首页 > 最新文献

2021 International Conference on Networking and Network Applications (NaNA)最新文献

英文 中文
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI 基于过时CSI的双跳隐蔽通信系统性能分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00042
Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen
Covert communication aims to hide the very existence of wireless transmissions which provides a strong security guarantee for wireless networks. This article considers a dual-hop covert communication system with outdated channel state information (CSI). The source transmits the message to the destination via a relay, while the relay wants to transmit its message to the destination and hide the communication process. Under this consideration, we conduct the covert performance analysis of the concerned system under the rate-control scheme. Specially, we derive the closed-forms of the minimum detection error probability (DEP) at the source and the effective covert rate (ECR) at the relay. Further, we study the ECR maximization problem under the DEP constraint. Finally, we provide extensive numerical results to illustrate the achievable covert performance with the outdated CSI. The results indicate that the larger the CSI feedback delay is, the more beneficial it is to the detective, but it is not conducive for the relay to conduct the covert communication.
隐蔽通信旨在隐藏无线传输的存在,为无线网络提供了强有力的安全保障。本文研究了一种具有过时信道状态信息(CSI)的双跳隐蔽通信系统。源端通过中继将消息发送到目的端,而中继端希望将自己的消息发送到目的端,并隐藏通信过程。考虑到这一点,我们对有关系统在费率控制方案下的隐蔽性能进行了分析。特别地,我们导出了源端的最小检测误差概率(DEP)和继电器端的有效隐蔽率(ECR)的封闭形式。进一步研究了DEP约束下的ECR最大化问题。最后,我们提供了大量的数值结果来说明使用过时的CSI可以实现的隐蔽性能。结果表明,CSI反馈延迟越大,越有利于侦查,但不利于中继进行隐蔽通信。
{"title":"Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI","authors":"Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen","doi":"10.1109/NaNA53684.2021.00042","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00042","url":null,"abstract":"Covert communication aims to hide the very existence of wireless transmissions which provides a strong security guarantee for wireless networks. This article considers a dual-hop covert communication system with outdated channel state information (CSI). The source transmits the message to the destination via a relay, while the relay wants to transmit its message to the destination and hide the communication process. Under this consideration, we conduct the covert performance analysis of the concerned system under the rate-control scheme. Specially, we derive the closed-forms of the minimum detection error probability (DEP) at the source and the effective covert rate (ECR) at the relay. Further, we study the ECR maximization problem under the DEP constraint. Finally, we provide extensive numerical results to illustrate the achievable covert performance with the outdated CSI. The results indicate that the larger the CSI feedback delay is, the more beneficial it is to the detective, but it is not conducive for the relay to conduct the covert communication.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection 一种用于增强图像安全检测的改进中值滤波取证方法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00060
Kaijun Wu, Wanli Dong, Yunfei Cao, Xue Wang, Qi Zhao
With the development of image processing technology, the forgers usually use median filtering to make their fakes appear more realistic because median filtering is a non-linear digital filtering technique which can preserve edges and smooth regions within an image. Therefore, the use of median forensics technology to identify the authenticity of images and ensure the security of image data has attracted everyone’s attention. However, how to effectively detect the median filter of high JPEG compressed small-size images is still a challenge in median filter forensics. In this paper, we proposed a framework based on deep residual learning to address this challenge. Specifically, a new convolutional neural network called MFFNet was constructed. In the first step, in order to extract the features left by the median filter, we innovatively designed a preprocessing layer containing various residuals to capture different median filter artifacts. Then, we elaborately designed a MFFNet to self-learn rich hierarchical features left in the highly JPEG compressed image for further classification. In order to prevent the over-fitting problem of the deep network, we adopted a series of enhancement schemes in the training stage to enrich the diversity of training data and obtain a more generateable and stable median filter detector. A large number of experimental results on the composite database show that the proposed framework significantly improves the detection performance compared to the latest methods for detecting highly small size image with JPEG compression.
