首页 > 最新文献

2019 International Conference on Information Networking (ICOIN)最新文献

英文 中文
Anchor-Based Group Relay MAC 基于锚点的组中继MAC
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8717983
Ahreum Shin, Myeongseung Han, Yoonkyung Jang, Intae Ryoo
The world moves into a new era with the advent of the Internet of Things (IoT). This technology changes many things from daily life to society as a whole. To use the technology, data are the fundamental factors. If more sensor data is generated, more information or more specific information can be provided to people. Some of the technologies for collecting data are the various Medium Access Control (MAC) protocols. Especially for the IoT System, the Wireless Sensor Network (WSN) MAC protocols have been proposed among the MAC protocols. However, even among the WSN MAC protocols, there are many of them. Each of them has its own characteristics. Some of them depend on the places where the MAC protocol operates. Previously, WSN is usually composed of the stationary sensors. This static environment has changed as the technologies are advanced in many ways. Not only is it possible for sensors to move around, but sinks can also move around. In real life, these various sensors are mixed. Thus, MAC protocols for WSN with stationary sensors and mobile sensors are needed. In this paper, we propose an Anchor-based Group Relay-MAC (AGR-MAC) for the WSN with mixed sensors.
随着物联网(IoT)的出现,世界进入了一个新的时代。这项技术改变了从日常生活到整个社会的许多事情。要使用这项技术,数据是基本因素。如果产生更多的传感器数据,则可以为人们提供更多的信息或更具体的信息。收集数据的一些技术是各种介质访问控制(MAC)协议。特别是在物联网系统中,无线传感器网络(WSN) MAC协议被提出。然而,即使在WSN的MAC协议中,也有很多这样的协议。他们每个人都有自己的特点。其中一些依赖于MAC协议运行的地方。以往,无线传感器网络通常由静止传感器组成。随着技术在许多方面的进步,这种静态环境已经发生了变化。不仅传感器可以四处移动,接收器也可以四处移动。在现实生活中,这些不同的传感器是混合的。因此,需要针对固定传感器和移动传感器的无线传感器网络的MAC协议。本文针对混合传感器无线传感器网络,提出了一种基于锚点的分组中继mac (AGR-MAC)。
{"title":"Anchor-Based Group Relay MAC","authors":"Ahreum Shin, Myeongseung Han, Yoonkyung Jang, Intae Ryoo","doi":"10.1109/ICOIN.2019.8717983","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8717983","url":null,"abstract":"The world moves into a new era with the advent of the Internet of Things (IoT). This technology changes many things from daily life to society as a whole. To use the technology, data are the fundamental factors. If more sensor data is generated, more information or more specific information can be provided to people. Some of the technologies for collecting data are the various Medium Access Control (MAC) protocols. Especially for the IoT System, the Wireless Sensor Network (WSN) MAC protocols have been proposed among the MAC protocols. However, even among the WSN MAC protocols, there are many of them. Each of them has its own characteristics. Some of them depend on the places where the MAC protocol operates. Previously, WSN is usually composed of the stationary sensors. This static environment has changed as the technologies are advanced in many ways. Not only is it possible for sensors to move around, but sinks can also move around. In real life, these various sensors are mixed. Thus, MAC protocols for WSN with stationary sensors and mobile sensors are needed. In this paper, we propose an Anchor-based Group Relay-MAC (AGR-MAC) for the WSN with mixed sensors.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127281844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of OFDM in Underwater Magnetic Induction Communication OFDM在水下磁感应通信中的应用
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718175
Wentao Zhou, Y. Shin
Magnetic induction (MI) communication is widely used in underground and underwater environments. However, there is a large path loss in MI system and the 3-dB bandwidth of the system is narrow, which means that the available bandwidth of the communication system is limited. It is important to increase the number of bits per unit bandwidth. Orthogonal frequency division multiplexing (OFDM) can effectively improve the spectrum efficiency. In this paper, OFDM is used in the underwater MI communication system model and compared with the single carrier modulation in terms of spectrum efficiency and bit error rate. The results indicate that the underwater MI using OFDM modulation is better than the single carrier modulation in spectrum efficiency.
