reported in companies not only in the United States, but also in Japan. The need for internal control is growing steadily. In particular, auditing logs are important for internal control, since internal control without audit evidence is incomplete. Moreover, logs are necessary not only as a defense mechanism, but also since they contain much information that can lead to improvements in the company. Consequently, the correct use of logs can be beneficial to a company. However, the cost of an information system is dependent on the amount of data, which in the case of log data can be very large. There are many different kinds of logs and storing them long term is necessary to realize an internal control system based on logs. Previously, we proposed a low cost system to store logs semi-permanently using a Virtual Large Scale Disk. However, this method has problems with cross-sectional searches of different formats and its overall effectiveness. Therefore, we proposed a log that can cope with changing schema on demand by integrating several kinds of logs into YAML format. We also proposed a log format able to search across several kinds of logs by consolidating the log format and combining the logs into a single file. However, this proposal is not usable in practice, instead an integrated log is needed. Thus, in this paper, we implement a method that ensures consistency when a log is converted into YAML format from a raw log and vice versa and a command to search the integrated log. We also present an evaluation of the proposed method.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125569122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach 在分布式认知无线网络中实现上下文感知和智能:一种收益传播方法
K. Yau, P. Komisarczuk, Paul D. Teal
Cognitive Radio (CR) is a next-generation wireless communication system that exploits underutilized licensed spectrum to optimize the utilization of the overall radio spectrum. A Distributed Cognitive Radio Network (DCRN) is a distributed wireless network established by a number of CR hosts in the absence of fixed network infrastructure. Context awareness and intelligence are key characteristics of CR networks that enable the CR hosts to be aware of their operating environment in order to make an optimal joint action. This research aims to achieve context awareness and intelligence in DCRN using our novel Locally-Confined Payoff Propagation (LCPP), which is an important feature in Multi-Agent Reinforcement Learning (MARL). The LCPP mechanism is suitable to be applied in most applications in DCRN that require context awareness and intelligence such as scheduling, congestion control, as well as Dynamic Channel Selection (DCS), which is the focus of this paper. Simulation results show that the LCPP mechanism is a promising approach. The LCPP mechanism converges to an optimal joint action including networks with cyclic topology. Fast convergence is possible. The investigation in this paper serve as an important foundation for future work in this research field.
认知无线电(CR)是下一代无线通信系统,它利用未充分利用的许可频谱来优化整个无线电频谱的利用率。分布式认知无线网络(DCRN)是在没有固定网络基础设施的情况下,由多个CR主机建立的分布式无线网络。情境感知和智能是CR网络的关键特征,它使CR主机能够感知其运行环境,从而做出最佳的联合行动。本研究旨在使用我们新颖的局部受限支付传播(LCPP)来实现DCRN中的上下文感知和智能,这是多智能体强化学习(MARL)的一个重要特征。LCPP机制适用于DCRN中大多数需要上下文感知和智能的应用,如调度、拥塞控制以及动态信道选择(DCS),这是本文研究的重点。仿真结果表明,LCPP机制是一种很有前途的方法。LCPP机制收敛于包含循环拓扑网络的最优联合作用。快速收敛是可能的。本文的研究为今后该研究领域的工作奠定了重要的基础。
{"title":"Achieving Context Awareness and Intelligence in Distributed Cognitive Radio Networks: A Payoff Propagation Approach","authors":"K. Yau, P. Komisarczuk, Paul D. Teal","doi":"10.1109/WAINA.2011.47","DOIUrl":"https://doi.org/10.1109/WAINA.2011.47","url":null,"abstract":"Cognitive Radio (CR) is a next-generation wireless communication system that exploits underutilized licensed spectrum to optimize the utilization of the overall radio spectrum. A Distributed Cognitive Radio Network (DCRN) is a distributed wireless network established by a number of CR hosts in the absence of fixed network infrastructure. Context awareness and intelligence are key characteristics of CR networks that enable the CR hosts to be aware of their operating environment in order to make an optimal joint action. This research aims to achieve context awareness and intelligence in DCRN using our novel Locally-Confined Payoff Propagation (LCPP), which is an important feature in Multi-Agent Reinforcement Learning (MARL). The LCPP mechanism is suitable to be applied in most applications in DCRN that require context awareness and intelligence such as scheduling, congestion control, as well as Dynamic Channel Selection (DCS), which is the focus of this paper. Simulation results show that the LCPP mechanism is a promising approach. The LCPP mechanism converges to an optimal joint action including networks with cyclic topology. Fast convergence is possible. The investigation in this paper serve as an important foundation for future work in this research field.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"204 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131490404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration 基于策略的IP地址选择
Shin Maruyama, M. Kozuka, Y. Okabe, Motonori Nakamura
SCTP is a reliable transport protocol that supports redundant paths by multiaddressing. Dynamic reconfiguration of IP addresses of an existing association is also supported by an extension called the ADD-IP feature. SCTP tries to use of all available addresses on both end hosts, but among them, there are addresses that should preferably not be used by certain policies or that are known to be unusable beforehand. Trials to use such addresses might cause unexpected degradations of performance or undesired termination of associations by time out. In this study, we propose a new feature by which a user can specify his own address usage policy, per process, according to which a host can determine which address may be used and which should be ignored. If an application program with SCTP is written in the protocol independent programming style, improper addresses are transparently removed so that the application program might use all and only usable addresses.