随着图像处理技术的发展,由于中值滤波是一种能够保持图像边缘和平滑区域的非线性数字滤波技术,伪造者通常采用中值滤波使伪造的图像看起来更加逼真。因此,利用中值取证技术来识别图像的真实性,保证图像数据的安全性就引起了大家的关注。然而,如何有效地检测高JPEG压缩小尺寸图像的中值滤波仍然是中值滤波取证中的一个挑战。在本文中,我们提出了一个基于深度残差学习的框架来解决这一挑战。具体而言,构建了一个新的卷积神经网络MFFNet。在第一步中,为了提取中值滤波器留下的特征,我们创新地设计了包含各种残差的预处理层,以捕获不同的中值滤波器伪影。然后,我们精心设计了一个MFFNet来自学习高度JPEG压缩图像中留下的丰富的层次特征,以便进一步分类。为了防止深度网络的过拟合问题,我们在训练阶段采用了一系列增强方案,以丰富训练数据的多样性,得到一个更具可生成性和稳定性的中值滤波检测器。在复合数据库上的大量实验结果表明,与最新的JPEG压缩小尺寸图像检测方法相比,该框架显著提高了检测性能。
{"title":"An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection","authors":"Kaijun Wu, Wanli Dong, Yunfei Cao, Xue Wang, Qi Zhao","doi":"10.1109/NaNA53684.2021.00060","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00060","url":null,"abstract":"With the development of image processing technology, the forgers usually use median filtering to make their fakes appear more realistic because median filtering is a non-linear digital filtering technique which can preserve edges and smooth regions within an image. Therefore, the use of median forensics technology to identify the authenticity of images and ensure the security of image data has attracted everyone’s attention. However, how to effectively detect the median filter of high JPEG compressed small-size images is still a challenge in median filter forensics. In this paper, we proposed a framework based on deep residual learning to address this challenge. Specifically, a new convolutional neural network called MFFNet was constructed. In the first step, in order to extract the features left by the median filter, we innovatively designed a preprocessing layer containing various residuals to capture different median filter artifacts. Then, we elaborately designed a MFFNet to self-learn rich hierarchical features left in the highly JPEG compressed image for further classification. In order to prevent the over-fitting problem of the deep network, we adopted a series of enhancement schemes in the training stage to enrich the diversity of training data and obtain a more generateable and stable median filter detector. A large number of experimental results on the composite database show that the proposed framework significantly improves the detection performance compared to the latest methods for detecting highly small size image with JPEG compression.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance 模距离下平衡连通k中心问题的最近邻算法
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00073
Rui Li, Zilan Yang
The k-center problem is a famous NP complete problem in combinatorial optimization. Under the traditional distance, there is a 2-approximation algorithm for the center problem, and the partition from the center satisfies the internal connectivity. However, under the modular distance, the partition obtained by the traditional center algorithm may not satisfy the internal connectivity. Therefore, this paper proposes the problem of balanced and connected center under modular distance, and designs a nearest neighbor algorithm. Finally, an example is given to prove the correctness of the algorithm.
k中心问题是组合优化中一个著名的NP完全问题。在传统距离下,中心问题采用2-逼近算法,中心的划分满足内部连通性。然而,在模距离下,传统中心算法得到的分区可能不能满足内部连通性。为此,本文提出了模距离下的中心平衡连通问题,并设计了一种最近邻算法。最后通过一个算例验证了算法的正确性。
{"title":"The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance","authors":"Rui Li, Zilan Yang","doi":"10.1109/NaNA53684.2021.00073","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00073","url":null,"abstract":"The k-center problem is a famous NP complete problem in combinatorial optimization. Under the traditional distance, there is a 2-approximation algorithm for the center problem, and the partition from the center satisfies the internal connectivity. However, under the modular distance, the partition obtained by the traditional center algorithm may not satisfy the internal connectivity. Therefore, this paper proposes the problem of balanced and connected center under modular distance, and designs a nearest neighbor algorithm. Finally, an example is given to prove the correctness of the algorithm.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115411270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Symmetric Information Hiding Scheme Based on Cover Randomness 一种新的基于覆盖随机性的对称信息隐藏方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00058
Fang Ren, Mingyu Yu, Haiyan Xiu, W. Hou
This paper proposes a new symmetric information hiding scheme, aiming to increase the degree of disguise and the security. This scheme utilizes the randomness of the image cover itself to generate the secret key which has high randomness, so as to improve the effect of disguise of stego-objects and the security of information hiding scheme. In addition, this paper also proposes a new randomness test method, which can give more accurate quantitative test results and is suitable for testing the randomness of the cover. Experimental studies show that the new information hiding method can improve the degree of disguise of the stego-object and the security of the steganographic algorithm, and enhance the robustness of the information hiding to some extent.
