首页 > 最新文献

Int. J. Embed. Syst.最新文献

英文 中文
Lightweight and efficient approach for multi-secret steganography 一种轻量级、高效的多秘密隐写方法
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029269
Katarzyna Koptyra, M. Ogiela
This paper compares an efficiency of two approaches of multi-secret steganography in lightweight systems: interlacing and multi-level. The study was conducted for two and three secrets with use of F5 algorithm for both approaches. The embedding times were measured with and without I/O operations. At the end the application of these techniques in lightweight solutions is discussed.
本文比较了轻量级系统中两种多秘密隐写方法:交错隐写和多级隐写的效率。分别对2个和3个秘密进行了研究,两种方法都使用了F5算法。在有I/O操作和没有I/O操作的情况下测量嵌入时间。最后讨论了这些技术在轻量级解决方案中的应用。
{"title":"Lightweight and efficient approach for multi-secret steganography","authors":"Katarzyna Koptyra, M. Ogiela","doi":"10.1504/ijes.2020.10029269","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029269","url":null,"abstract":"This paper compares an efficiency of two approaches of multi-secret steganography in lightweight systems: interlacing and multi-level. The study was conducted for two and three secrets with use of F5 algorithm for both approaches. The embedding times were measured with and without I/O operations. At the end the application of these techniques in lightweight solutions is discussed.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134459011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An experimental estimate of the impact produced on PNU by new generation video codecs 新一代视频编解码器对PNU影响的实验估计
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029266
Andrea Bruno, G. Cattaneo
The resolution of video cameras has increased considerably in recent years leading to a new generation of codecs with higher compression rates, such as H.265, VP9 and AV1. However, compression can heavily affect the noise present in each frame. Other encoder specific features, like the intra-frame prediction for H.265 and AV1, can flatten the pixel non-uniformity (PNU) noise. We implemented a test-bed to establish whether source camera identification can still be achieved using the PNU when videos are encoded in those formats. The experiments proved that the results are less accurate than those obtained from videos encoded with traditional codecs. Nevertheless, the most original result achieved was the methodology we designed. In order to avoid hidden artifacts the source videos were initially acquired as a raw data stream from a dedicated embedded system and then recorded with an open-source YUV encoder.
近年来,视频摄像机的分辨率大大提高,导致了新一代具有更高压缩率的编解码器,如H.265, VP9和AV1。然而,压缩会严重影响每帧中存在的噪声。其他编码器的特定功能,如H.265和AV1的帧内预测,可以消除像素非均匀性(PNU)噪声。我们实现了一个测试平台,以确定当视频以这些格式编码时,使用PNU是否仍然可以实现源摄像机识别。实验证明,与传统编解码器编码的视频相比,该算法的精度较低。然而,最原始的结果是我们设计的方法。为了避免隐藏的工件,源视频最初作为原始数据流从专用嵌入式系统获得,然后用开源YUV编码器记录。
{"title":"An experimental estimate of the impact produced on PNU by new generation video codecs","authors":"Andrea Bruno, G. Cattaneo","doi":"10.1504/ijes.2020.10029266","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029266","url":null,"abstract":"The resolution of video cameras has increased considerably in recent years leading to a new generation of codecs with higher compression rates, such as H.265, VP9 and AV1. However, compression can heavily affect the noise present in each frame. Other encoder specific features, like the intra-frame prediction for H.265 and AV1, can flatten the pixel non-uniformity (PNU) noise. We implemented a test-bed to establish whether source camera identification can still be achieved using the PNU when videos are encoded in those formats. The experiments proved that the results are less accurate than those obtained from videos encoded with traditional codecs. Nevertheless, the most original result achieved was the methodology we designed. In order to avoid hidden artifacts the source videos were initially acquired as a raw data stream from a dedicated embedded system and then recorded with an open-source YUV encoder.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"719 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125268343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A channel matching scheme for cross-chain 一种跨链通道匹配方案
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10027914
Wei She, Zhihao Gu, Wei Liu, Jian-Sen Chen, Bo Wang, Zhao Tian
At present, the cross-chain technology works on becoming a bridge to build trust and transmit the information among chains. However, most of the existing schemes have poor universality, and they also have insufficient protection for the process of information cross-chain transmission. Contraposing the deficiencies above, we propose a channel matching scheme for cross-chain (CMSCC), CMSCC combines the ideas of the relay chain scheme and the channel in Fabric. The relay chain named chain-anchor and relay-chain (CARC) can be connected to other blockchains by multi-blockchain communication and consociation protocol (MBCCP). In CARC, the order peers will match the peers which on different chains and will create the peer matching channel (PMC) among matched peers. So, the information can be transmitted among matched peers. Finally, the experiment verifies that CMSCC enables information to be transmitted among chains through PMC, and CMSCC can also protect the process of information cross-chain transmission by PMC simultaneously.
