首页 > 最新文献

2014 28th International Conference on Advanced Information Networking and Applications Workshops最新文献

英文 中文
Retransmission Timeout Estimation for Low-Delay Applications Using Multipath RTP 基于多径RTP的低延迟应用重传超时估计
R. Globisch, Yago Sánchez de la Fuente, T. Schierl, K. Ferguson, T. Wiegand
Delay-sensitive media applications typically prioritise timeliness over reliability, therefore preferring UDP over TCP. Retransmission is a method to compensate for packet loss and requires the receiver to provide timely feedback to the sender. Delaying the retransmission request too long may result in the retransmitted media arriving late. Alternatively, aggressive error estimation, where slightly delayed packets are seen as lost, results in unnecessary bandwidth usage and may contribute to further congestion of the network. We study receiver-based retransmission timeout (RTO) estimation in the context of real-time streaming over Multipath RTP and propose a solution in which we use statistical methods to provide accurate RTO prediction which allows for timely feedback. The proposed approach allows the receiver to accurately estimate the RTO when receiving media over multiple paths irrespective of the scheduling algorithm used at the sender. This enables a sender to take advantage of multiple paths for load balancing or bandwidth aggregation by scheduling media based on dynamic path characteristics.
对延迟敏感的媒体应用程序通常优先考虑时效性而不是可靠性,因此更喜欢UDP而不是TCP。重传是一种补偿丢包的方法,要求接收方及时向发送方提供反馈。延迟重传请求的时间过长可能导致重传的媒体到达较晚。或者,主动错误估计,其中稍微延迟的数据包被视为丢失,导致不必要的带宽使用,并可能导致进一步的网络拥塞。我们研究了多路径RTP实时流环境下基于接收端的重传超时(RTO)估计,并提出了一种使用统计方法提供准确的RTO预测并允许及时反馈的解决方案。所提出的方法允许接收方在多条路径上接收媒体时准确估计RTO,而不考虑发送方使用的调度算法。这使发送方能够利用多路径进行负载平衡或带宽聚合,方法是根据动态路径特征调度媒体。
{"title":"Retransmission Timeout Estimation for Low-Delay Applications Using Multipath RTP","authors":"R. Globisch, Yago Sánchez de la Fuente, T. Schierl, K. Ferguson, T. Wiegand","doi":"10.1109/WAINA.2014.124","DOIUrl":"https://doi.org/10.1109/WAINA.2014.124","url":null,"abstract":"Delay-sensitive media applications typically prioritise timeliness over reliability, therefore preferring UDP over TCP. Retransmission is a method to compensate for packet loss and requires the receiver to provide timely feedback to the sender. Delaying the retransmission request too long may result in the retransmitted media arriving late. Alternatively, aggressive error estimation, where slightly delayed packets are seen as lost, results in unnecessary bandwidth usage and may contribute to further congestion of the network. We study receiver-based retransmission timeout (RTO) estimation in the context of real-time streaming over Multipath RTP and propose a solution in which we use statistical methods to provide accurate RTO prediction which allows for timely feedback. The proposed approach allows the receiver to accurately estimate the RTO when receiving media over multiple paths irrespective of the scheduling algorithm used at the sender. This enables a sender to take advantage of multiple paths for load balancing or bandwidth aggregation by scheduling media based on dynamic path characteristics.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124373952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of Space-Time-Frequency (STF)-Coded MIMO-OFDM Systems in Realistic Channel Models 空时频编码MIMO-OFDM系统在实际信道模型中的评估
R. K. Miranda, J. Costa, M. A. M. Marinho, E. P. Freitas, Rafael de Freitas Ramos, Kefei Liu, H. So, L. Baltar, Rafael Timóteo de Sousa Júnior
By taking into account several dimension of the transmitted signal, such as space, frequency, period and time, MIMO-OFDM systems allow an increased spectral efficiency and an improved identifiability in comparison to matrix solutions. In this paper, we evaluate MIMO-OFDM systems for geometric scenarios where the narrow band approximation is violated. To this end a new data model is proposed to better represent the behavior of the system in the presence of wide band signals. Moreover, we also relax the assumption that the amount of transmitted antennas is equal to the number of transmitted symbols.