本文提出了一种新的对称信息隐藏方案,旨在提高信息隐藏的隐蔽性和安全性。该方案利用图像覆盖本身的随机性来生成具有高随机性的密钥,从而提高隐写对象的伪装效果和信息隐藏方案的安全性。此外,本文还提出了一种新的随机性测试方法,该方法可以给出更准确的定量测试结果,适用于测试盖的随机性。实验研究表明,新的信息隐藏方法可以提高隐写对象的伪装程度和隐写算法的安全性,并在一定程度上增强信息隐藏的鲁棒性。
{"title":"A New Symmetric Information Hiding Scheme Based on Cover Randomness","authors":"Fang Ren, Mingyu Yu, Haiyan Xiu, W. Hou","doi":"10.1109/NaNA53684.2021.00058","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00058","url":null,"abstract":"This paper proposes a new symmetric information hiding scheme, aiming to increase the degree of disguise and the security. This scheme utilizes the randomness of the image cover itself to generate the secret key which has high randomness, so as to improve the effect of disguise of stego-objects and the security of information hiding scheme. In addition, this paper also proposes a new randomness test method, which can give more accurate quantitative test results and is suitable for testing the randomness of the cover. Experimental studies show that the new information hiding method can improve the degree of disguise of the stego-object and the security of the steganographic algorithm, and enhance the robustness of the information hiding to some extent.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy protection scheme for edge computing based on function encryption 基于函数加密的边缘计算隐私保护方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00030
Yuanhang He, Lei Chen, Yi-Tao Ni, Yuyao Wang, Jiangtao Li, Yufeng Li
In the response to COVID-19, the big data can achieve a new data application mode with reduced manpower and material costs, which will help the government understand the supply and demand status of medical supplies and make precise decisions to ensure the supply of materials and prevent the spread of the epidemic. However, in the medical big data solution based on cloud computing, the user data storage and computing process are all carried out in the cloud, the risk of medical data is increasingly exposed, and the privacy protection of medical data is worrying. Edge computing makes data privacy protection more operational. Because the data collection and calculation are based on the local, and no longer need to be transmitted to the cloud, some important information, especially sensitive information, cannot be transmitted through the network, effectively solving the problem of user privacy leakage and data security. Function encryption provides data with a very flexible method that meets data confidentiality and effective access control. So based on function encryption, this paper proposes a privacy protection scheme under the edge computing paradigm, introduce the data interaction process for the scheme and demonstrates the privacy protection ability and computing efficiency of the scheme in the main scenario of smart medical care.
