The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The separated control and data planes in software-defined networking (SDN) with high programmability introduce a more flexible way to manage and control network traffic. However, SDN will experience long packet delay and high packet loss rate when the communication link between two planes is jammed by SDN-aimed DoS attacks with massive table-miss packets. In this paper, we propose FloodDefender, an...
To achieve high protocol efficiency is one of the primary goals in designing routing protocols for mobile ad hoc networks (MANETs), because high protocol efficiency implies low additional control overhead and power cost, which are two key issues in MANETs due to the inherited bandwidth and power-constrained characteristic. In this paper, an AODV improvement protocol with the Hello message mechanism...
Password-based authentication mechanism is used widely for its simplicity. However, due to the rapidly growth of computation power nowadays, low-entropy passwords and data protected by such passwords become more and more easy to attack. For against offline dictionary attacks with memorizable passwords, one may use interactive protocols, making offline guessing impossible. Then only online guessing,...
Hardware Trojan has emerged as an impending security threat to many critical systems. However, detecting hardware Trojan is extremely difficult due to Trojans are always triggered by rare events. Side-channel signal analysis is effective in detecting Trojan but facing the challenge with process variation and environment noise in nanotechnology. Moreover, side-channel approaches that analyze global...
Trusted Computing contains a set of mechanisms to construct trusted environment in mobile terminal. But these mechanisms and trusted environment still stop in the stage of technical description which lacks the supporting of strictly formal proof and model's description. The existing research about trusted model diverges from reality and is short of flexibility and implementation. This paper proposes...
Hardware Trojan (HT) has emerged as a serious security threat to many critical systems. HT detection techniques are badly needed to ensure trust in hardware systems. In related works, only a fixed large number of random patterns are applied, with no regard to the pattern's effect to HT detection result. The variations in target signal caused by different sets of input vectors are not addressed. There...
The paper proposes a dual cancellable fingerprint template method based on BioHashing and Fuzzy Commitment. In the new method, firstly, Finger Code extracted from fingerprint image is noninvertibly mapped into a string of binary bits by BioHashing, and then the bit string is bound with a key by Fuzzy Commitment to generate the final template data stored in the database. It can overcome threat of replay...
Remote forensics is one important development direction of modern computer forensics. Interception and filtering operations are the key technologies for remote forensics, and still facing technical challenges. This article will applied mini-filter installable file system (Minifilter) technology to the remote forensics, and propose a remote forensics system using Minifilter to intercept and filter...
Whether the most important features can be extracted to reduce the dimension of the features or not is crucial to improving the efficiency and performance of the Intrusion Detection System (IDS). In this paper, an intrusion detection feature extraction method based on the complex network theory and the MST algorithm is proposed. The method takes the features of the network connections as nodes of...
The paper proposes a method of extracting a rotation-translation-invariant texture feature from minutiae neighborhood to help matching fingerprint minutiae. The texture feature is extracted by complex filter, and represents pattern of orientation image around minutiae, and is used as one element feature of minutiae. Based on the texture feature, a new and simple texture matching distance differed...
Mobile services are pervasive in wireless network and are one of the crucial components needed for various applications and services. Security problems related to mobile phones directly influence credibility of these applications and services. Trusted Computing technology provides powerful support for the solution to security issues of mobile device in mobile network. This paper proposes a Holistic...
The WAI (WLAN Authentication Infrastructure), which is composed of mutual certificate authentication and key agreement, is the authentication protocol in the Chinese Wireless LAN standard. In this paper, we analyze the WAI protocol using a finite-state verification tool Mur?? and find that the authentication protocol can't resist the denial of service attack. Attackers can forge the messages to produce...
The WAI (WLAN authentication infrastructure), is the authentication protocol in the Chinese Wireless LAN standard. This protocol, similar as 802.11i, adopts port-based access control and involves three entities in the authentication process. The three entities named in Chinese standard are ASUE (wireless device), AE (access point) and ASE (authentication server). The WAI is composed of a mutual public...
The authenticated encryption schemes can be used to provides integration, authentication, and non-repudiation for the signing message while keeping the message secret from the public. In this paper, we propose a new (t, n) threshold proxy authenticated encryption scheme, in which at least t out of n proxy signers delegated by the original signer can sign messages on behalf of the original signer....
The problem of key management in ad hoc networks was analyzed in this paper. Key management, however, can reveal information about the dynamics of ad hoc network membership, such as the group size and the number of joining and leaving users. Thus, only legitimate members have access to the messages. Once any member in the ad hoc network was going to join or leave the group, the group key would be...
The paper presents a novel method for demodulating the QAM signals basing on adaptive filtering. The commonly used least mean square (LMS) error adaptive filtering algorithm is employed for studying the demodulating procedure and the performance of the novel adaptive QAM demodulation. The novel adaptive QAM demodulation does not need the adaptive filter completing convergence. Therefore, the sampling...
This paper points out the factor that affects the VoIP ( voice over IP ) capacity under the PMP ( point-to-multipoint) mode in the IEEE 802.16 system. By theoretically analyzing the statistical characteristics of VoIP data streams, we propose a new bandwidth allocation algorithm and implement it based on the adaptive linear prediction, which can remarkably reduce the bandwidth waste resulted from...
A high-order analog Hopfield neural network is incorporated to get optimal or near-optimal solutions to a kind of nonlinear programming problems. By employing the operational transconductance amplifier (OTA) and MOS transistors, the practical analog implementation of the neural network can be achieved. The convergence characteristics are demonstrated by computer simulations and two sufficient conditions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.