SCTP是一种可靠的传输协议,通过多寻址支持冗余路径。一个名为ADD-IP特性的扩展也支持对现有关联的IP地址进行动态重新配置。SCTP试图使用两端主机上所有可用的地址,但其中有些地址最好不要被某些策略使用,或者事先就知道是不可用的。尝试使用这些地址可能会导致意外的性能下降或超时时不希望的关联终止。在这项研究中,我们提出了一个新功能,通过该功能,用户可以指定自己的地址使用策略,每个进程,根据该策略,主机可以确定哪些地址可以使用,哪些应该被忽略。如果使用SCTP的应用程序是以协议独立编程风格编写的,则会透明地删除不适当的地址,以便应用程序可以使用所有可用的地址。
{"title":"Policy-Based IP Address Selection in SCTP Automatic Address Reconfiguration","authors":"Shin Maruyama, M. Kozuka, Y. Okabe, Motonori Nakamura","doi":"10.1109/WAINA.2011.71","DOIUrl":"https://doi.org/10.1109/WAINA.2011.71","url":null,"abstract":"SCTP is a reliable transport protocol that supports redundant paths by multiaddressing. Dynamic reconfiguration of IP addresses of an existing association is also supported by an extension called the ADD-IP feature. SCTP tries to use of all available addresses on both end hosts, but among them, there are addresses that should preferably not be used by certain policies or that are known to be unusable beforehand. Trials to use such addresses might cause unexpected degradations of performance or undesired termination of associations by time out. In this study, we propose a new feature by which a user can specify his own address usage policy, per process, according to which a host can determine which address may be used and which should be ignored. If an application program with SCTP is written in the protocol independent programming style, improper addresses are transparently removed so that the application program might use all and only usable addresses.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122271687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Performance Evaluation of AODV and DYMO as a Plattform for Rescue Task Applications in MANETs 基于AODV和DYMO平台的机动机动网络救援任务性能评价
Miguel A. Wister, Pablo Pancardo, Francisco D. Acosta, Dante Arias Torres
Choosing a routing protocol is an essential part in the success of the communication in mobile Ad-Hoc networks (MANET), since their topology is constantly changing. In many MANET applications (such as rescue tasks applications) it is necessary to assure reliable communication among network nodes. In this paper is showed a performance evaluation of two reactive routing protocols in order to know which is the most appropriate one for rescue tasks operations. Two protocols are evaluated: AODV (Ad hoc On Demand Distance Vector) and DYMO (Dynamic MANET On-demand routing protocol). Various mobility conditions in the environment are presented as well as the respective behavior of the protocols under these variations. The results of this work are organized in metrics which enabled the conclusions about the protocols performance.