在应对COVID-19中,大数据可以实现一种新的数据应用模式,减少人力和物力成本,有助于政府了解医疗用品的供需状况,做出准确决策,确保物资供应,防止疫情蔓延。然而,在基于云计算的医疗大数据解决方案中,用户数据的存储和计算过程都在云端进行,医疗数据的风险日益暴露,医疗数据的隐私保护令人担忧。边缘计算使数据隐私保护更具操作性。由于数据采集和计算都是基于本地,不再需要传输到云端,一些重要信息特别是敏感信息无法通过网络传输,有效解决了用户隐私泄露和数据安全问题。功能加密为数据的保密性和有效的访问控制提供了一种非常灵活的方法。因此,本文提出了一种基于功能加密的边缘计算范式下的隐私保护方案,介绍了该方案的数据交互过程,并在智能医疗主要场景下演示了该方案的隐私保护能力和计算效率。
{"title":"Privacy protection scheme for edge computing based on function encryption","authors":"Yuanhang He, Lei Chen, Yi-Tao Ni, Yuyao Wang, Jiangtao Li, Yufeng Li","doi":"10.1109/NaNA53684.2021.00030","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00030","url":null,"abstract":"In the response to COVID-19, the big data can achieve a new data application mode with reduced manpower and material costs, which will help the government understand the supply and demand status of medical supplies and make precise decisions to ensure the supply of materials and prevent the spread of the epidemic. However, in the medical big data solution based on cloud computing, the user data storage and computing process are all carried out in the cloud, the risk of medical data is increasingly exposed, and the privacy protection of medical data is worrying. Edge computing makes data privacy protection more operational. Because the data collection and calculation are based on the local, and no longer need to be transmitted to the cloud, some important information, especially sensitive information, cannot be transmitted through the network, effectively solving the problem of user privacy leakage and data security. Function encryption provides data with a very flexible method that meets data confidentiality and effective access control. So based on function encryption, this paper proposes a privacy protection scheme under the edge computing paradigm, introduce the data interaction process for the scheme and demonstrates the privacy protection ability and computing efficiency of the scheme in the main scenario of smart medical care.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving and Efficient Range Counting in IoT Networks 物联网网络中的隐私保护和有效范围计数
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00091
Ruiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu
In recent years, Internet of Things (IoT) networks have been received much attention due to their intelligence and automation. Numerous devices are deployed in the networks, and many applications are willing to obtain the distribution of IoT devices in one range for data analysis. However, some distributions of IoT devices include sensitive information which may disclose the privacy of their owners. And most IoT devices cannot afford heavy computation because of their low computing power and limited storage capacity. In this paper, we propose a privacy-preserving and efficient scheme that satisfies local differential privacy and supports O(1) -time-complexity range counting query which can find the number of IoT devices in a range. It also allows IoT devices to join or exit dynamically. Finally, theoretical analysis proves that our scheme satisfies local differential privacy, and our experiments show that our range counting query scheme can get the microsecond level.
近年来,物联网(IoT)网络因其智能化和自动化而备受关注。网络中部署了大量的设备,许多应用都愿意获得物联网设备在一个范围内的分布,以便进行数据分析。然而,物联网设备的某些分布包含敏感信息,可能会泄露其所有者的隐私。大多数物联网设备由于其低计算能力和有限的存储容量而无法承受繁重的计算。在本文中,我们提出了一种满足局部差分隐私且支持O(1) -时间复杂度范围计数查询的高效隐私保护方案,该方案可以找到一个范围内物联网设备的数量。它还允许物联网设备动态加入或退出。最后,理论分析证明了我们的方案满足局部差分隐私,实验表明我们的距离计数查询方案可以达到微秒级。
{"title":"Privacy-Preserving and Efficient Range Counting in IoT Networks","authors":"Ruiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu","doi":"10.1109/NaNA53684.2021.00091","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00091","url":null,"abstract":"In recent years, Internet of Things (IoT) networks have been received much attention due to their intelligence and automation. Numerous devices are deployed in the networks, and many applications are willing to obtain the distribution of IoT devices in one range for data analysis. However, some distributions of IoT devices include sensitive information which may disclose the privacy of their owners. And most IoT devices cannot afford heavy computation because of their low computing power and limited storage capacity. In this paper, we propose a privacy-preserving and efficient scheme that satisfies local differential privacy and supports O(1) -time-complexity range counting query which can find the number of IoT devices in a range. It also allows IoT devices to join or exit dynamically. Finally, theoretical analysis proves that our scheme satisfies local differential privacy, and our experiments show that our range counting query scheme can get the microsecond level.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on A Vulnerability Detection Technology for Network Topology Security 一种网络拓扑安全漏洞检测技术研究
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00064
Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu
Vulnerability detection plays an important role in topology network security. Topology network application scope, users, and transmit the data type of the change, the increasing of the existing vulnerability detection in the process of diversification of data transmission, positioning fuzzy vulnerability detection, error messages are not clear, it is difficult to positioning and eliminate network fault in time. For this, put forward topology network multiplexer output port complex data mutation vulnerability detection. Based on topology network multiplexer output port complex data priority extraction, according to build complex data mutation scanning module and loopholes in the database are defined in the holes details to complete the multiplexer output port complex data mutation detection process. Simulation experiments show that the topology of the network multiplexer output port complex data mutation vulnerability detecting system that can effectively save the data in time. Make vulnerability detection accuracy greatly improved, provides the stability and security of the topology network security.