目前,跨链技术致力于成为链之间建立信任和传递信息的桥梁。但是,现有的方案大多通用性差,对信息跨链传播过程的保护不足。针对上述不足,我们提出了一种跨链的信道匹配方案(CMSCC),该方案结合了中继链方案和Fabric中的信道的思想。名为chain-anchor and relay-chain (CARC)的中继链可以通过多区块链通信和关联协议(MBCCP)与其他区块链连接。在CARC中,顺序对等体将匹配不同链上的对等体,并在匹配的对等体之间创建对等体匹配通道(PMC)。因此,信息可以在匹配的对等体之间传输。最后,通过实验验证了CMSCC可以通过PMC实现信息在链间的传输,并且CMSCC还可以同时保护PMC跨链传输信息的过程。
{"title":"A channel matching scheme for cross-chain","authors":"Wei She, Zhihao Gu, Wei Liu, Jian-Sen Chen, Bo Wang, Zhao Tian","doi":"10.1504/ijes.2020.10027914","DOIUrl":"https://doi.org/10.1504/ijes.2020.10027914","url":null,"abstract":"At present, the cross-chain technology works on becoming a bridge to build trust and transmit the information among chains. However, most of the existing schemes have poor universality, and they also have insufficient protection for the process of information cross-chain transmission. Contraposing the deficiencies above, we propose a channel matching scheme for cross-chain (CMSCC), CMSCC combines the ideas of the relay chain scheme and the channel in Fabric. The relay chain named chain-anchor and relay-chain (CARC) can be connected to other blockchains by multi-blockchain communication and consociation protocol (MBCCP). In CARC, the order peers will match the peers which on different chains and will create the peer matching channel (PMC) among matched peers. So, the information can be transmitted among matched peers. Finally, the experiment verifies that CMSCC enables information to be transmitted among chains through PMC, and CMSCC can also protect the process of information cross-chain transmission by PMC simultaneously.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114132755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel localised network coding-based overhearing strategy 一种新的基于局域网络编码的监听策略
Pub Date : 2020-05-05 DOI: 10.1504/IJHPCN.2019.10018473
Zuoting Ning, Lan He, Dafang Zhang, Kun Xie
Network coding is a very effective approach to improve network throughput and reduce end-to-end delay. However, the existing approaches cannot thoroughly solve the problem of how to deal with newly overheard packets when the buffer is full, meanwhile, coding node does not schedule the packets in coding queue according to the packets' information in overhearing buffer. As a result, these methodologies lack flexibility and require quite a few assumptions. To address these limitations, we propose a new network coding overhearing strategy which is based on data packet switching and scheduling (DPSS) algorithm. First, when overhearing buffer is full and the sink nodes have overheard new packets, sink nodes will drop the recently overheard packets but record their IDs; second, sink nodes report the packets' information to the coding node that schedules the packets in coding queue for ease of encoding. Finally, sink nodes delete the packets which have been used for decoding, and call for the ever dropped packets when decoding ratio reaches the threshold. Theoretical analysis and simulation demonstrate that, compared with traditional overhearing policies, our scheme gets higher coding ratio and less delay.