通过考虑到传输信号的几个维度,如空间、频率、周期和时间,MIMO-OFDM系统与矩阵解决方案相比,可以提高频谱效率和改进可识别性。在本文中,我们评估MIMO-OFDM系统的几何场景,其中窄带近似违反。为此,提出了一种新的数据模型,以更好地表示系统在宽带信号存在下的行为。此外,我们还放宽了发射天线的数量等于发射符号的数量的假设。
{"title":"Evaluation of Space-Time-Frequency (STF)-Coded MIMO-OFDM Systems in Realistic Channel Models","authors":"R. K. Miranda, J. Costa, M. A. M. Marinho, E. P. Freitas, Rafael de Freitas Ramos, Kefei Liu, H. So, L. Baltar, Rafael Timóteo de Sousa Júnior","doi":"10.1109/WAINA.2014.57","DOIUrl":"https://doi.org/10.1109/WAINA.2014.57","url":null,"abstract":"By taking into account several dimension of the transmitted signal, such as space, frequency, period and time, MIMO-OFDM systems allow an increased spectral efficiency and an improved identifiability in comparison to matrix solutions. In this paper, we evaluate MIMO-OFDM systems for geometric scenarios where the narrow band approximation is violated. To this end a new data model is proposed to better represent the behavior of the system in the presence of wide band signals. Moreover, we also relax the assumption that the amount of transmitted antennas is equal to the number of transmitted symbols.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126125877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Framework for Citizen Participation in the Internet of Things 公民参与物联网的框架
María Victoria Moreno Cano, José Luis Hernández Ramos, A. Gómez-Skarmeta, M. Nati, Nick Palaghias, A. Gluhak, R. Kranenburg
In line with the view of the SOCIOTAL EU project, this work presents a crucial next step in the transformation of an emerging business-driven Internet of Things (IoT) infrastructure into an all-inclusive one, tailored to the society and with the aim to accelerate the creation of a socially aware citizen-centric Internet of Things. To this purpose, this paper try to establish an IoT ecosystem that puts trust, user control and transparency at its heart in order to gain the confidence of everyday citizens. In line with this view, a privacy-preserving framework which integrates the explored relationships among identity, privacy, trust and reputation concepts is explored.
与socital欧盟项目的观点一致,这项工作是将新兴的业务驱动的物联网(IoT)基础设施转变为全包的、适合社会的、旨在加速创建具有社会意识的、以公民为中心的物联网的关键下一步。为此,本文试图建立一个以信任、用户控制和透明度为核心的物联网生态系统,以获得普通公民的信任。根据这一观点,探索了一个隐私保护框架,该框架整合了已探索的身份,隐私,信任和声誉概念之间的关系。
{"title":"A Framework for Citizen Participation in the Internet of Things","authors":"María Victoria Moreno Cano, José Luis Hernández Ramos, A. Gómez-Skarmeta, M. Nati, Nick Palaghias, A. Gluhak, R. Kranenburg","doi":"10.1109/WAINA.2014.161","DOIUrl":"https://doi.org/10.1109/WAINA.2014.161","url":null,"abstract":"In line with the view of the SOCIOTAL EU project, this work presents a crucial next step in the transformation of an emerging business-driven Internet of Things (IoT) infrastructure into an all-inclusive one, tailored to the society and with the aim to accelerate the creation of a socially aware citizen-centric Internet of Things. To this purpose, this paper try to establish an IoT ecosystem that puts trust, user control and transparency at its heart in order to gain the confidence of everyday citizens. In line with this view, a privacy-preserving framework which integrates the explored relationships among identity, privacy, trust and reputation concepts is explored.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"75 278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125966503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
E-Voting Attacks and Countermeasures 电子投票攻击与对策
M. Ziad, Amr Al-Anwar, Y. Alkabani, M. El-Kharashi, Hassan Bedour
Electronic voting (e-voting) systems have been inuse since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability. In this work, we present one of e-voting challenges where the hardware Trojan tampers results totally. We implement an e-voting machine as a case study on XilinxFPGA board. Then, we inject a hardware Trojan to tamper voting results. The attack depends mainly on the unused bits. We provide a protection technique and show its overhead. Furthermore, we introduce other attacks and protection scenarios. We compare between our selected protection techniques and others techniques. Finally, we illustrate that our chosen protection technique incurs negligible power overhead, whereas the average area and delay overheads are 4% and 10%, respectively.
