A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.
{"title":"Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu","authors":"S. Narayan, Peng Shang, Na Fan","doi":"10.1109/NSWCTC.2009.368","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.368","url":null,"abstract":"A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.
{"title":"Initialization Method of Gene Library Based on Teiresias Algorithm","authors":"D. You-xiang, Huang Min, Xu Jiuyun","doi":"10.1109/NSWCTC.2009.119","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.119","url":null,"abstract":"this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.
{"title":"A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks","authors":"Li Xu, Yihui Zhang","doi":"10.1109/NSWCTC.2009.265","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.265","url":null,"abstract":"To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134156264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang
This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.
{"title":"A Time-decay Based P2P Trust Model","authors":"Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang","doi":"10.1109/NSWCTC.2009.98","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.98","url":null,"abstract":"This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.
{"title":"A Range Query Model Based on DHT in P2P System","authors":"Wang Dan, Li Maozeng","doi":"10.1109/NSWCTC.2009.55","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.55","url":null,"abstract":"A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"35 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114024287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.
{"title":"SPTM: A Security Protocol for Protecting the P2P Trust Information Management","authors":"Jianli Hu, Quanyuan Wu, Bin Zhou","doi":"10.1109/NSWCTC.2009.156","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.156","url":null,"abstract":"The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.
{"title":"Topology Optimization for Target Localization in Wireless Sensor Networks","authors":"Chao Yang, Lijun Chen, Daoxu Chen, Li Xie","doi":"10.1109/NSWCTC.2009.28","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.28","url":null,"abstract":"Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.
{"title":"Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology","authors":"Qinghua Xu, Jinyu Jiang, Xianbiao Wang","doi":"10.1109/NSWCTC.2009.270","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.270","url":null,"abstract":"Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.
{"title":"The Research of Hybrid Network Communication System in NC System","authors":"Kun-qi Wang, Pengju Wang, Ya-nan Wang","doi":"10.1109/NSWCTC.2009.345","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.345","url":null,"abstract":"Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.
{"title":"Semantic Access Control for Web Services","authors":"Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang","doi":"10.1109/NSWCTC.2009.389","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.389","url":null,"abstract":"The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"652 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}