网络编码是提高网络吞吐量和降低端到端时延的有效方法。然而,现有的方法并不能彻底解决当缓冲区满时如何处理新听到的数据包的问题,同时编码节点并没有根据侦听缓冲区中的数据包信息对编码队列中的数据包进行调度。因此,这些方法缺乏灵活性,需要相当多的假设。为了解决这些限制,我们提出了一种新的基于数据包交换和调度(DPSS)算法的网络编码监听策略。首先,当侦听缓冲区已满且接收节点已侦听到新数据包时,接收节点将丢弃最近侦听到的数据包,但记录其id;其次,汇聚节点将数据包的信息报告给编码节点,编码节点在编码队列中调度数据包,以便于编码。最后,汇聚节点删除已经用于解码的数据包,并在解码率达到阈值时调用曾经丢失的数据包。理论分析和仿真结果表明,与传统的监听策略相比,该方案具有更高的编码率和更小的时延。
{"title":"A novel localised network coding-based overhearing strategy","authors":"Zuoting Ning, Lan He, Dafang Zhang, Kun Xie","doi":"10.1504/IJHPCN.2019.10018473","DOIUrl":"https://doi.org/10.1504/IJHPCN.2019.10018473","url":null,"abstract":"Network coding is a very effective approach to improve network throughput and reduce end-to-end delay. However, the existing approaches cannot thoroughly solve the problem of how to deal with newly overheard packets when the buffer is full, meanwhile, coding node does not schedule the packets in coding queue according to the packets' information in overhearing buffer. As a result, these methodologies lack flexibility and require quite a few assumptions. To address these limitations, we propose a new network coding overhearing strategy which is based on data packet switching and scheduling (DPSS) algorithm. First, when overhearing buffer is full and the sink nodes have overheard new packets, sink nodes will drop the recently overheard packets but record their IDs; second, sink nodes report the packets' information to the coding node that schedules the packets in coding queue for ease of encoding. Finally, sink nodes delete the packets which have been used for decoding, and call for the ever dropped packets when decoding ratio reaches the threshold. Theoretical analysis and simulation demonstrate that, compared with traditional overhearing policies, our scheme gets higher coding ratio and less delay.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130110861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Design of an outdoor position certification authority 户外岗位认证机构的设计
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029263
R. Prisco, A. D. Santis, Pompeo Faruolo, M. Mannetta
We present the design of an outdoor position certification authority. Such an authority aims at certifying the geolocalisation of a mobile device equipped with a global navigation satellite system receiver. Such a receiver is capable of acquiring radio signals (low-level data) and navigation messages (high-level data) in outdoor environments coming from different constellations of global/regional satellite navigation systems and satellite-based augmentation systems. To date, this information is unreliable from a security point of view because it can be easily forged by malicious attackers through specialised spoofing techniques. An outdoor position certification authority defines a client/server architecture through which a user can certify his position by sending the geolocalisation information needed to verify it to one or more remote servers. There are several scenarios for which this service can be very useful and, with the advent of the internet of things age, devices that might require such a service will grow in number.