电子投票(e-voting)系统自20世纪60年代以来一直在使用。与其他投票技术相比,电子投票提供了许多优势。然而,它也带来了许多安全挑战。因为它可能包含可以影响系统可靠性的恶意后门。在这项工作中,我们提出了一个电子投票挑战,其中硬件特洛伊木马篡改完全导致。以XilinxFPGA板为例,实现了一种电子投票机。然后,我们注入一个硬件木马来篡改投票结果。攻击主要依赖于未使用的比特。我们提供了一种保护技术,并展示了它的开销。此外,我们还介绍了其他攻击和保护场景。我们比较了我们选择的保护技术和其他技术。最后,我们说明了我们选择的保护技术产生的功率开销可以忽略不计,而平均面积和延迟开销分别为4%和10%。
{"title":"E-Voting Attacks and Countermeasures","authors":"M. Ziad, Amr Al-Anwar, Y. Alkabani, M. El-Kharashi, Hassan Bedour","doi":"10.1109/WAINA.2014.53","DOIUrl":"https://doi.org/10.1109/WAINA.2014.53","url":null,"abstract":"Electronic voting (e-voting) systems have been inuse since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability. In this work, we present one of e-voting challenges where the hardware Trojan tampers results totally. We implement an e-voting machine as a case study on XilinxFPGA board. Then, we inject a hardware Trojan to tamper voting results. The attack depends mainly on the unused bits. We provide a protection technique and show its overhead. Furthermore, we introduce other attacks and protection scenarios. We compare between our selected protection techniques and others techniques. Finally, we illustrate that our chosen protection technique incurs negligible power overhead, whereas the average area and delay overheads are 4% and 10%, respectively.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134103155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Cultural Transformation to Support the Adoption of Green IT 文化转型以支持采用绿色资讯科技
William M. Campbell, P. Moore, Mak Sharma
It is widely recognised that organizational culture has a key role in determining the success of change management initiatives. The introduction of Green IT approaches within an organization often represents a major exercise in change management. This paper explores ways of transforming organizational culture in directions that will support the introduction of greater levels of Green IT. A major theme is the use of 'choice architectures' to 'nudge' individuals in particular directions. Other themes explored in the paper are the roles of the social media and intelligent context-awareness. The impact of globalization is also considered. Cameron and Quinn's Competing Values Framework is used as a tool to explore the impact of organizational culture.
人们普遍认为,组织文化在决定变革管理计划的成功方面起着关键作用。在组织中引入绿色IT方法通常代表了变更管理的主要实践。本文探讨了在支持引入更高水平的绿色IT的方向上转变组织文化的方法。一个主要的主题是使用“选择架构”来“推动”个人走向特定的方向。本文探讨的其他主题是社交媒体和智能上下文感知的作用。全球化的影响也被考虑。Cameron和Quinn的竞争价值框架被用作探索组织文化影响的工具。
{"title":"Cultural Transformation to Support the Adoption of Green IT","authors":"William M. Campbell, P. Moore, Mak Sharma","doi":"10.1109/WAINA.2014.91","DOIUrl":"https://doi.org/10.1109/WAINA.2014.91","url":null,"abstract":"It is widely recognised that organizational culture has a key role in determining the success of change management initiatives. The introduction of Green IT approaches within an organization often represents a major exercise in change management. This paper explores ways of transforming organizational culture in directions that will support the introduction of greater levels of Green IT. A major theme is the use of 'choice architectures' to 'nudge' individuals in particular directions. Other themes explored in the paper are the roles of the social media and intelligent context-awareness. The impact of globalization is also considered. Cameron and Quinn's Competing Values Framework is used as a tool to explore the impact of organizational culture.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134112563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments 资源受限环境下保护隐私的k -匿名犯罪数据发布
Mark-John Burke, Anne Kayem
Mobile crime report services have become a pervasive approach to enabling community-based crime reporting (CBCR) in developing nations. These services hold the advantage of facilitating law enforcement when resource constraints make using standard crime investigation approaches challenging. However, CBCRs have failed to achieve widespread popularity in developing nations because of concerns for privacy. Users are hesitant to make crime reports with out strong guarantees of privacy preservation. Furthermore, oftentimes lack of data mining expertise within the law enforcement agencies implies that the reported data needs to be processed manually which is a time-consuming process. In this paper we make two contributions to facilitate effective and efficient CBCR and crime data mining as well as to address the user privacy concern. The first is a practical framework for mobile CBCR and the second, is a hybrid k-anonymity algorithm to guarantee privacy preservation of the reported crime data. We use a hierarchy-based generalization algorithm to classify the data to minimize information loss by optimizing the nodal degree of the classification tree. Results from our proof-of-concept implementation demonstrate that in addition to guaranteeing privacy, our proposed scheme offers a classification accuracy of about 38% and a drop in information loss of nearly 50% over previous schemes when compared on various sizes of datasets. Performance-wise we observe an average improvement of about 50ms proportionate to the size of the dataset.