漏洞检测在拓扑网络安全中起着重要的作用。网络拓扑应用范围、用户以及传输数据类型的变化,使得现有漏洞检测在数据传输多样化过程中日益增多,漏洞检测定位模糊,错误信息不清晰,难以及时定位和排除网络故障。为此,提出拓扑网络多路复用器输出端口复杂数据突变漏洞检测。基于拓扑网络的多路复用器输出端口复杂数据优先级提取,根据构建复杂数据突变扫描模块和漏洞数据库,在漏洞中定义详细信息,完成多路复用器输出端口复杂数据突变检测过程。仿真实验表明,基于拓扑结构的网络多路复用器输出端口复杂数据突变漏洞检测系统能够有效地及时保存数据。使漏洞检测的准确性大大提高,提供了拓扑网络的稳定性和安全性。
{"title":"Research on A Vulnerability Detection Technology for Network Topology Security","authors":"Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu","doi":"10.1109/NaNA53684.2021.00064","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00064","url":null,"abstract":"Vulnerability detection plays an important role in topology network security. Topology network application scope, users, and transmit the data type of the change, the increasing of the existing vulnerability detection in the process of diversification of data transmission, positioning fuzzy vulnerability detection, error messages are not clear, it is difficult to positioning and eliminate network fault in time. For this, put forward topology network multiplexer output port complex data mutation vulnerability detection. Based on topology network multiplexer output port complex data priority extraction, according to build complex data mutation scanning module and loopholes in the database are defined in the holes details to complete the multiplexer output port complex data mutation detection process. Simulation experiments show that the topology of the network multiplexer output port complex data mutation vulnerability detecting system that can effectively save the data in time. Make vulnerability detection accuracy greatly improved, provides the stability and security of the topology network security.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116263322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics 基于信道特性的改进体域网络匿名混合认证方案
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00022
M. Umar, Xuening Liao, Jiawang Chen
Although wireless body network (WBAN) plays a vital role in revolutionizing healthcare delivery, it has also brought security concerns due to the sensitive nature of the patients’ biomedical data being measured by the sensors in the network. Thus, authentication is essential for the safety of the patients in WBAN. Recently, Koya and Deepthi proposed an anonymous hybrid authentication scheme using a physiological signal to fix the security limitations of the existing anonymous authentication approaches in WBAN. However, their scheme lacks forward secrecy and requires that additional sensing hardware be attached to each sensor in WBAN, which is not only cost-prohibitive, but can lead to compatibility issues with legacy systems. To overcome these limitations, we propose an improved anonymous hybrid authentication scheme using physical layer (PHY) channel characteristics. The key idea in the proposed scheme is to replace the physiological signal used in the Koya and Deepthi scheme with a received signal strength (RSS) information already available in the wearable devices in WBAN as an identity identifier. We conduct security analysis to show the security strength of our approach and performance analysis to prove its computational efficiency. Moreover, we conduct experiments on human volunteers in indoor and outdoor locations to show the robustness of the proposed approach. The results demonstrate that our scheme can provide anonymous authentication and identify 90% of attack attempts in WBAN with less computation cost and without any additional sensing hardware.