提出了一种户外位置认证机构的设计方案。该授权旨在认证配备全球导航卫星系统接收器的移动设备的地理定位。这种接收机能够在室外环境中获取来自全球/区域卫星导航系统和卫星增强系统的不同星座的无线电信号(低水平数据)和导航电文(高水平数据)。迄今为止,从安全角度来看,这些信息是不可靠的,因为恶意攻击者可以通过专门的欺骗技术轻松伪造这些信息。户外位置认证机构定义了一个客户机/服务器体系结构,通过该体系结构,用户可以通过向一个或多个远程服务器发送验证所需的地理定位信息来认证自己的位置。在一些情况下,这种服务可能非常有用,随着物联网时代的到来,可能需要这种服务的设备数量将会增加。
{"title":"Design of an outdoor position certification authority","authors":"R. Prisco, A. D. Santis, Pompeo Faruolo, M. Mannetta","doi":"10.1504/ijes.2020.10029263","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029263","url":null,"abstract":"We present the design of an outdoor position certification authority. Such an authority aims at certifying the geolocalisation of a mobile device equipped with a global navigation satellite system receiver. Such a receiver is capable of acquiring radio signals (low-level data) and navigation messages (high-level data) in outdoor environments coming from different constellations of global/regional satellite navigation systems and satellite-based augmentation systems. To date, this information is unreliable from a security point of view because it can be easily forged by malicious attackers through specialised spoofing techniques. An outdoor position certification authority defines a client/server architecture through which a user can certify his position by sending the geolocalisation information needed to verify it to one or more remote servers. There are several scenarios for which this service can be very useful and, with the advent of the internet of things age, devices that might require such a service will grow in number.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122620488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel algorithm for TOP-K optimal path on complex multiple attribute graph 复杂多属性图TOP-K最优路径的一种新算法
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029245
Kehong Zhang, Keqiu Li
In the rapidly-changing information world, the various users and personalised requirements lead to an urgent need for complex multiple attribute decision-making. In addition, the TOP-K path of single attribute decision cannot meet the actual needs. The TOP-K mainly has non-repeatable vertex, repeatable vertex, index and other algorithms. But these techniques are mainly based on the single attribute. There are few documents introducing the complex multiple attribute decision-making problem so for. Therefore, a Tdp algorithm is presented in this paper. Firstly, it uses the technology of interval number and extreme value to solve the uncertain attribute value. Then, TOPSIS technique solves the complex multiple attribute decision-making problems. By this way, the comprehensive score is achieved. Secondly, the paper proposes blocking and bidirectional shortest path algorithm for TOP-K optimal path. Finally, comparison and analysis between Tdp and the Yen were made. Result confirms that Tdp algorithm improves the TOP-K optimal technology.
在快速变化的信息世界中,用户的多样化和个性化需求导致了对复杂多属性决策的迫切需求。此外,单属性决策的TOP-K路径不能满足实际需要。TOP-K主要有不可重复顶点、可重复顶点、索引等算法。但是这些技术主要是基于单个属性的。目前对复杂多属性决策问题的介绍文献很少。因此,本文提出了一种Tdp算法。首先,利用区间数和极值技术解决属性值的不确定问题;然后,利用TOPSIS技术解决了复杂的多属性决策问题。通过这种方式,获得综合分数。其次,提出了TOP-K最优路径的分块和双向最短路径算法。最后,对Tdp与日元进行了比较分析。结果表明,Tdp算法改进了TOP-K优化技术。
{"title":"A novel algorithm for TOP-K optimal path on complex multiple attribute graph","authors":"Kehong Zhang, Keqiu Li","doi":"10.1504/ijes.2020.10029245","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029245","url":null,"abstract":"In the rapidly-changing information world, the various users and personalised requirements lead to an urgent need for complex multiple attribute decision-making. In addition, the TOP-K path of single attribute decision cannot meet the actual needs. The TOP-K mainly has non-repeatable vertex, repeatable vertex, index and other algorithms. But these techniques are mainly based on the single attribute. There are few documents introducing the complex multiple attribute decision-making problem so for. Therefore, a Tdp algorithm is presented in this paper. Firstly, it uses the technology of interval number and extreme value to solve the uncertain attribute value. Then, TOPSIS technique solves the complex multiple attribute decision-making problems. By this way, the comprehensive score is achieved. Secondly, the paper proposes blocking and bidirectional shortest path algorithm for TOP-K optimal path. Finally, comparison and analysis between Tdp and the Yen were made. Result confirms that Tdp algorithm improves the TOP-K optimal technology.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133641116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hierarchical bucket tree: an efficient account structure for blockchain-based system 分层桶树:基于区块链系统的高效账户结构
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029262
Weili Chen, Zibin Zheng, Mingjie Ma, Pinjia He, Yuren Zhou, Jing Bian
Systems built on top of blockchain are often inefficient. One reason for the inefficiency is that these systems include too many hash operations. To address this problem, we conduct an empirical study on the transaction history of a real-world blockchain-based system (i.e., Ethereum), which contains 300,821 accounts and 14,240,095 transactions. We found that the account usage frequency is highly heterogeneous. Based on this finding, this paper presents hierarchy bucket tree (HBT), an efficient account structure with user transaction behaviour information embedded, to reduce the number of hash operations and thus enhance the efficiency of blockchain-based systems. Extensive experiments have been conducted and the experimental results show that HBT reduces hash operations by nearly 80% compared with the existing account structure.
