Guangwei Liu, Jian Xu, Mengmeng Cao, Fu-cai Zhou, Bin Zhang
As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.
{"title":"Research of Secure Multicast Key Management Protocol Based on Fault-Tolerant Mechanism","authors":"Guangwei Liu, Jian Xu, Mengmeng Cao, Fu-cai Zhou, Bin Zhang","doi":"10.1109/NSWCTC.2009.273","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.273","url":null,"abstract":"As multicasting is increasingly used as an efficient communication mechanism for group-oriented applications in the Internet, the research of the multicast key management is becoming a hot issue. Firstly, we analyze the n-party GDH.2 multicast key management protocol and point out that it has the following flaws: lack of certification, vulnerability to man-in-the-middle attacks, and a single-point failure. In order to settle the issues mentioned above, a fault-tolerant and secure multicast key management protocol (FTS, for short) with using the fault-tolerant algorithm and the password authentication mechanism is proposed in this paper. In our protocol, legal members are able to agree on a key despite failures of other members. The protocol can also prevent man-in-the-middle attacks. Finally, we evaluate the security of FTS, and compare our protocol with the FTKM through performance analysis. The analytic results show that the protocol not only avoids the single-point failure but also improves the comprehensive performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115795501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.
{"title":"Remote Attestation for Custom-built Software","authors":"Ce Meng, Yeping He, Qian Zhang","doi":"10.1109/NSWCTC.2009.158","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.158","url":null,"abstract":"With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation of content on the Internet today.
{"title":"Analysis and Design of the Classification Management on the Information Content Security Based on the Label","authors":"Junhua He, S. Mao","doi":"10.1109/NSWCTC.2009.308","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.308","url":null,"abstract":"As the Internet is a lack of effective information management tools, adopting a classification markings on the Internet for information management, and has designed a hierarchical structure of the security labels Protection measures, an analysis of management at different levels in the framework of a number of key technologies and security tag technology. The system has a certain value on the proliferation of content on the Internet today.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122944303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The important meaning of the optical fiber fusion defect recognition was introduced based on ISO14000. Detecting the optical fiber fusion point by using the UltraPAC system, aiming at the defect feature, the method of analyzing and extracting the defect eigenvalue by using wavelet packet analysis and pattern recognition by making use of the wavelet neural network is discussed. This method can realize to extract the interrelated information which can reflect defect feature from the ultrasonic information being detected and analysis it by the information. Constructing the network model for realizing the qualitative recognition of defects. The results of experiment show that the wavelet packet analysis adequately make use of the information in time-domain and in frequency-domain of the defected echo signal, multi-level partition the frequency bands and analyze the high-frequency part further which don’t been subdivided by multi-resolution analysis, and choose the interrelated frequency bands to make it suited with signal spectrum. Thus, the time-frequency resolution is risen, the good local amplificatory property of the wavelet neural network and the study characteristic of multi-resolution analysis can achieve the higher accuracy rate of the qualitative classification of fusion defects.
{"title":"Application of Wavelet Packet in Defect Recognition of Optical Fiber Fusion Based on ISO14000","authors":"Zhen Zhang, Jun-jie Xi","doi":"10.1109/NSWCTC.2009.35","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.35","url":null,"abstract":"The important meaning of the optical fiber fusion defect recognition was introduced based on ISO14000. Detecting the optical fiber fusion point by using the UltraPAC system, aiming at the defect feature, the method of analyzing and extracting the defect eigenvalue by using wavelet packet analysis and pattern recognition by making use of the wavelet neural network is discussed. This method can realize to extract the interrelated information which can reflect defect feature from the ultrasonic information being detected and analysis it by the information. Constructing the network model for realizing the qualitative recognition of defects. The results of experiment show that the wavelet packet analysis adequately make use of the information in time-domain and in frequency-domain of the defected echo signal, multi-level partition the frequency bands and analyze the high-frequency part further which don’t been subdivided by multi-resolution analysis, and choose the interrelated frequency bands to make it suited with signal spectrum. Thus, the time-frequency resolution is risen, the good local amplificatory property of the wavelet neural network and the study characteristic of multi-resolution analysis can achieve the higher accuracy rate of the qualitative classification of fusion defects.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123593790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.
{"title":"Flexible Authorizations with Logic Program","authors":"Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang","doi":"10.1109/NSWCTC.2009.9","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.9","url":null,"abstract":"Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.
{"title":"An Improved Colour Image Encryption Based on Chaotic Map and OCML Model","authors":"Jun He, Jun Zheng, Zhi-bin Li, Hai-feng Qian","doi":"10.1109/NSWCTC.2009.243","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.243","url":null,"abstract":"In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122601016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Intrusion Detection Systems (IDSs) are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Recently applying Artificial Intelligence, machine learning and data mining techniques to IDS are increasing. Artificial Intelligence plays a driving role in security services. This paper proposes an Immune based Adaptive Intrusion Detection System Model (IAIDSM). Analyzing the training data obtaining from internet, the self behavior set and nonself behavior set can be obtained by the partitional clustering algorithm, then it extracts Self and nonself pattern sets from these two behavior sets by association rules and sequential patterns mining. The Self and nonself sets can update automatically and constantly online. So IAIDSM improves the ability of detecting new type intrusions and the adaptability of the system.