尽管无线身体网络(WBAN)在革新医疗保健服务方面发挥着至关重要的作用,但由于网络中传感器测量的患者生物医学数据的敏感性,它也带来了安全问题。因此,认证对于无线局域网中患者的安全至关重要。最近,Koya和Deepthi提出了一种利用生理信号的匿名混合认证方案,以解决WBAN中现有匿名认证方法的安全性限制。然而,他们的方案缺乏前向保密,并且需要在WBAN中的每个传感器上附加额外的传感硬件,这不仅成本高昂,而且可能导致与遗留系统的兼容性问题。为了克服这些限制,我们提出了一种改进的使用物理层(PHY)通道特征的匿名混合身份验证方案。该方案的关键思想是将Koya和Deepthi方案中使用的生理信号替换为WBAN中可穿戴设备中已有的接收信号强度(RSS)信息作为身份标识符。我们通过安全性分析来证明我们的方法的安全性,通过性能分析来证明它的计算效率。此外,我们在室内和室外地点对人类志愿者进行了实验,以证明所提出方法的鲁棒性。结果表明,该方案可以提供匿名认证,在不增加任何传感硬件的情况下,以较少的计算成本识别90%的WBAN攻击企图。
{"title":"Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics","authors":"M. Umar, Xuening Liao, Jiawang Chen","doi":"10.1109/NaNA53684.2021.00022","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00022","url":null,"abstract":"Although wireless body network (WBAN) plays a vital role in revolutionizing healthcare delivery, it has also brought security concerns due to the sensitive nature of the patients’ biomedical data being measured by the sensors in the network. Thus, authentication is essential for the safety of the patients in WBAN. Recently, Koya and Deepthi proposed an anonymous hybrid authentication scheme using a physiological signal to fix the security limitations of the existing anonymous authentication approaches in WBAN. However, their scheme lacks forward secrecy and requires that additional sensing hardware be attached to each sensor in WBAN, which is not only cost-prohibitive, but can lead to compatibility issues with legacy systems. To overcome these limitations, we propose an improved anonymous hybrid authentication scheme using physical layer (PHY) channel characteristics. The key idea in the proposed scheme is to replace the physiological signal used in the Koya and Deepthi scheme with a received signal strength (RSS) information already available in the wearable devices in WBAN as an identity identifier. We conduct security analysis to show the security strength of our approach and performance analysis to prove its computational efficiency. Moreover, we conduct experiments on human volunteers in indoor and outdoor locations to show the robustness of the proposed approach. The results demonstrate that our scheme can provide anonymous authentication and identify 90% of attack attempts in WBAN with less computation cost and without any additional sensing hardware.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes 双陷阱门哈希函数和多陷阱门哈希函数方案的密码分析
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00055
Xu An Wang, Yunxuan Su, Jindan Zhang
Cloud-based storage systems are the norm in our interconnected society, although there remain a number of research and operational challenges relating to the security of such systems. One ongoing research challenge is the design of efficient and secure query authentication mechanism for cloud-based storage systems, in the sense that data users can verify the authenticity and integrity of the retrieved data from the cloud servers. In 2017, Chandrasekhar and Singhal proposed a query authentication protocol for cloud-based storage systems, designed with efficiency and scalability in mind [IEEE Transactions on Services Computing, 10(4):520-533]. In this comment, we demonstrate that their protocol is not secure as claimed, due to weaknesses in two core building blocks of the protocol, namely: the double-trapdoor variant and the multi-trapdoor variant of the trapdoor hash function. By revealing this weakness, we hope future protocol designers can avoid similar mistake in their work.