由于移动自组织网络(MANET)的拓扑结构是不断变化的,路由协议的选择对通信的成功与否至关重要。在许多MANET应用(如救援任务应用)中,必须保证网络节点之间的可靠通信。本文对两种响应路由协议进行了性能评价,以确定哪一种协议最适合救援任务操作。评估了两种协议:AODV (Ad hoc On Demand Distance Vector)和DYMO (Dynamic MANET On Demand routing protocol)。提出了环境中的各种移动条件以及在这些变化下协议的各自行为。这项工作的结果被组织在指标中,从而得出关于协议性能的结论。
{"title":"Performance Evaluation of AODV and DYMO as a Plattform for Rescue Task Applications in MANETs","authors":"Miguel A. Wister, Pablo Pancardo, Francisco D. Acosta, Dante Arias Torres","doi":"10.1109/WAINA.2011.46","DOIUrl":"https://doi.org/10.1109/WAINA.2011.46","url":null,"abstract":"Choosing a routing protocol is an essential part in the success of the communication in mobile Ad-Hoc networks (MANET), since their topology is constantly changing. In many MANET applications (such as rescue tasks applications) it is necessary to assure reliable communication among network nodes. In this paper is showed a performance evaluation of two reactive routing protocols in order to know which is the most appropriate one for rescue tasks operations. Two protocols are evaluated: AODV (Ad hoc On Demand Distance Vector) and DYMO (Dynamic MANET On-demand routing protocol). Various mobility conditions in the environment are presented as well as the respective behavior of the protocols under these variations. The results of this work are organized in metrics which enabled the conclusions about the protocols performance.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126593384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
SenseKey -- Simplifying the Selection of Key Management Schemes for Sensor Networks SenseKey——简化传感器网络密钥管理方案的选择
R. Román, Javier López, Cristina Alcaraz, Hsiao-Hwa Chen
Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There is a large number of available KMS protocols in the literature, but it is not clear what should network designers do to choose the most suitable protocol for the needs of their applications. In this paper, we consider that given a certain set of application requirements, the network designer can check which properties comply with those requirements and select the KMS protocols that contains those particular properties. Therefore, we study the relationship between requirements and properties, and we provide a web tool, the Sense Key tool, that can be used to automatically obtain an optimal set of KMS protocols.
密钥管理方案(KMS)是无线传感器网络(WSN)非常重要的安全机制,因为它们用于管理安全原语所需的凭据(即秘密密钥)。文献中有大量可用的KMS协议,但不清楚网络设计者应该做什么来选择最适合其应用程序需求的协议。在本文中,我们认为给定一组特定的应用程序需求,网络设计者可以检查哪些属性符合这些需求,并选择包含这些特定属性的KMS协议。因此,我们研究了需求和属性之间的关系,并提供了一个web工具,即Sense Key工具,可以用来自动获得一组最优的KMS协议。
{"title":"SenseKey -- Simplifying the Selection of Key Management Schemes for Sensor Networks","authors":"R. Román, Javier López, Cristina Alcaraz, Hsiao-Hwa Chen","doi":"10.1109/WAINA.2011.78","DOIUrl":"https://doi.org/10.1109/WAINA.2011.78","url":null,"abstract":"Key Management Schemes (KMS) are a very important security mechanism for Wireless Sensor Networks (WSN), as they are used to manage the credentials (i.e. secret keys) that are needed by the security primitives. There is a large number of available KMS protocols in the literature, but it is not clear what should network designers do to choose the most suitable protocol for the needs of their applications. In this paper, we consider that given a certain set of application requirements, the network designer can check which properties comply with those requirements and select the KMS protocols that contains those particular properties. Therefore, we study the relationship between requirements and properties, and we provide a web tool, the Sense Key tool, that can be used to automatically obtain an optimal set of KMS protocols.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126079930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Exploring Multi-homing Issues in Heterogeneous Environments 探索异构环境中的多寻的问题
G. Mapp, Mahdi Aiash, H. Guardia, J. Crowcroft
Mobile devices with two network interfaces(WiFi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as Ultra wideband. Hence we must assume that such devices will be multi-homed by default. For various reasons, including network congestion, network resilience and increased endpoint bandwidth, there have been several attempts to address multi-homing. Heterogeneous environments with the need to support vertical handover introduce another set of issues which make the need to solve multi-homing problems more urgent. This paper outlines the issues, looks at past efforts and proposes a solution based on the Location Id/Node Id concept but also argues that additional support is needed to make such an approach efficient for heterogeneous environments.