移动犯罪报告服务已经成为发展中国家实现基于社区的犯罪报告(CBCR)的普遍方法。当资源限制使得使用标准犯罪调查方法具有挑战性时,这些服务具有便利执法的优势。然而,由于对隐私的担忧,cbcr未能在发展中国家广泛普及。在没有强有力的隐私保护保证的情况下,用户对举报犯罪行为犹豫不决。此外,执法机构往往缺乏数据挖掘专业知识,这意味着报告的数据需要手工处理,这是一个耗时的过程。在本文中,我们为促进有效和高效的CBCR和犯罪数据挖掘以及解决用户隐私问题做出了两方面的贡献。第一个是移动CBCR的实用框架,第二个是混合k-匿名算法,以保证所报告的犯罪数据的隐私保护。我们使用基于层次的泛化算法对数据进行分类,通过优化分类树的节点度来最小化信息损失。我们的概念验证实现的结果表明,在不同规模的数据集上,我们提出的方案除了保证隐私外,还提供了约38%的分类精度,并且与以前的方案相比,信息丢失减少了近50%。在性能方面,我们观察到与数据集大小成比例的平均改进约为50ms。
{"title":"K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments","authors":"Mark-John Burke, Anne Kayem","doi":"10.1109/WAINA.2014.131","DOIUrl":"https://doi.org/10.1109/WAINA.2014.131","url":null,"abstract":"Mobile crime report services have become a pervasive approach to enabling community-based crime reporting (CBCR) in developing nations. These services hold the advantage of facilitating law enforcement when resource constraints make using standard crime investigation approaches challenging. However, CBCRs have failed to achieve widespread popularity in developing nations because of concerns for privacy. Users are hesitant to make crime reports with out strong guarantees of privacy preservation. Furthermore, oftentimes lack of data mining expertise within the law enforcement agencies implies that the reported data needs to be processed manually which is a time-consuming process. In this paper we make two contributions to facilitate effective and efficient CBCR and crime data mining as well as to address the user privacy concern. The first is a practical framework for mobile CBCR and the second, is a hybrid k-anonymity algorithm to guarantee privacy preservation of the reported crime data. We use a hierarchy-based generalization algorithm to classify the data to minimize information loss by optimizing the nodal degree of the classification tree. Results from our proof-of-concept implementation demonstrate that in addition to guaranteeing privacy, our proposed scheme offers a classification accuracy of about 38% and a drop in information loss of nearly 50% over previous schemes when compared on various sizes of datasets. Performance-wise we observe an average improvement of about 50ms proportionate to the size of the dataset.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Composing Thermostatically Controlled Loads to Determine the Reliability against Blackouts 组成恒温控制负载以确定停电时的可靠性
Nils Müllner, Oliver E. Theel, M. Fränzle
Power grids are parallel systems in which consumers demand a shared resource independent of each other. A blackout occurs when the total demand increases or decreases too rapidly. This paper combines methods and concepts from three domains. The first stems from estimating the power consumption based on thermostatically controlled loads via Markov chains. The second domain provides the composition of parallel systems enriched by intermediate lumping to construct a minimal aggregate transition model, in this case of a community of housings. The third domain provides reasoning about fault tolerance properties by introducing limiting window reliability as measure, suitable to account for the continuous risk of blackouts. Combined, the three methods and concepts allow to determine the risk of blackout of a community over time.
