Atmospheric turbulence leads to a stochastic process of optical intensity and phase of beam. Thus, errors of departure angle detection are induced. In the paper, a new method to modify of departure angle detection is introduced to Free Space Optical Communications. Based on the phase retrieval, the new method only needs the intensity of the image on the focal plane to calculate the revising phase. The complexity of the algorithm is reduced. The performance and its validity have been simulated in the paper. The results show that the errors of departure angle induced by the atmospheric turbulence become smaller.
{"title":"Research on the Modification of Departure Angle Detection for Free Space Optical Communications","authors":"Shiqi Jiang, Jing Ma, L. Tan","doi":"10.1109/IMCCC.2011.168","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.168","url":null,"abstract":"Atmospheric turbulence leads to a stochastic process of optical intensity and phase of beam. Thus, errors of departure angle detection are induced. In the paper, a new method to modify of departure angle detection is introduced to Free Space Optical Communications. Based on the phase retrieval, the new method only needs the intensity of the image on the focal plane to calculate the revising phase. The complexity of the algorithm is reduced. The performance and its validity have been simulated in the paper. The results show that the errors of departure angle induced by the atmospheric turbulence become smaller.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Gentry's fully homomorphic encryption scheme can only applied to single bit message, since the recrypt algorithm for full size message is relatively complicated. Based on Gentry's fully homomorphic encryption scheme, we provides a improvement and present a fully homomorphic encryption scheme which can encryption on n-bit message, and the asymptotic complexity is equal to Gentry's.
{"title":"Fully Homomorphic Encryption Scheme Extended to Large Message Space","authors":"Han Jing-li, Yang Ming, Wang Zhao-Li","doi":"10.1109/IMCCC.2011.138","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.138","url":null,"abstract":"Gentry's fully homomorphic encryption scheme can only applied to single bit message, since the recrypt algorithm for full size message is relatively complicated. Based on Gentry's fully homomorphic encryption scheme, we provides a improvement and present a fully homomorphic encryption scheme which can encryption on n-bit message, and the asymptotic complexity is equal to Gentry's.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Xin, Tao Yang, Cong Tang, Jian-bin Hu, Zhong Chen
This Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attack is a hot topic recently. A relay attack is a type of attack related to man-in-the-middle and replay attacks, in which an attacker relays verbatim a message from the sender to a valid receiver of the message. The sender may not be aware of even sending the message to the attacker. The main countermeasure against relay attack is the use of distance bounding protocols measuring the round-trip time between the reader and the tag. In this paper, we consider a modification of these protocols using `error state' which stands for the number of response bit errors that have already occurred. We set a maximal error number to prevent adversary from malicious queries, we also apply a punishment mechanism for error responding, which to my best knowledge is proposed at the first time in distance bounding protocols, if the tag sends one error bit, it should respond one more challenge bit to successfully finish the protocol. By using error state and punishment mechanism, the success probability for an adversary to access to the system decreases. Finally, we use the Hancke and Kuhn's protocol as a comparison, to show the improvements achieved when different cases are analyzed.
{"title":"A Distance Bounding Protocol Using Error State and Punishment","authors":"Wei Xin, Tao Yang, Cong Tang, Jian-bin Hu, Zhong Chen","doi":"10.1109/IMCCC.2011.115","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.115","url":null,"abstract":"This Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attack is a hot topic recently. A relay attack is a type of attack related to man-in-the-middle and replay attacks, in which an attacker relays verbatim a message from the sender to a valid receiver of the message. The sender may not be aware of even sending the message to the attacker. The main countermeasure against relay attack is the use of distance bounding protocols measuring the round-trip time between the reader and the tag. In this paper, we consider a modification of these protocols using `error state' which stands for the number of response bit errors that have already occurred. We set a maximal error number to prevent adversary from malicious queries, we also apply a punishment mechanism for error responding, which to my best knowledge is proposed at the first time in distance bounding protocols, if the tag sends one error bit, it should respond one more challenge bit to successfully finish the protocol. By using error state and punishment mechanism, the success probability for an adversary to access to the system decreases. Finally, we use the Hancke and Kuhn's protocol as a comparison, to show the improvements achieved when different cases are analyzed.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The BPSK modulation and demodulation algorithm is designed and implemented of software defined radio (SDR) transceiver system in this paper. The paper uses a Costas loop to achieve carrier synchronization when the BPSK demodulator is designed. And the loop realize the purpose of phase detection using the more accurate and fewer hardware resources occupy arc tangent phase detector. Firstly, the BPSK modulation and demodulation algorithm is simulated on the plat of MATLAB, in order to prove the feasibility and superiority of the proposed design. Then the design is implemented and tested using field programmable gate arrays (FPGA). The test result indicates the system has strong versatility, interchangeability and portability. It overcomes the system shortcomings of traditional analog circuit, such as circuit complex, bulky, high cost and poor stability and so on. Therefore, the system has a high value.