磁感应通信在地下和水下环境中有着广泛的应用。然而,MI系统存在较大的路径损耗,且系统的3db带宽较窄,这意味着通信系统的可用带宽有限。增加每单位带宽的位数是很重要的。正交频分复用(OFDM)可以有效地提高频谱效率。本文将OFDM应用于水下MI通信系统模型中,并与单载波调制在频谱效率和误码率方面进行了比较。结果表明,采用OFDM调制的水下MI在频谱效率上优于单载波调制。
{"title":"Application of OFDM in Underwater Magnetic Induction Communication","authors":"Wentao Zhou, Y. Shin","doi":"10.1109/ICOIN.2019.8718175","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718175","url":null,"abstract":"Magnetic induction (MI) communication is widely used in underground and underwater environments. However, there is a large path loss in MI system and the 3-dB bandwidth of the system is narrow, which means that the available bandwidth of the communication system is limited. It is important to increase the number of bits per unit bandwidth. Orthogonal frequency division multiplexing (OFDM) can effectively improve the spectrum efficiency. In this paper, OFDM is used in the underwater MI communication system model and compared with the single carrier modulation in terms of spectrum efficiency and bit error rate. The results indicate that the underwater MI using OFDM modulation is better than the single carrier modulation in spectrum efficiency.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127133618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness 基于效率和安全性的PKC加法链问题的随机启发式方法
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718161
A. M. Noma, A. Muhammad
This paper shows that stochastic heuristic approach for implicitly solving addition chain problem (ACP) in public-key cryptosystem (PKC) enhances the efficiency of the PKC and improves the security by blinding the multiplications/squaring operations involved against side-channel attack (SCA). We show that while the current practical heuristic approaches being deterministic expose the fixed pattern of the operations, using stochastic method blinds the pattern by being unpredictable and generating diffident pattern of operation for the same exponent at a different time. Thus, if the addition chain (AC) is generated implicitly every time the exponentiation operation is being made, needless for such approaches as padding by insertion of dummy operations and the operation is still totally secured against the SCA. Furthermore, we also show that the stochastic approaches, when carefully designed, further reduces the length of the operation than state-of-the-art practical methods for improving the efficiency. We demonstrated our investigation by implementing RSA cryptosystem using the stochastic approach and the results benchmarked with the existing current methods.
本文提出了隐式求解公钥密码系统(PKC)中加法链问题(ACP)的随机启发式方法,该方法通过对涉及的乘法/平方运算进行盲化来防止侧信道攻击(SCA),从而提高了公钥密码系统的效率和安全性。我们表明,虽然目前实用的启发式方法是确定性的,但它暴露了操作的固定模式,而使用随机方法由于不可预测和在不同时间对同一指数产生不确定的操作模式而使模式失明。因此,如果每次执行求幂操作时都隐式地生成加法链(AC),则无需通过插入虚拟操作填充等方法,并且该操作仍然完全不受SCA的影响。此外,我们还表明,当精心设计的随机方法,进一步减少操作的长度比最先进的实用方法,以提高效率。我们通过使用随机方法实现RSA密码系统来展示我们的研究,并使用现有的方法对结果进行基准测试。
{"title":"Stochastic Heuristic Approach to Addition Chain Problem in PKC for Efficiency and Security Effectiveness","authors":"A. M. Noma, A. Muhammad","doi":"10.1109/ICOIN.2019.8718161","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718161","url":null,"abstract":"This paper shows that stochastic heuristic approach for implicitly solving addition chain problem (ACP) in public-key cryptosystem (PKC) enhances the efficiency of the PKC and improves the security by blinding the multiplications/squaring operations involved against side-channel attack (SCA). We show that while the current practical heuristic approaches being deterministic expose the fixed pattern of the operations, using stochastic method blinds the pattern by being unpredictable and generating diffident pattern of operation for the same exponent at a different time. Thus, if the addition chain (AC) is generated implicitly every time the exponentiation operation is being made, needless for such approaches as padding by insertion of dummy operations and the operation is still totally secured against the SCA. Furthermore, we also show that the stochastic approaches, when carefully designed, further reduces the length of the operation than state-of-the-art practical methods for improving the efficiency. We demonstrated our investigation by implementing RSA cryptosystem using the stochastic approach and the results benchmarked with the existing current methods.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128911391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
WebRTC-Based Multi-View Video and Audio Transmission and its QoE 基于webbrtc的多视点音频传输及其QoE
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718109
Yuki Maehara, Toshiro Nunome
In this paper, we implement a Multi-View Video and Audio (MVV-A) transmission system utilizing WebRTC media channel, which employs UDP-based transmission into Web technologies, to enhance QoE under large delay. According to viewpoint change requests, this system switches audiovisual streams. We compare QoE with MVV-A transmission using MPEG-DASH, which employs HTTP/TCP, through a subjective experiment with various network conditions. As transmission methods utilizing MPEG-DASH, we treat single viewpoint transmission and simultaneous transmission of all the viewpoints. As a result, we find that the MVV-A transmission with WebRTC achieves higher QoE than that with MPEG-DASH under large delay.