电网是一个并行系统,其中用户需要彼此独立的共享资源。当总需求增长或下降过快时,就会发生停电。本文结合了三个领域的方法和概念。第一个是通过马尔可夫链估计基于恒温控制负载的功耗。第二个领域提供了通过中间集总丰富的并行系统的组合,以构建最小聚合过渡模型,在这种情况下是住宅社区。第三个领域通过引入限制窗口可靠性作为度量来提供容错特性的推理,适用于考虑停电的持续风险。结合这三种方法和概念,可以确定一个社区随着时间的推移停电的风险。
{"title":"Composing Thermostatically Controlled Loads to Determine the Reliability against Blackouts","authors":"Nils Müllner, Oliver E. Theel, M. Fränzle","doi":"10.1109/WAINA.2014.59","DOIUrl":"https://doi.org/10.1109/WAINA.2014.59","url":null,"abstract":"Power grids are parallel systems in which consumers demand a shared resource independent of each other. A blackout occurs when the total demand increases or decreases too rapidly. This paper combines methods and concepts from three domains. The first stems from estimating the power consumption based on thermostatically controlled loads via Markov chains. The second domain provides the composition of parallel systems enriched by intermediate lumping to construct a minimal aggregate transition model, in this case of a community of housings. The third domain provides reasoning about fault tolerance properties by introducing limiting window reliability as measure, suitable to account for the continuous risk of blackouts. Combined, the three methods and concepts allow to determine the risk of blackout of a community over time.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Steganographic Approach to Localizing Botmasters 一种隐写定位botmaster的方法
J. Rrushi
Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we discuss research that aims at providing law enforcement with the cyber counterpart of that approach in order to track perpetrators that operate botnets. We have devised a novel steganographic approach that generates a watermark hidden within a honey token, i.e. A decoy Word document. The covert bits that comprise the watermark are carried via secret interpretation of object properties in the honey token. The encoding and decoding of object properties into covert bits follow a scheme based on bijective functions generated via a chaotic logistic map. The watermark is retrievable via a secret cryptographic key, which is generated and held by law enforcement. The honey token is leaked to a botmaster via a honey net. In the paper, we elaborate on possible means by which law enforcement can track the leaked honey token to the IP address of a botmaster's machine.
执法部门采用一种基于标记钞票的调查方法来追踪非法毒贩。在本文中,我们讨论了旨在为执法部门提供该方法的网络对应物的研究,以便跟踪操作僵尸网络的肇事者。我们设计了一种新的隐写方法,该方法生成隐藏在蜂蜜令牌中的水印,即诱饵Word文档。组成水印的隐蔽比特通过蜂蜜令牌中对象属性的秘密解释来携带。对象属性的编码和解码采用一种基于混沌逻辑映射生成的双目标函数的方案。水印是通过一个秘密的加密密钥检索的,该密钥由执法部门生成并持有。蜜糖令牌通过蜜糖网泄露给僵尸主机。在本文中,我们详细说明了执法部门可以通过哪些方法将泄露的蜂蜜令牌跟踪到botmaster机器的IP地址。
{"title":"A Steganographic Approach to Localizing Botmasters","authors":"J. Rrushi","doi":"10.1109/WAINA.2014.152","DOIUrl":"https://doi.org/10.1109/WAINA.2014.152","url":null,"abstract":"Law enforcement employs an investigative approach based on marked money bills to track illegal drug dealers. In this paper we discuss research that aims at providing law enforcement with the cyber counterpart of that approach in order to track perpetrators that operate botnets. We have devised a novel steganographic approach that generates a watermark hidden within a honey token, i.e. A decoy Word document. The covert bits that comprise the watermark are carried via secret interpretation of object properties in the honey token. The encoding and decoding of object properties into covert bits follow a scheme based on bijective functions generated via a chaotic logistic map. The watermark is retrievable via a secret cryptographic key, which is generated and held by law enforcement. The honey token is leaked to a botmaster via a honey net. In the paper, we elaborate on possible means by which law enforcement can track the leaked honey token to the IP address of a botmaster's machine.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130516277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data Transmission Techniques for Mobile Sensor Networks 移动传感器网络的数据传输技术
T. Yoshihisa, S. Nishio
In mobile sensor networks (MSNs), since sensor nodes and wireless networks are highly resource constrained and, it is highly required to manage sensor data in flexible and efficient manners. Under the MEXT research project The Grand-in-Aid for Scientific Research (S)(21220002) of the Ministry of Education, Culture, Sports, Science and Technology (MEXT), Japan entitled "Studies on Efficient Data Processing Techniques for Mobile Sensor Networks," we have conducted researches on data management issues in MSNs. In this paper, we report some of our achievements in a sub-area of this project, which addresses data transmission for efficient data collection in MSNs. In particular, we first show our achievements on how to efficiently transmit sensor data from sensor nodes to mobile sink nodes considering the fairness and the amount of sensor data collected. Then, we also show our achievements on how to enlarge sensor data collection area and how to reduce communication traffic using mobile sink nodes.