{"title":"Design and Implementation of the BPSK Modem Based on Software Defined Radio","authors":"Zhongjun Zhao, Yongliang Shen, Yuan Bai","doi":"10.1109/IMCCC.2011.198","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.198","url":null,"abstract":"The BPSK modulation and demodulation algorithm is designed and implemented of software defined radio (SDR) transceiver system in this paper. The paper uses a Costas loop to achieve carrier synchronization when the BPSK demodulator is designed. And the loop realize the purpose of phase detection using the more accurate and fewer hardware resources occupy arc tangent phase detector. Firstly, the BPSK modulation and demodulation algorithm is simulated on the plat of MATLAB, in order to prove the feasibility and superiority of the proposed design. Then the design is implemented and tested using field programmable gate arrays (FPGA). The test result indicates the system has strong versatility, interchangeability and portability. It overcomes the system shortcomings of traditional analog circuit, such as circuit complex, bulky, high cost and poor stability and so on. Therefore, the system has a high value.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The paper is based on chaos theory, the system is described with differential inclusion method for the over-potontial relay a non-smooth system. The discontinuous special points are disposed, and the dynamical character is pledged. The analytic arithmetic is given to relay system with hysterresis, combined system parameter with chaos character affect, changing process of system is analyzed. The restrain relation between chaos system parameter is been studied. The system is simulated, the result shows that method is feasible and right.
{"title":"Research on Chaos Character for a Classification Raley System","authors":"Runsheng Yang, C. Hou","doi":"10.1109/IMCCC.2011.230","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.230","url":null,"abstract":"The paper is based on chaos theory, the system is described with differential inclusion method for the over-potontial relay a non-smooth system. The discontinuous special points are disposed, and the dynamical character is pledged. The analytic arithmetic is given to relay system with hysterresis, combined system parameter with chaos character affect, changing process of system is analyzed. The restrain relation between chaos system parameter is been studied. The system is simulated, the result shows that method is feasible and right.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The primary goal of current routing protocols for wireless sensor network (WSN) is to improve the energy efficiency while guarantee the required communication. Therefore, Most protocols do not take security into consideration. As a result, many potential security problems exist in such protocols that they may be vulnerable to various attacks and cannot be applied to many fields. An illustration of various attacks on routing protocols is presented first. Then the current research status of security routing protocol was summarized. Finally, possible directions in future research were presented.
{"title":"A Study of Security Routing Protocol for Wireless Sensor Network","authors":"Jiang Du, Jingyi Li","doi":"10.1109/IMCCC.2011.68","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.68","url":null,"abstract":"The primary goal of current routing protocols for wireless sensor network (WSN) is to improve the energy efficiency while guarantee the required communication. Therefore, Most protocols do not take security into consideration. As a result, many potential security problems exist in such protocols that they may be vulnerable to various attacks and cannot be applied to many fields. An illustration of various attacks on routing protocols is presented first. Then the current research status of security routing protocol was summarized. Finally, possible directions in future research were presented.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Algebraic Side-Channel Attack (ASCA) is a very generic and effective cryptanalysis technique combined Algebraic Cryptanalysis and Side-Channel Attack (SCA). How to apply new solver and utilize the leakage information maximizly are hot spots. In this paper, we introduce a new SAT solver-CryptoMiniSAT into ASCA, and propose an effective method to represent Hamming weight leakages into Boolean equations. Experiment results demonstrate that: CryptoMiniSAT solver has better performance than traditional Minis at Solver, the proposed Hamming weight representing method can make full use of the leakages, only 9 rounds randomly leakages are enough to obtain the full key of PRESENT-80 with unknown plaintext/cipher text, which is better than 26 rounds of previous works.