本文利用webbrtc媒体通道实现了一种多视点音频(MVV-A)传输系统,该系统采用基于udp的传输到Web技术,以提高大延迟下的QoE。根据视点变化的要求,系统切换视听流。我们通过对各种网络条件的主观实验,比较了QoE与使用HTTP/TCP的MPEG-DASH的MVV-A传输。作为利用MPEG-DASH的传输方式,我们将单视点传输和所有视点的同时传输进行了处理。结果表明,在大延迟情况下,使用WebRTC的mtv - a传输比使用MPEG-DASH传输获得了更高的QoE。
{"title":"WebRTC-Based Multi-View Video and Audio Transmission and its QoE","authors":"Yuki Maehara, Toshiro Nunome","doi":"10.1109/ICOIN.2019.8718109","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718109","url":null,"abstract":"In this paper, we implement a Multi-View Video and Audio (MVV-A) transmission system utilizing WebRTC media channel, which employs UDP-based transmission into Web technologies, to enhance QoE under large delay. According to viewpoint change requests, this system switches audiovisual streams. We compare QoE with MVV-A transmission using MPEG-DASH, which employs HTTP/TCP, through a subjective experiment with various network conditions. As transmission methods utilizing MPEG-DASH, we treat single viewpoint transmission and simultaneous transmission of all the viewpoints. As a result, we find that the MVV-A transmission with WebRTC achieves higher QoE than that with MPEG-DASH under large delay.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123711119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Mode Selection Algorithm for Mitigating Interference in D2D Enabled Next-Generation Heterogeneous Cellular Networks 基于D2D的下一代异构蜂窝网络中抑制干扰的模式选择算法
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718182
M. Kamruzzaman, N. Sarkar, Jairo Gutiérrez, S. K. Ray
Device-to-Device (D2D) communication is becoming more popular research topic among the network researchers and engineers across the globe This popularity is due to various key applications of D2D communications including 4G LTE-A envisioning the continuous evolution of current cellular networks into 5G to support a much larger and diverse range of applications. D2D communications play an important role to fulfill the quality of service (QoS) requirements for 5G networks. However, to realize the performance gain of D2D communications, various open challenges need to be resolved including mode selection (MS). This paper, therefore proposes a new mode selection algorithm for D2D enabled heterogeneous 5G cellular network. By quantifying the key parameters we mitigate interference that affect the system performance, and finally proposed an algorithm for optimal selection of transmission mode in a heterogeneous cellular network. The findings reported in this paper provide some insights into the design of 5G networks that may help network designer and engineers to contribute further towards the development of next generation wireless networks.
