The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we consider the privacy preserving problem in an agreement network under interception attacks. First, we introduce a consensus protocol with privacy preserving, where each node hides their initial states into a set of random sequences, and then injects the sequences into the process of consensus. Second, we assume that an attacker with limited power can intercept the data transmitted...
In this paper, we consider the privacy preserving problem of consensus protocol. First, we introduce a privacy preserving scheme, where each node produces and transmits a sequence of random values with their mean equaling to the node's initial state. We show that the network can reach average consensus with privacy preserving scheme, and provide a sufficient condition under which the initial state...
The replication and dissemination of multimedia data become increasingly convenient and efficient, so a lot of redundant multimedia data, especially image files, have been generated and stored on the Internet. Therefore, it is necessary to perform deduplication of images. However, the existing deduplication methods of regular files are hash-based, which cannot be applied to the deduplication of images...
In wireless sensor networks, the connectivity-based localization protocols are widely studied due to low cost and no requirement for special hardware. Many connectivity-based algorithms rely on distance estimation between nodes according to their hop count, which often yields large errors in anisotropic sensor network. In this paper, we propose a virtual potential field algorithm, in which the estimated...
The rapid adoption of cloud services has propelled network data sharing and storage. Client-side deduplication is proposed to minimize bandwidth and space needed to upload and store duplicated data. The existing solutions, however, were recently found to be vulnerable to attacks that enable the attackers to get full access to the entire file stored on the server after learning just a small piece of...
In this paper, we consider the problem of “evil twin” attacks in wireless local area networks (WLANs). An evil twin is essentially a rogue (phishing) Wi-Fi access point (AP) that looks like a legitimate one (with the same SSID). It is set up by an adversary, who can eavesdrop on wireless communications of users' Internet access. Existing evil twin detection solutions are mostly for wireless network...
Security protocols for wireless sensor network are designed to provide a variety of security services to secure communications in an unsafe network. It is demanded to verify whether an implementation of a security protocol indeed perform as described in the protocol. In practice, conformance testing is commonly employed to test whether an implementation is conformance with the protocol specification...
In this paper, we propose an object-oriented attack model to represent a protocol attack in WSN detailedly. The model describes multiple attributes of an attack, including its principle, impact, interdependent relationships with other attacks, etc. Then, on the basis of the attack model and the FSM description method, we present a security testing approach for WSN protocols, in order to evaluate the...
Computer notary system is an arbitrator or a notary public in the digital signature system, the process of arbitration, whether the signature is A communication sent to U, or U data are issued to B, after two and a signature encrypted password handling, you can ensure the security of communications. However, there is a signature of the arbitration serious problem: an intermediary can be replaced counterfeit...
A framework consisting of the Protocol Derivation System (PDS) and Protocol Composition Logic (PCL) has been recently proposed by Datta et al. for the design and analysis of secure composition of cryptographic protocols. However, the PDS in this proposed framework can only be used for the protocols of the Station-to-Station family, which are signature-based authenticated Diffie-Hellman key exchange...
Denial of Service (DoS) and distributed denial of service attack (DDoS) is now a common means of attack that affects seriously network security and the quality of online services. This paper analyzes the DoS (DDoS) attack prevention principles and gives an thorough analysis of existing prevention techniques, proposed to prevent DoS (DDoS) attacks in three ways: using a router DoS attack prevention,...
Reliability estimation of Ad Hoc network using analytical techniques usually requires many assumptions. Thus, analytical techniques are unable to consider many stochastic factors of the networks. Simulation has become a popular approach for evaluating the reliability of Ad Hoc network. IN this paper, we introduce simulation scenarios and investigate simulation model design for reliability estimation...
Because of enormous complexity of security protocols and lack of efficient security protocol modeling method, how to evaluate the WLAN security protocols poses unique and formidable challenges. To address this issue, a universal and extensible simulation platform for WLAN security protocols is proposed. First, the architecture of the platform is presented, which provides a unified interface to extend...
Measuring the reliability of ad hoc network with the approach of mathematic modeling usually needs a lot of assumptions, which not only cannot consider all kinds of reliability stochastic effect factors comprehensively, but also the computation is hard to proceed. Presently, measuring the reliability of ad hoc network with the approach of reliability simulation becomes current trend. This paper has...
This study proceeds with its development on the JADE platform, follows PASSI methodology in MAS analysis and design, and utilizes topic maps for e-learning (TM4L) to construct topic maps. During the service execution period, should a provided service failure occurs, the agent will automatically select a service with the higher evaluation value from the candidate service list to proceed with the service...
As mobile wireless networks increase in popularity and pervasiveness, seamless mobility is an important paradigm for uninterrupted services in ubiquitous network environments. In this paper, we propose a zero packet loss handoff mechanism for real-time streaming services, which is based on the SIP protocol cooperated with mobile agent, multicast, and buffering technique to overcome the affects of...
Since the globe is connected tightly by internet, to react the disruption of internet services efficiently and fairly is very important, especially for those real time transactions. However, there is a lack of literature about it. To our best knowledge, this paper is the first try to explore issues under such conditions. A framework, which consists of the traffic rerouting programming, the capacity...
Cooperative communications significantly improve the performance of wireless network through the help of relay nodes, while multiuser diversity is an inherent diversity in multiuser systems. In this paper, we present a framework to analyze the performance of multiuser diversity in the multiuser two-hop cooperative relay networks (TCRN). Based on this framework, we derive tight closed-form expressions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.