建立在区块链之上的系统通常效率低下。低效率的一个原因是这些系统包含太多的哈希操作。为了解决这个问题,我们对现实世界中基于区块链的系统(即以太坊)的交易历史进行了实证研究,该系统包含300,821个账户和14,240,095笔交易。我们发现账户的使用频率是高度异构的。基于这一发现,本文提出了层次桶树(HBT),一种嵌入用户交易行为信息的高效账户结构,以减少哈希操作的数量,从而提高基于区块链的系统的效率。进行了大量的实验,实验结果表明,与现有的帐户结构相比,HBT减少了近80%的哈希操作。
{"title":"Hierarchical bucket tree: an efficient account structure for blockchain-based system","authors":"Weili Chen, Zibin Zheng, Mingjie Ma, Pinjia He, Yuren Zhou, Jing Bian","doi":"10.1504/ijes.2020.10029262","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029262","url":null,"abstract":"Systems built on top of blockchain are often inefficient. One reason for the inefficiency is that these systems include too many hash operations. To address this problem, we conduct an empirical study on the transaction history of a real-world blockchain-based system (i.e., Ethereum), which contains 300,821 accounts and 14,240,095 transactions. We found that the account usage frequency is highly heterogeneous. Based on this finding, this paper presents hierarchy bucket tree (HBT), an efficient account structure with user transaction behaviour information embedded, to reduce the number of hash operations and thus enhance the efficiency of blockchain-based systems. Extensive experiments have been conducted and the experimental results show that HBT reduces hash operations by nearly 80% compared with the existing account structure.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124078169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algorithm for determining data forwarding strategy based on recommended trust value in MANET 基于推荐信任值的MANET数据转发策略确定算法
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029260
Jianbo Xu, Shu Feng, W. Liang, Jian Ke, Xiangwei Meng, Ruili Zhang, Danping Shou
In mobile ad hoc networks (MANET) with selfish nodes and malicious nodes, the network performance is seriously affected. We propose an algorithm based on the recommended trust value, i.e., collaborative computing trust model (CCTM) algorithm, to decide the data forwarding strategy. In the algorithm, the carrier node carrying the message collects recommended data of neighbour nodes adopts K-nearest neighbour (KNN) algorithm principle to filter the false recommended data and select K neighbour nodes as collaborative computing nodes to calculate the recommended trust value of neighbour nodes respectively, and then selects the neighbour node with the highest recommended trust value as the next hop node. The simulation experiments show that when the selfish and malicious nodes number is 10, CCTM is higher than Epidemic algorithm and MDT about 3% and 8% respectively in terms of transmission success rate; CCTM is higher than Epidemic about 14% and lower than MDT about 15% in terms of average transmission delay; CCTM is lower than MDT about 3% in terms of routing overhead. Overall, CCTM algorithm not only has better performance in terms of transmission success rate, delay and routing overhead, but also improves the security of data transmission.