设备到设备(D2D)通信正在成为全球网络研究人员和工程师之间越来越受欢迎的研究课题,这种流行是由于D2D通信的各种关键应用,包括4G LTE-A,设想当前蜂窝网络不断向5G演进,以支持更大范围和多样化的应用。D2D通信在满足5G网络的服务质量(QoS)要求方面发挥着重要作用。然而,为了实现D2D通信的性能增益,需要解决包括模式选择(MS)在内的各种开放式挑战。因此,本文提出了一种新的支持D2D的异构5G蜂窝网络模式选择算法。通过量化关键参数,减少影响系统性能的干扰,最后提出了异构蜂窝网络中传输模式的最优选择算法。本文中报告的研究结果为5G网络的设计提供了一些见解,可以帮助网络设计师和工程师进一步为下一代无线网络的发展做出贡献。
{"title":"A Mode Selection Algorithm for Mitigating Interference in D2D Enabled Next-Generation Heterogeneous Cellular Networks","authors":"M. Kamruzzaman, N. Sarkar, Jairo Gutiérrez, S. K. Ray","doi":"10.1109/ICOIN.2019.8718182","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718182","url":null,"abstract":"Device-to-Device (D2D) communication is becoming more popular research topic among the network researchers and engineers across the globe This popularity is due to various key applications of D2D communications including 4G LTE-A envisioning the continuous evolution of current cellular networks into 5G to support a much larger and diverse range of applications. D2D communications play an important role to fulfill the quality of service (QoS) requirements for 5G networks. However, to realize the performance gain of D2D communications, various open challenges need to be resolved including mode selection (MS). This paper, therefore proposes a new mode selection algorithm for D2D enabled heterogeneous 5G cellular network. By quantifying the key parameters we mitigate interference that affect the system performance, and finally proposed an algorithm for optimal selection of transmission mode in a heterogeneous cellular network. The findings reported in this paper provide some insights into the design of 5G networks that may help network designer and engineers to contribute further towards the development of next generation wireless networks.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133636982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Design and Prototyping of Container-Enabled Cluster for High Performance Data Analytics 用于高性能数据分析的容器支持集群的设计和原型
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718135
Jincheol Kwon, N. Kim, Moonjoong Kang, Jong WonKim
With the rapid spread of cloud-native computing paradigm, the utilization of cloud has been maturing to accommodate versatile microservices-based application services with agility and scalability. However, in case of HPDA (high-performance data analytics) workload, the transition toward cloud-native-style computing infrastructure is still facing several hurdles to realize container-enabled clusters. To address technical constraints around bottlenecked inter-connections for overlay networking and storage access, in this paper, we design and prototype a container-enabled cluster that effectively and seamlessly integrate the hardware and software pieces of HPDA cluster.
随着云原生计算范式的快速传播,云的利用已经成熟到能够适应灵活和可伸缩性的基于微服务的多功能应用程序服务。然而,在HPDA(高性能数据分析)工作负载的情况下,向云原生风格的计算基础设施的过渡仍然面临着实现支持容器的集群的几个障碍。为了解决围绕覆盖网络和存储访问的瓶颈互连的技术限制,在本文中,我们设计并原型化了一个容器支持的集群,该集群有效地无缝集成了HPDA集群的硬件和软件部分。
{"title":"Design and Prototyping of Container-Enabled Cluster for High Performance Data Analytics","authors":"Jincheol Kwon, N. Kim, Moonjoong Kang, Jong WonKim","doi":"10.1109/ICOIN.2019.8718135","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718135","url":null,"abstract":"With the rapid spread of cloud-native computing paradigm, the utilization of cloud has been maturing to accommodate versatile microservices-based application services with agility and scalability. However, in case of HPDA (high-performance data analytics) workload, the transition toward cloud-native-style computing infrastructure is still facing several hurdles to realize container-enabled clusters. To address technical constraints around bottlenecked inter-connections for overlay networking and storage access, in this paper, we design and prototype a container-enabled cluster that effectively and seamlessly integrate the hardware and software pieces of HPDA cluster.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130298196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Popularity-Based Content Cache Management for in-Network Caching 用于网络缓存的基于流行度的内容缓存管理
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718180
Taketo Fukushima, M. Iio, K. Hirata, M. Yamamoto
In-network caching is a technique that stores contents in caches of routers, and thus reduces the loads for content servers and networks. To further enhance the performance of in-network caching, this paper proposes a popularity-based content cache management method. The proposed method divides the cached contents into some groups based on their popularity and manages information on content placement of each group in a distributed manner with a distributed hash table mechanism. The proposed method enables users to download contents stored in near routers with low overheads. This paper shows that the proposed method enhances the cache utilization efficiently through simulation experiments.