具有两个网络接口(WiFi和3G)的移动设备已经商业化。点对点通信,如红外线和蓝牙也很容易使用。在不久的将来,移动电话将有几个接口,包括卫星和新技术,如超宽带。因此,我们必须假设这些设备在默认情况下是多宿主的。由于各种原因,包括网络拥塞、网络弹性和端点带宽增加,已经有几次尝试解决多宿主问题。需要支持垂直切换的异构环境引入了另一组问题,这使得解决多归巢问题的需求更加迫切。本文概述了这些问题,回顾了过去的努力,并提出了一个基于Location Id/Node Id概念的解决方案,但也认为需要额外的支持才能使这种方法在异构环境中有效。
{"title":"Exploring Multi-homing Issues in Heterogeneous Environments","authors":"G. Mapp, Mahdi Aiash, H. Guardia, J. Crowcroft","doi":"10.1109/WAINA.2011.140","DOIUrl":"https://doi.org/10.1109/WAINA.2011.140","url":null,"abstract":"Mobile devices with two network interfaces(WiFi and 3G) are already commercially available. Point-to-point communications such as Infrared and Bluetooth are also readily used. In the near future, mobile phones will have several interfaces including satellite and new technologies such as Ultra wideband. Hence we must assume that such devices will be multi-homed by default. For various reasons, including network congestion, network resilience and increased endpoint bandwidth, there have been several attempts to address multi-homing. Heterogeneous environments with the need to support vertical handover introduce another set of issues which make the need to solve multi-homing problems more urgent. This paper outlines the issues, looks at past efforts and proposes a solution based on the Location Id/Node Id concept but also argues that additional support is needed to make such an approach efficient for heterogeneous environments.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123769071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks 移动自组织网络中的包传输时间算法
Adel Alshamrani
The wormhole attack is hard to detect and can be easily implemented. An attacker may receive packets from one location in the network and tunnel them to the other end point in a different location and re-inject them into the network. Attackers can tunnel the packets by one of the following methods: encapsulating the packets, using out-of-bound links or using high power. If there are two or more malicious nodes in the network involved in a wormhole attack, the attack becomes more powerful. There are two types of wormhole attacks: hidden mode, and exposed (participation) mode. In this paper, we present an algorithm for detecting wormhole attacks, whether in hidden or exposed mode in wireless multi-hop net-works without special hardware. Our algorithm is an improvement on another algorithm which is based on transmission time-based mechanism (TTM). Moreover, our algorithm introduces a new mechanism called Packet Travel Time (PTT). This mechanism allows each device to monitor its neighbours’ behaviour. Therefore, this mechanism can detect both hidden and exposed wormhole attacks, and can locate the wormhole in AODV, and DSR protocol.
虫洞攻击很难被检测到,而且很容易实现。攻击者可以从网络中的一个位置接收数据包,并将其隧道传输到不同位置的另一个端点,然后将其重新注入网络。攻击者可以采用以下三种方式对报文进行隧道化:封装报文、使用外链路或使用大功率。如果网络中有两个或两个以上的恶意节点参与虫洞攻击,则攻击会变得更加强大。虫洞攻击有两种类型:隐藏模式和暴露(参与)模式。本文提出了一种在无特殊硬件的无线多跳网络中检测隐藏或暴露模式虫洞攻击的算法。该算法是对另一种基于传输时间机制(TTM)的算法的改进。此外,我们的算法引入了一种新的机制,称为分组旅行时间(PTT)。这种机制允许每个设备监控其邻居的行为。因此,该机制既可以检测隐藏的虫洞攻击,也可以检测暴露的虫洞攻击,可以对AODV、DSR协议中的虫洞进行定位。
{"title":"PTT: Packet Travel Time Algorithm in Mobile Ad Hoc Networks","authors":"Adel Alshamrani","doi":"10.1109/WAINA.2011.68","DOIUrl":"https://doi.org/10.1109/WAINA.2011.68","url":null,"abstract":"The wormhole attack is hard to detect and can be easily implemented. An attacker may receive packets from one location in the network and tunnel them to the other end point in a different location and re-inject them into the network. Attackers can tunnel the packets by one of the following methods: encapsulating the packets, using out-of-bound links or using high power. If there are two or more malicious nodes in the network involved in a wormhole attack, the attack becomes more powerful. There are two types of wormhole attacks: hidden mode, and exposed (participation) mode. In this paper, we present an algorithm for detecting wormhole attacks, whether in hidden or exposed mode in wireless multi-hop net-works without special hardware. Our algorithm is an improvement on another algorithm which is based on transmission time-based mechanism (TTM). Moreover, our algorithm introduces a new mechanism called Packet Travel Time (PTT). This mechanism allows each device to monitor its neighbours’ behaviour. Therefore, this mechanism can detect both hidden and exposed wormhole attacks, and can locate the wormhole in AODV, and DSR protocol.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127899510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence 环境智能中安全多方策略协商的拍卖
J. Schütte, Stephan Heuser
The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security policies beforehand, without knowing the exact capabilities and requirements of the platforms which will be present at run time. Especially when peers need to adhere to an appropriate trade-off between security and performance, on-the-fly negotiation protocols are required to allow peers to autonomously agree on a common policy. In this paper we present a framework for secure multi-party decision protocols based on auctions. Besides the framework design, a prototype implementation will be described and results of practical experiments will be given.