在带有自私节点和恶意节点的移动自组网(MANET)中,网络性能受到严重影响。我们提出了一种基于推荐信任值的算法,即协同计算信任模型(CCTM)算法来确定数据转发策略。在该算法中,承载消息的载体节点收集邻居节点的推荐数据,采用K-最近邻(KNN)算法原理过滤虚假推荐数据,并选择K个邻居节点作为协同计算节点,分别计算邻居节点的推荐信任值,然后选择推荐信任值最高的邻居节点作为下一跳节点。仿真实验表明,当自私节点数和恶意节点数为10时,CCTM算法的传输成功率分别比Epidemic算法和MDT算法高3%和8%左右;在平均传播延迟方面,CCTM比Epidemic高约14%,比MDT低约15%;在路由开销方面,CCTM比MDT低约3%。总体而言,CCTM算法不仅在传输成功率、延迟和路由开销方面具有更好的性能,而且提高了数据传输的安全性。
{"title":"An algorithm for determining data forwarding strategy based on recommended trust value in MANET","authors":"Jianbo Xu, Shu Feng, W. Liang, Jian Ke, Xiangwei Meng, Ruili Zhang, Danping Shou","doi":"10.1504/ijes.2020.10029260","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029260","url":null,"abstract":"In mobile ad hoc networks (MANET) with selfish nodes and malicious nodes, the network performance is seriously affected. We propose an algorithm based on the recommended trust value, i.e., collaborative computing trust model (CCTM) algorithm, to decide the data forwarding strategy. In the algorithm, the carrier node carrying the message collects recommended data of neighbour nodes adopts K-nearest neighbour (KNN) algorithm principle to filter the false recommended data and select K neighbour nodes as collaborative computing nodes to calculate the recommended trust value of neighbour nodes respectively, and then selects the neighbour node with the highest recommended trust value as the next hop node. The simulation experiments show that when the selfish and malicious nodes number is 10, CCTM is higher than Epidemic algorithm and MDT about 3% and 8% respectively in terms of transmission success rate; CCTM is higher than Epidemic about 14% and lower than MDT about 15% in terms of average transmission delay; CCTM is lower than MDT about 3% in terms of routing overhead. Overall, CCTM algorithm not only has better performance in terms of transmission success rate, delay and routing overhead, but also improves the security of data transmission.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"23 23-24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128973898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A survey on screenlogger attacks as well as countermeasures 关于屏幕记录器攻击的调查及对策
Pub Date : 2020-05-05 DOI: 10.1504/IJES.2020.10029271
Hugo Sbai, J. Happa, M. Goldsmith, S. Meftali
Keyloggers and screenloggers are one of the active growing threats to user's confidentiality as they can run in user-space, easily be distributed and upload information to remote servers. They use a wide number of different technologies and may be implemented in many ways. Keyloggers and screenloggers are very largely diverted from their primary and legitimate function to be exploited for malicious purposes compromising the privacy of users, and bank customers notably. Due to the recent multiplication of mobile devices with a touchscreen, the screenlogger threat has become even more dangerous. This threat is even harder to fight given the limited resources of the affected devices. This paper is the first step of a project aiming at proposing efficient countermeasures against screenloggers. It provides a complete overview of the different techniques used by this malware and discusses an extensive set of plausible counter measures.