{"title":"CryptoMiniSAT Solver Based Algebraic Side-Channel Attack on PRESENT","authors":"Wu Kehui, Wang Tao, Zhao Xinjie, L. Huiying","doi":"10.1109/IMCCC.2011.145","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.145","url":null,"abstract":"Algebraic Side-Channel Attack (ASCA) is a very generic and effective cryptanalysis technique combined Algebraic Cryptanalysis and Side-Channel Attack (SCA). How to apply new solver and utilize the leakage information maximizly are hot spots. In this paper, we introduce a new SAT solver-CryptoMiniSAT into ASCA, and propose an effective method to represent Hamming weight leakages into Boolean equations. Experiment results demonstrate that: CryptoMiniSAT solver has better performance than traditional Minis at Solver, the proposed Hamming weight representing method can make full use of the leakages, only 9 rounds randomly leakages are enough to obtain the full key of PRESENT-80 with unknown plaintext/cipher text, which is better than 26 rounds of previous works.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we present VLSP, a Vehicular Location based Service with Privacy grantees. In VLSP, we assume the service provider is untrusted and users do not have pre-established social relationships with each other, we use standard cryptographic primitives, Broadcast Encryption (BE) and Attribute-based Encryption (ABE) to provide privacy guarantees. By using VLSP, we are able to protect users' location privacy in vehicular location sharing social services. VLSP is mainly composed with three parts: OBUs, RSUs, and vehicular location sharing service provider. RSUs use RFID readers to communicate with users' OBUs to log users' locations, and uses standard cryptographic primitives and BE-based mechanism to establish trust and protect privacy for users who share their location information. We leverage ABE-based mechanism on service provider to control who can see users' location information. We evaluate VLSP using protocol, security and system implementation analysis, and find VLSP is both privacy-preserving and feasible.
{"title":"VLSP: Enabling Location Privacy in Vehicular Location Based Services","authors":"Tao Yang, Cong Tang, Liangwen Yu, Wei Xin, Yong Deng, Jian-bin Hu, Zhong Chen","doi":"10.1109/IMCCC.2011.121","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.121","url":null,"abstract":"In this paper, we present VLSP, a Vehicular Location based Service with Privacy grantees. In VLSP, we assume the service provider is untrusted and users do not have pre-established social relationships with each other, we use standard cryptographic primitives, Broadcast Encryption (BE) and Attribute-based Encryption (ABE) to provide privacy guarantees. By using VLSP, we are able to protect users' location privacy in vehicular location sharing social services. VLSP is mainly composed with three parts: OBUs, RSUs, and vehicular location sharing service provider. RSUs use RFID readers to communicate with users' OBUs to log users' locations, and uses standard cryptographic primitives and BE-based mechanism to establish trust and protect privacy for users who share their location information. We leverage ABE-based mechanism on service provider to control who can see users' location information. We evaluate VLSP using protocol, security and system implementation analysis, and find VLSP is both privacy-preserving and feasible.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"4 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong Wenjie, Zhang Chunxia, Z. Chunmei, Zhang Jun, Lin Jin-yong
This paper brings out the architecture of an embedded Ethernet remote monitoring system, gives the hardware implement method on data collector based on TMS320C6747 and RTL8306. On the basis of TI's NDK, we achieve the data communication between data collector and remote sensors. Sensors in this monitoring system have auto-enumeration function, by shaking with data collector, the monitoring system can auto-recognize the sensor accessing into the system, then configure it and manage it. Monitoring center computer accesses data stored in data collector via USB or PCI, then processes the data, and achieves the monitoring to surveyed environment.
{"title":"Embedded Ethernet Remote Monitoring System Based on DSP","authors":"Dong Wenjie, Zhang Chunxia, Z. Chunmei, Zhang Jun, Lin Jin-yong","doi":"10.1109/IMCCC.2011.163","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.163","url":null,"abstract":"This paper brings out the architecture of an embedded Ethernet remote monitoring system, gives the hardware implement method on data collector based on TMS320C6747 and RTL8306. On the basis of TI's NDK, we achieve the data communication between data collector and remote sensors. Sensors in this monitoring system have auto-enumeration function, by shaking with data collector, the monitoring system can auto-recognize the sensor accessing into the system, then configure it and manage it. Monitoring center computer accesses data stored in data collector via USB or PCI, then processes the data, and achieves the monitoring to surveyed environment.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125983619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed to show the correctness of the proposed methods.
{"title":"Dynamic Taint Analysis with Control Flow Graph for Vulnerability Analysis","authors":"Z. Chen, Xiao Juan Wang, X. Zhang","doi":"10.1109/IMCCC.2011.66","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.66","url":null,"abstract":"In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed to show the correctness of the proposed methods.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}