在移动传感器网络(msn)中,由于传感器节点和无线网络的资源高度受限,因此对灵活高效地管理传感器数据提出了很高的要求。在日本文部科学省(MEXT)科研资助项目(S)(2122002)“移动传感器网络高效数据处理技术研究”下,我们开展了msn数据管理问题的研究。在本文中,我们报告了我们在该项目的一个子领域取得的一些成就,该领域解决了msn中有效数据收集的数据传输问题。特别是,我们首先展示了如何有效地将传感器数据从传感器节点传输到移动汇聚节点,同时考虑公平性和收集的传感器数据量。然后,我们还展示了我们在如何利用移动汇聚节点扩大传感器数据采集面积和减少通信流量方面取得的成果。
{"title":"Data Transmission Techniques for Mobile Sensor Networks","authors":"T. Yoshihisa, S. Nishio","doi":"10.1109/WAINA.2014.44","DOIUrl":"https://doi.org/10.1109/WAINA.2014.44","url":null,"abstract":"In mobile sensor networks (MSNs), since sensor nodes and wireless networks are highly resource constrained and, it is highly required to manage sensor data in flexible and efficient manners. Under the MEXT research project The Grand-in-Aid for Scientific Research (S)(21220002) of the Ministry of Education, Culture, Sports, Science and Technology (MEXT), Japan entitled \"Studies on Efficient Data Processing Techniques for Mobile Sensor Networks,\" we have conducted researches on data management issues in MSNs. In this paper, we report some of our achievements in a sub-area of this project, which addresses data transmission for efficient data collection in MSNs. In particular, we first show our achievements on how to efficiently transmit sensor data from sensor nodes to mobile sink nodes considering the fairness and the amount of sensor data collected. Then, we also show our achievements on how to enlarge sensor data collection area and how to reduce communication traffic using mobile sink nodes.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Framework for Communications in Heterogeneous Networks 异构网络通信的安全框架
Mahdi Aiash, G. Mapp, A. Lasebae, J. Loo
Heterogeneous Networks represent an open architecture in which two different domains need to cooperate in order to provide ubiquitous connectivity. The first is network operators domain, where multiple network operators share the core network to provide network accessibility over a wide variety of wireless technologies such as WiFi and mobile network technologies. The other is the Application-Service Providers domain, which launches various services ranging from the normal video streaming to the most confidential E-Commerce services. This highlights the fact that any efficient security solution for heterogeneous networks has to consider the security in these different domains. Therefore, this paper introduces security framework that comprises two Authentication and Key Agreement protocols to secure transactions at the network and service levels. The proposed protocols have been formally verified using formal methods approach based on Casper/FDR tool.
异构网络代表了一种开放的体系结构,在这种体系结构中,两个不同的域需要合作以提供无处不在的连接。首先是网络运营商领域,多个网络运营商共享核心网络,通过各种无线技术(如WiFi和移动网络技术)提供网络可访问性。另一个是应用程序服务提供商域,它启动从普通视频流到最机密的电子商务服务的各种服务。这突出了一个事实,即任何针对异构网络的有效安全解决方案都必须考虑这些不同域中的安全性。因此,本文介绍了由两个认证和密钥协议协议组成的安全框架,以确保网络和服务级别的交易安全。使用基于Casper/FDR工具的形式化方法对所提出的协议进行了形式化验证。
{"title":"A Secure Framework for Communications in Heterogeneous Networks","authors":"Mahdi Aiash, G. Mapp, A. Lasebae, J. Loo","doi":"10.1109/WAINA.2014.132","DOIUrl":"https://doi.org/10.1109/WAINA.2014.132","url":null,"abstract":"Heterogeneous Networks represent an open architecture in which two different domains need to cooperate in order to provide ubiquitous connectivity. The first is network operators domain, where multiple network operators share the core network to provide network accessibility over a wide variety of wireless technologies such as WiFi and mobile network technologies. The other is the Application-Service Providers domain, which launches various services ranging from the normal video streaming to the most confidential E-Commerce services. This highlights the fact that any efficient security solution for heterogeneous networks has to consider the security in these different domains. Therefore, this paper introduces security framework that comprises two Authentication and Key Agreement protocols to secure transactions at the network and service levels. The proposed protocols have been formally verified using formal methods approach based on Casper/FDR tool.","PeriodicalId":424903,"journal":{"name":"2014 28th International Conference on Advanced Information Networking and Applications Workshops","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114123167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
2014 28th International Conference on Advanced Information Networking and Applications Workshops
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1