键盘记录程序和屏幕记录程序是对用户机密性的威胁之一,因为它们可以在用户空间中运行,很容易分发和上传信息到远程服务器。它们使用大量不同的技术,可以以多种方式实现。键盘记录程序和屏幕记录程序在很大程度上偏离了它们的主要和合法功能,被恶意利用,损害了用户的隐私,尤其是银行客户的隐私。由于最近带触摸屏的移动设备越来越多,屏幕记录器的威胁变得更加危险。考虑到受影响设备的资源有限,这种威胁更难对付。本文是一个项目的第一步,旨在提出有效的对策,反对屏幕记录器。它提供了该恶意软件使用的不同技术的完整概述,并讨论了一组广泛的合理的应对措施。
{"title":"A survey on screenlogger attacks as well as countermeasures","authors":"Hugo Sbai, J. Happa, M. Goldsmith, S. Meftali","doi":"10.1504/IJES.2020.10029271","DOIUrl":"https://doi.org/10.1504/IJES.2020.10029271","url":null,"abstract":"Keyloggers and screenloggers are one of the active growing threats to user's confidentiality as they can run in user-space, easily be distributed and upload information to remote servers. They use a wide number of different technologies and may be implemented in many ways. Keyloggers and screenloggers are very largely diverted from their primary and legitimate function to be exploited for malicious purposes compromising the privacy of users, and bank customers notably. Due to the recent multiplication of mobile devices with a touchscreen, the screenlogger threat has become even more dangerous. This threat is even harder to fight given the limited resources of the affected devices. This paper is the first step of a project aiming at proposing efficient countermeasures against screenloggers. It provides a complete overview of the different techniques used by this malware and discusses an extensive set of plausible counter measures.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124462216","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heuristic approach to minimise the energy consumption of sensors in cloud environment for wireless body area network applications 云环境下无线体域网络传感器能耗最小化的启发式方法
Pub Date : 2020-05-05 DOI: 10.1504/ijes.2020.10029259
P. Kumaresan, P. Manoharan, S. Subha
The wireless sensor networks are single user centric and end users who do not own sensors are unable to have access to any wireless network specific application. This sensor cloud is a new paradigm to manage the physical sensors which are deployed in any WSN application. Existing research work on sensor cloud is limited to guaranteeing minimal energy consumption. In this paper, a novel mathematical model based on virtual sensor grouping is proposed to minimise the cumulative energy consumption of sensors in cloud environment. Energy consumption of non-virtual sensor with virtual sensor group for two different applications is compared and the results are shown. Further the proposed sensor cloud infrastructure with power model is compared with traditional WSN with respect to energy efficiency, throughput and performance with quick synchronisation time for random run trials and results were found to be better than the conventional WSN.
无线传感器网络以单个用户为中心,没有传感器的最终用户无法访问任何无线网络特定应用程序。这种传感器云是一种管理部署在任何WSN应用中的物理传感器的新范例。现有的传感器云研究工作仅限于保证最小的能量消耗。本文提出了一种基于虚拟传感器分组的云环境下传感器累计能耗最小化的数学模型。比较了两种不同应用场合下非虚拟传感器和虚拟传感器组的能耗,并给出了结果。此外,在随机运行试验中,将所提出的具有功率模型的传感器云基础设施与传统WSN在能效、吞吐量和快速同步时间方面进行了比较,结果发现优于传统WSN。
{"title":"Heuristic approach to minimise the energy consumption of sensors in cloud environment for wireless body area network applications","authors":"P. Kumaresan, P. Manoharan, S. Subha","doi":"10.1504/ijes.2020.10029259","DOIUrl":"https://doi.org/10.1504/ijes.2020.10029259","url":null,"abstract":"The wireless sensor networks are single user centric and end users who do not own sensors are unable to have access to any wireless network specific application. This sensor cloud is a new paradigm to manage the physical sensors which are deployed in any WSN application. Existing research work on sensor cloud is limited to guaranteeing minimal energy consumption. In this paper, a novel mathematical model based on virtual sensor grouping is proposed to minimise the cumulative energy consumption of sensors in cloud environment. Energy consumption of non-virtual sensor with virtual sensor group for two different applications is compared and the results are shown. Further the proposed sensor cloud infrastructure with power model is compared with traditional WSN with respect to energy efficiency, throughput and performance with quick synchronisation time for random run trials and results were found to be better than the conventional WSN.","PeriodicalId":412308,"journal":{"name":"Int. J. Embed. Syst.","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127740785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Embed. Syst.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1