网络内缓存是一种将内容存储在路由器缓存中的技术,从而减少了内容服务器和网络的负载。为了进一步提高网络内缓存的性能,本文提出了一种基于流行度的内容缓存管理方法。该方法根据缓存内容的受欢迎程度将其划分为若干组,并利用分布式哈希表机制对每组内容的位置信息进行分布式管理。该方法使用户能够以较低的开销下载存储在附近路由器中的内容。仿真实验表明,该方法有效地提高了缓存利用率。
{"title":"Popularity-Based Content Cache Management for in-Network Caching","authors":"Taketo Fukushima, M. Iio, K. Hirata, M. Yamamoto","doi":"10.1109/ICOIN.2019.8718180","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718180","url":null,"abstract":"In-network caching is a technique that stores contents in caches of routers, and thus reduces the loads for content servers and networks. To further enhance the performance of in-network caching, this paper proposes a popularity-based content cache management method. The proposed method divides the cached contents into some groups based on their popularity and manages information on content placement of each group in a distributed manner with a distributed hash table mechanism. The proposed method enables users to download contents stored in near routers with low overheads. This paper shows that the proposed method enhances the cache utilization efficiently through simulation experiments.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134512557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Trustless Two-Factor Authentication Using Smart Contracts in Blockchains 在区块链中使用智能合约的无信任双因素身份验证
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718198
Varun Amrutiya, S. Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia
Two-factor authentication (2FA) is widely prevalent in banking, emails and virtual private networks (VPN) connections or in accessing any secure web service. In 2FA, to get authenticated the users are expected to provide additional secret information along with the password. Typically, this secret information (tokens) is generated by a centralized trusted third party upon receiving an authentication request from users. Thus, this additional layer of security comes at the cost of inherently trusting the third party for their services. The security of such authentication systems is always under the threat of the trusted party is being compromised. In this paper, we propose a novel approach to make server authentication even more secure by building 2FA over the blockchain platform which is distributed in nature. The proposed solution does not require any trusted third party between claimant (user) and the verifier (server) for the authentication purpose. To demonstrate the idea of using blockchain technology for 2FA, we have added an extra layer of security component to the OpenSSH server a widely used application for Secure Shell (SSH) protocol.
双因素认证(2FA)在银行、电子邮件和虚拟专用网络(VPN)连接或访问任何安全web服务中广泛流行。在2FA中,为了获得身份验证,用户需要提供额外的秘密信息和密码。通常,这个秘密信息(令牌)是由一个集中可信的第三方在接收到来自用户的身份验证请求时生成的。因此,这一额外的安全层是以信任第三方的服务为代价的。这类认证系统的安全性总是受到受信任方被泄露的威胁。在本文中,我们提出了一种新颖的方法,通过在分布式区块链平台上构建2FA,使服务器身份验证更加安全。提议的解决方案不需要在索赔人(用户)和验证者(服务器)之间存在任何可信的第三方来进行身份验证。为了演示在2FA中使用区块链技术的想法,我们向OpenSSH服务器添加了一个额外的安全组件层,OpenSSH服务器是一个广泛使用的SSH协议应用程序。
{"title":"Trustless Two-Factor Authentication Using Smart Contracts in Blockchains","authors":"Varun Amrutiya, S. Jhamb, Pranjal Priyadarshi, Ashutosh Bhatia","doi":"10.1109/ICOIN.2019.8718198","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718198","url":null,"abstract":"Two-factor authentication (2FA) is widely prevalent in banking, emails and virtual private networks (VPN) connections or in accessing any secure web service. In 2FA, to get authenticated the users are expected to provide additional secret information along with the password. Typically, this secret information (tokens) is generated by a centralized trusted third party upon receiving an authentication request from users. Thus, this additional layer of security comes at the cost of inherently trusting the third party for their services. The security of such authentication systems is always under the threat of the trusted party is being compromised. In this paper, we propose a novel approach to make server authentication even more secure by building 2FA over the blockchain platform which is distributed in nature. The proposed solution does not require any trusted third party between claimant (user) and the verifier (server) for the authentication purpose. To demonstrate the idea of using blockchain technology for 2FA, we have added an extra layer of security component to the OpenSSH server a widely used application for Secure Shell (SSH) protocol.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116943978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling 基于确定性建模的自进化僵尸网络感染动力学
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718173
Yuya Kumai, Koki Hongyo, Tomotaka Kimura, K. Hirata
In the past, the concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover vulnerabilities, have been introduced in the literature. This paper proposes a deterministic epidemic model that represents the infection dynamics of self-evolving botnets. The proposed epidemic model represents the infection dynamics of the self-evolving botnet with ordinary differential equations based on a Susceptible-Infected-Recovered-Susceptible model, which is widely used for general epidemic models of malware infection. Through numerical calculations, we show the infection behavior of self-evolving botnets.