基于云的存储系统是我们这个互联社会的常态,尽管在这类系统的安全性方面仍存在许多研究和操作挑战。一个正在进行的研究挑战是为基于云的存储系统设计高效和安全的查询认证机制,从某种意义上说,数据用户可以验证从云服务器检索数据的真实性和完整性。2017年,Chandrasekhar和Singhal提出了一种基于云存储系统的查询认证协议,该协议考虑了效率和可扩展性[IEEE Transactions on Services Computing, 10(4):520-533]。在这篇评论中,我们证明了他们的协议并不像声称的那样安全,因为协议的两个核心构建块存在弱点,即:双trapdoor变体和trapdoor哈希函数的多trapdoor变体。通过揭示这个弱点,我们希望未来的协议设计者可以在他们的工作中避免类似的错误。
{"title":"Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes","authors":"Xu An Wang, Yunxuan Su, Jindan Zhang","doi":"10.1109/NaNA53684.2021.00055","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00055","url":null,"abstract":"Cloud-based storage systems are the norm in our interconnected society, although there remain a number of research and operational challenges relating to the security of such systems. One ongoing research challenge is the design of efficient and secure query authentication mechanism for cloud-based storage systems, in the sense that data users can verify the authenticity and integrity of the retrieved data from the cloud servers. In 2017, Chandrasekhar and Singhal proposed a query authentication protocol for cloud-based storage systems, designed with efficiency and scalability in mind [IEEE Transactions on Services Computing, 10(4):520-533]. In this comment, we demonstrate that their protocol is not secure as claimed, due to weaknesses in two core building blocks of the protocol, namely: the double-trapdoor variant and the multi-trapdoor variant of the trapdoor hash function. By revealing this weakness, we hope future protocol designers can avoid similar mistake in their work.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol 俄罗斯方块:多路径截止时间感知传输协议的近最优调度
Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00014
Yanwen Liu, Wei Su, Lizhuang Tan
Deadline-aware Transport Protocol (DTP) is a new QUIC-based transmission protocol that provides deliver-before-deadline service. Single-path DTP is not conducive to flow fairness and does not make full use of bandwidth. Compared with single-path DTP, the decision space and the solving difficulty of multipath DTP (MPDTP) scheduling are larger. In this paper, we propose a near-optimal scheduling algorithm Tetris for MPDTP. Tetris is a block scheduler based on stream characteristics at the transmission layer. We have verified its feasibility on the simulator under the deployed heterogeneous path of different network environment. The results show that our scheduling algorithm allows data blocks to be delivered before the delivery time as much as possible. The transmission completion time has been increased by 19.53% on average, and the transmission delay of all blocks have been reduced by 11.27%.
截止日期感知传输协议(DTP)是一种基于quic的新型传输协议,提供截止日期前的交付服务。单路径DTP不利于流量公平,不能充分利用带宽。与单路径DTP相比,多路径DTP调度的决策空间和求解难度更大。本文提出了一种MPDTP的近最优调度算法Tetris。俄罗斯方块是一个基于传输层流特性的块调度程序。在不同网络环境下部署异构路径,并在模拟器上验证了其可行性。结果表明,我们的调度算法允许数据块尽可能早于交付时间交付。传输完成时间平均提高19.53%,各区块传输时延平均降低11.27%。
{"title":"Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol","authors":"Yanwen Liu, Wei Su, Lizhuang Tan","doi":"10.1109/NaNA53684.2021.00014","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00014","url":null,"abstract":"Deadline-aware Transport Protocol (DTP) is a new QUIC-based transmission protocol that provides deliver-before-deadline service. Single-path DTP is not conducive to flow fairness and does not make full use of bandwidth. Compared with single-path DTP, the decision space and the solving difficulty of multipath DTP (MPDTP) scheduling are larger. In this paper, we propose a near-optimal scheduling algorithm Tetris for MPDTP. Tetris is a block scheduler based on stream characteristics at the transmission layer. We have verified its feasibility on the simulator under the deployed heterogeneous path of different network environment. The results show that our scheduling algorithm allows data blocks to be delivered before the delivery time as much as possible. The transmission completion time has been increased by 19.53% on average, and the transmission delay of all blocks have been reduced by 11.27%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2021 International Conference on Networking and Network Applications (NaNA)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1