{"title":"Research on Immune Based Adaptive Intrusion Detection System Model","authors":"Lei Deng, De-yuan Gao","doi":"10.1109/NSWCTC.2009.87","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.87","url":null,"abstract":"Intrusion Detection Systems (IDSs) are increasingly a key part of systems defense. Various approaches to Intrusion Detection are currently being used, but they are relatively ineffective. Recently applying Artificial Intelligence, machine learning and data mining techniques to IDS are increasing. Artificial Intelligence plays a driving role in security services. This paper proposes an Immune based Adaptive Intrusion Detection System Model (IAIDSM). Analyzing the training data obtaining from internet, the self behavior set and nonself behavior set can be obtained by the partitional clustering algorithm, then it extracts Self and nonself pattern sets from these two behavior sets by association rules and sequential patterns mining. The Self and nonself sets can update automatically and constantly online. So IAIDSM improves the ability of detecting new type intrusions and the adaptability of the system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125363814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
To solve the slow convergence rate and local convergence of Simple Genetic Algorithm, an improved genetic algorithm (IGA) with real-coding, elite reservation, 2/4competitive choosing and adaptive genetic strategy is proposed. The experiment shows that the improved algorithm is more effective in realizing the global optimization and promoting evolution efficiency.
{"title":"Improved Real-coding Genetic Algorithm","authors":"J. An, Hai-juan Jin, Chaohun Liu","doi":"10.1109/NSWCTC.2009.335","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.335","url":null,"abstract":"To solve the slow convergence rate and local convergence of Simple Genetic Algorithm, an improved genetic algorithm (IGA) with real-coding, elite reservation, 2/4competitive choosing and adaptive genetic strategy is proposed. The experiment shows that the improved algorithm is more effective in realizing the global optimization and promoting evolution efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125534602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A N-way dual-frequency power divider designed with genetic algorithm is proposed. The structure of power divider is composed of n two-section transmission line transformers and n isolation resisters. After even-odd mode analysis with ideal transmission-line model, the optimal parameters are obtained with genetic algorithm. In the genetic algorithm, elitist strategy, crossover and mutation of changing probability are preserved to prevent premature convergence, and to avoid complex formula derivation, one can get the optimized results rapidly and efficiently. The performance of the power divider is analyzed by simulation with software ADS. The results show that impedance is matching at all ports and isolation meet the application requirements.
{"title":"Design of N-way Dual-Frequency Power Divider Base on Genetic Algorithm","authors":"Wei Wang, Wencheng Li, Dan Chen","doi":"10.1109/NSWCTC.2009.65","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.65","url":null,"abstract":"A N-way dual-frequency power divider designed with genetic algorithm is proposed. The structure of power divider is composed of n two-section transmission line transformers and n isolation resisters. After even-odd mode analysis with ideal transmission-line model, the optimal parameters are obtained with genetic algorithm. In the genetic algorithm, elitist strategy, crossover and mutation of changing probability are preserved to prevent premature convergence, and to avoid complex formula derivation, one can get the optimized results rapidly and efficiently. The performance of the power divider is analyzed by simulation with software ADS. The results show that impedance is matching at all ports and isolation meet the application requirements.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126403761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, a new fault-tolerant Clos network is presented by adding extra switches and redirecting boxes in ordinary Clos network. The extra switches and redirecting boxes can improve the run time of the routing algorithm significantly when the Clos network displays few or no faults. The paper also presents a fault-tolerant routing algorithm for fault-tolerant Clos network. This algorithm employs a minimum distribution priority scheme handling Clos specification matrix column by column and completely achieves rearrangeable non-blocking routing. The fault-tolerant routing algorithm can reach a low time complexity O(N3/2) even in the worst case. Thus, the presented fault-tolerant Clos network and its routing algorithm are readily applicable to more Reliable Clos network.
{"title":"Topology and Routing Schemes for Fault-Tolerant Clos Network","authors":"Xinming Duan, Dakun Zhang, Xuemei Sun","doi":"10.1109/NSWCTC.2009.362","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.362","url":null,"abstract":"In this paper, a new fault-tolerant Clos network is presented by adding extra switches and redirecting boxes in ordinary Clos network. The extra switches and redirecting boxes can improve the run time of the routing algorithm significantly when the Clos network displays few or no faults. The paper also presents a fault-tolerant routing algorithm for fault-tolerant Clos network. This algorithm employs a minimum distribution priority scheme handling Clos specification matrix column by column and completely achieves rearrangeable non-blocking routing. The fault-tolerant routing algorithm can reach a low time complexity O(N3/2) even in the worst case. Thus, the presented fault-tolerant Clos network and its routing algorithm are readily applicable to more Reliable Clos network.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128615639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}