The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Group key is used to encrypt group data in group communication. Multicast key distribution scheme updates and distributes group keys safely when a member joins or leaves the group. However it has problems when arbitrary group members want to build a dynamic conference, because traditional distribution scheme uses group controller to manage the work. In fact, a n-member group will have 2n − n − 1 possible...
Recent years, Vehicular ad hoc Network (VANET) attracts tremendous attention due to its broad application prospects. However, channel fading, frangible link, unstable network topology caused by vehicles' high mobility and strict requirements to the quality of service (QoS) have become major challenges of VANET. Many algorithms have been proposed to ensure a stable network topology and it has been...
Advanced Persistent Threat (APT) poses a serious threat to cyber security, and its unique high unpredictability, deep concealment and grave harmfulness make the traditional network monitoring technology facing unprecedented challenges in the background of massive and complicated network traffic. This paper aimed for the urgent demand of APT network monitoring. Relying on the rapid development of big...
User authentication is an important security mechanism that allows mobile users to be granted access to roaming service offered by the foreign agent with assistance of the home agent in mobile networks. While security-related issues have been well studied, how to preserve user privacy in this type of protocols still remains an open problem. In this paper, we revisit the privacy-preserving two-factor...
When assigning personal keys, stateful multicast key distribution (MKD) protocols usually rely on some type of dynamic group access structure which helps achieve a better tradeoff among storage, communication, and computation overheads. However, there exist some stateful MKD protocols whose personal key assignments are based on two static group access structures called Dual Hash Chain (DHC) and Binary...
Due to the inherent vulnerabilities of the Internet, security and privacy issues should be considered and addressed before the Internet of Things is widely deployed. This paper mainly analyzes existing authentication and access control methods, and then, it designs a feasible one for the Internet of Things.
The secure authentication and transaction is one of the important parts in networking security. Because of the security flaws of some existing schemes, this paper proposes a secure authentication and transaction protocol based on digital certificates and dynamic password. The protocol not only can realize the mutual authentication of the client and server, but also can achieve secure authentication...
A feasible architectural framework for the smart grid in home areas is provided based on the latest NIST (National Institute of Standards and Technology, U.S.) smart grid interoperability standards (release 1.0). In this paper, we propose an accountable communication protocol using this architecture with certain reasonable assumptions. Analysis results indicate that our design makes all power loads...
Security verification and performance analysis are both crucial aspects for designing effective and efficient authentication protocols. However, in most authentication protocol design practice, two independent models are often adopted for individual security verification and performance analysis, which could not guarantee that performance improvements taking no harm to its security functionalities...
This paper presents the ASIC design and implementation of digital baseband system for UHF RFID reader based on EPC Global C1G2 /ISO 18000-6c protocol. The digital baseband system consists of two parts: transmitter and receiver, which inculing encoding module, decoding module, channel filers, CRC chenk module, control module and a SPI module. It is described in verilog HDL in RTL level, with Design...
Performance improvements are quite significant for a complex protocol, such as BitTorrent protocol, but should take no harm to its functionality correctness as an inevitable precondition. In current performance analysis studies, various formal models are usually utilized to perform corresponding evaluations. However, most of those models do not support specifying and verifying the functionality for...
It is very risky to improve the performance of network protocols without the assurance of its functional correctness, especially for protocols that with complicated and concurrent behaviors. However, in most of current model based protocol engineering projects, two independent models are adopted for individual functional verification and performance analysis, which could not guarantee the performance...
IPv6 embraces various good features from the security perspective, but the improvements also bring us some new challenges for web content filtering. This paper presents a new framework of web content filtering in IPv6, which is helpful to purifying network environment. In this framework, using EM (Expectation maximization) algorithm, the active drift and self-learning mechanisms are proposed. Based...
Hierarchical mobile management is designed to improve the performance of original Mobile IPv6 protocol. However, such improvements also introduce more complicated protocol behaviors. In order to effectively analyze the functionalities of this protocol, formal methods should be adopted. In this paper, a Colored Petri Nets (CPN) based formal model of Hierarchical Mobile IPv6 (HMIPv6) protocol is proposed...
In this paper, we study the relay assignment problem in cooperative wireless networks with self-interested nodes. Such systems should be organized from the point of view of efficiency, stable and providing consistent incentives to all nodes. We propose a cooperation mechanism which includes the cooperative relationship formation stage and cooperation maintenance stage. The cooperative relationship...
In wireless systems where half duplex transceivers are employed, most existing practical cooperative protocols achieve a spectral efficiency of 0.5 symbols per channel use (pcu). Recently a decode-and-forward protocol was developed to achieve a spectral efficiency of 2/3 symbols pcu. But there is no practical amplify-and-forward (AF) protocol that can achieve a spectral efficiency higher than 0.5...
The distributed relay selection protocol recently developed by Bletsas et. al. provides a simple and practical mean of achieving cooperative diversity. However, for cooperative networks where relays employ the decode-and- forward (DF) method to send information, it cannot achieve full diversity unless each relay knows whether it decodes correctly or not. Moreover, the criterion used to select the...
An d the environmented image acquirement and the bluetooth transmission system are studied and designed. We take use of an embedded S3C2410 CP for bluetooth device running is built. The transmissionembeddU as the core that means embedded Linux as the OS and add some components such as a usb bluetooth dapter and a usb camera. The library and the utils are compiled, an of images got from usb camera...
In this paper, we address the incentive-based relay-selection problem over multi-source and multi-relay wireless networks. A two-side market game approach is employed to jointly consider the benefits of all sources and relays. The equilibrium concept in such games is called core. The outcomes in the core of the game cannot be improved upon by any subset of players. These outcomes correspond exactly...
The random oracle model of cryptography is researched. According to the analysis of communication model and the anti-extracting of information hiding, the random oracle model of provable security is applied to the research on information hiding against extracting, an anti-extracting random oracle mode of information hiding is built and a conclusion that the anti-extracting depends on the security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.