分布式和ad-hoc连接系统的出现,例如在环境智能应用程序中,使开发人员面临如何预先指定QoS和安全策略的问题,而不知道平台在运行时的确切功能和需求。特别是当对等点需要在安全性和性能之间进行适当的权衡时,需要动态协商协议来允许对等点自主地就共同策略达成一致。本文提出了一个基于拍卖的安全多方决策协议框架。除了框架设计外,还将描述原型实现和实际实验结果。
{"title":"Auctions for Secure Multi-party Policy Negotiation in Ambient Intelligence","authors":"J. Schütte, Stephan Heuser","doi":"10.1109/WAINA.2011.98","DOIUrl":"https://doi.org/10.1109/WAINA.2011.98","url":null,"abstract":"The advent of distributed and ad-hoc-connected systems such as in Ambient Intelligence applications confronts developers with the question on how to specify QoS- and security policies beforehand, without knowing the exact capabilities and requirements of the platforms which will be present at run time. Especially when peers need to adhere to an appropriate trade-off between security and performance, on-the-fly negotiation protocols are required to allow peers to autonomously agree on a common policy. In this paper we present a framework for secure multi-party decision protocols based on auctions. Besides the framework design, a prototype implementation will be described and results of practical experiments will be given.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132681693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustworthy Path Discovery in MANET -- A Message Oriented Cross-Correlation Approach MANET中的可信路径发现——一种面向消息的相互关联方法
G. Patnaik, M. M. Gore
Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery in MANET that comprises of an effective reputation based trust management scheme through cross-correlation of monitored traffic and a trust based routing protocol that dynamically evaluates trustworthy path. Our analysis shows significant improvement in packet delivery ratio of AODV in the presence of attacks, with marginal rise in control traffic overhead.
移动自组网(MANET)中的通信是建立在参与节点之间相互信任的基础上的。由于网络介质开放、拓扑结构动态变化、缺乏集中监控和管理等特点,使其容易受到各种安全攻击。因此,在MANET中找到一个安全可靠的端到端路径是一个真正的挑战。本文提出了一种MANET中可信路径发现的解决方案,该方案包括一种有效的基于信誉的信任管理方案和一种动态评估可信路径的基于信任的路由协议。我们的分析表明,在存在攻击的情况下,AODV的数据包传送率有了显著改善,控制流量开销略有增加。
{"title":"Trustworthy Path Discovery in MANET -- A Message Oriented Cross-Correlation Approach","authors":"G. Patnaik, M. M. Gore","doi":"10.1109/WAINA.2011.69","DOIUrl":"https://doi.org/10.1109/WAINA.2011.69","url":null,"abstract":"Communication in Mobile Ad-Hoc Network (MANET) is based on mutual trust between the participating nodes. Due to features of open medium, dynamic changing topology, lack of centralized monitoring and management, MANETs are vulnerable to various security attacks. Hence, finding a secure and trustworthy end-to-end path in MANET is a real challenge. The paper presents a solution for trustworthy path discovery in MANET that comprises of an effective reputation based trust management scheme through cross-correlation of monitored traffic and a trust based routing protocol that dynamically evaluates trustworthy path. Our analysis shows significant improvement in packet delivery ratio of AODV in the presence of attacks, with marginal rise in control traffic overhead.","PeriodicalId":355789,"journal":{"name":"2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications","volume":"58 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131623020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
期刊
2011 IEEE Workshops of International Conference on Advanced Information Networking and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1