过去,文献中已经引入了自进化僵尸网络的概念,即利用受感染主机的计算资源来发现漏洞。本文提出了一种表征自进化僵尸网络感染动态的确定性流行病模型。本文提出的流行模型基于易感-感染-恢复-易感模型,用常微分方程表示自进化僵尸网络的感染动态,该模型广泛用于一般的恶意软件感染流行模型。通过数值计算,我们展示了自进化僵尸网络的感染行为。
{"title":"Infection Dynamics of Self-Evolving Botnets with Deterministic Modeling","authors":"Yuya Kumai, Koki Hongyo, Tomotaka Kimura, K. Hirata","doi":"10.1109/ICOIN.2019.8718173","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718173","url":null,"abstract":"In the past, the concept of self-evolving botnets, where computing resources of infected hosts are exploited to discover vulnerabilities, have been introduced in the literature. This paper proposes a deterministic epidemic model that represents the infection dynamics of self-evolving botnets. The proposed epidemic model represents the infection dynamics of the self-evolving botnet with ordinary differential equations based on a Susceptible-Infected-Recovered-Susceptible model, which is widely used for general epidemic models of malware infection. Through numerical calculations, we show the infection behavior of self-evolving botnets.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116416239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation 一种基于混沌调制的物理层安全上行非正交多址方案
Pub Date : 2019-01-01 DOI: 10.1109/ICOIN.2019.8718195
Yoshihiro Masuda, E. Okamoto, Keita Ito, Tetsuya Yamamoto
Fifth generation mobile communications system (5G) that enables large transmission capacity (over 10 Gbps) is currently standardized and under development. Non-orthogonal multiple access (NOMA) scheme is a typical core technology for 5G. On the other hand, we had proposed earlier a chaos multiple-input multiple-output (C-MIMO) transmission scheme that harnesses the strengths of the chaos communication system. C-MIMO exhibits channel coding effect and physical layer security based on a common key encryption that helps realize a secure wireless transmission. Furthermore, based on the C-MIMO, we had proposed a downlink chaos NOMA transmission scheme that realizes physical layer security in NOMA. However, in the conventional studies, an uplink transmission is not considered yet. Therefore, in this paper, we propose an uplink chaos NOMA transmission scheme using C-MIMO to realize a secure and large-capacity uplink transmission. The performance of the proposed scheme is evaluated through numerical simulations.
目前,能够实现大传输容量(超过10gbps)的第五代移动通信系统(5G)正在标准化和开发中。非正交多址(NOMA)方案是5G的典型核心技术。另一方面,我们之前提出了一种利用混沌通信系统优势的混沌多输入多输出(C-MIMO)传输方案。C-MIMO具有信道编码效应和基于通用密钥加密的物理层安全性,有助于实现安全的无线传输。在此基础上,提出了一种基于C-MIMO的下行混沌NOMA传输方案,实现了NOMA中的物理层安全。然而,在传统的研究中,还没有考虑到上行传输。因此,本文提出了一种基于C-MIMO的上行混沌NOMA传输方案,以实现安全、大容量的上行传输。通过数值模拟对该方案的性能进行了评价。
{"title":"An Uplink Non-Orthogonal Multiple Access Scheme Having Physical Layer Security Based on Chaos Modulation","authors":"Yoshihiro Masuda, E. Okamoto, Keita Ito, Tetsuya Yamamoto","doi":"10.1109/ICOIN.2019.8718195","DOIUrl":"https://doi.org/10.1109/ICOIN.2019.8718195","url":null,"abstract":"Fifth generation mobile communications system (5G) that enables large transmission capacity (over 10 Gbps) is currently standardized and under development. Non-orthogonal multiple access (NOMA) scheme is a typical core technology for 5G. On the other hand, we had proposed earlier a chaos multiple-input multiple-output (C-MIMO) transmission scheme that harnesses the strengths of the chaos communication system. C-MIMO exhibits channel coding effect and physical layer security based on a common key encryption that helps realize a secure wireless transmission. Furthermore, based on the C-MIMO, we had proposed a downlink chaos NOMA transmission scheme that realizes physical layer security in NOMA. However, in the conventional studies, an uplink transmission is not considered yet. Therefore, in this paper, we propose an uplink chaos NOMA transmission scheme using C-MIMO to realize a secure and large-capacity uplink transmission. The performance of the proposed scheme is evaluated through numerical simulations.","PeriodicalId":422041,"journal":{"name":"2019 International Conference on Information Networking (ICOIN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121954772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2019 International Conference on Information Networking (ICOIN)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1