The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this mobile era, people have become increasingly dependent on smart devices. Smartphones have emerged as the most popular smart computing device. However, numerous security issues affecting smartphones have been exposed. In recent years, mobile network traffic based approaches have been proposed to identify malware malicious behaviors, but these approaches, especially the approaches using machine...
In order to meet the proliferating demands in wireless local area networks (WLANs), the multi-channel media access control (MMAC) technology has attracted a considerable attention to exploit the increasingly scarce spectrum resources more efficiently. This paper proposes a novel multi-channel MAC to resolve the congestion on the control channel, named as Mi-MMAC, by multiplexing the control-radio...
In this paper we investigate the s groups consensus problem by giving a kind of new protocol in directed networks with fixed topology. The sufficient conditions which group consensus can reach under the given protocol are obtained and the consensus process could be controlled because of the newly added feedback controllers in our protocol. Then the dynamic performance of our protocol is discussed...
In this paper, we discuss the consensus of discrete-time multi-agent system. Based on the network topology, consensus protocol in discrete-time with dynamic step-size is designed. Conventional algorithms need man made step-size generally, having a great non-natural impact. The new algorithm employs a self-adaptive dynamic step-size based on the network topology, with little non-natural factor, and...
Direct Anonymous Attestation (DAA) is a signature scheme that provides a balance between user privacy and authentication in a reasonable way. The first RSA-based DAA is proposed in 2004, since then several ECC-based DAA schemes are proposed to achieve better performance. To analyze DAA schemes from a practical point of view, it is necessary to consider implementation-related issues, such as elliptic...
When assigning personal keys, stateful multicast key distribution (MKD) protocols usually rely on some type of dynamic group access structure which helps achieve a better tradeoff among storage, communication, and computation overheads. However, there exist some stateful MKD protocols whose personal key assignments are based on two static group access structures called Dual Hash Chain (DHC) and Binary...
In this paper, a novel biometric authentication scheme is proposed, which combines zero-knowledge proof, - protocols and bit commitment scheme. The remote server compares biometric template using committed values, this can keep privacy of user's biometrics. To the best knowledge of us, this is the first scheme which uses - protocols as a basic tool to implement biometric authentication. Compared with...
Web Service is a popular technology for the development of distributed system, and its security becomes more and more important. The security of Web Service depends on the security of Simple Object Access Protocol (SOAP) message crucially. In this paper, not only the security extension of SOAP protocol is proposed, but also the architecture, syntax rule, work theory and the implementation method of...
IP prefix hijacking is one of the top threats in the cloud computing Internets. Based on cryptography, many schemes for preventing prefix hijacks have been proposed. Securing binding between IP prefix and its owner underlies these schemes. We believe that a scheme for securing this binding should try to satisfy these seven critical requirements: no key escrow, no other secure channel, defending against...
In order to realize remote debugging and diagnostics to the motion controller with Ethernet, equipment with SIMOTION motion control system is applied. The application of virtual private network technology, combined with SCOUT tool, a remote control through Internet is used. This paper introduces the hardware and software of the motion control system, the structure and composition of remote control...
In this paper, a new biometric password multi-server authentication scheme with smart card is proposed. To the best knowledge of us, this is the first biometric password authentication scheme which can be used in the multi-server environment and the distributed network. This scheme combines the advantages of password and biometrics, which can strengthen the protocol's securities and has properties...
Traditional protocols for password-based authentication assume a single server which stores all the information (e.g., the password) necessary to authenticate a user. Unfortunately, there is a fatal limitation of this approach (assuming low-entropy passwords are used), which the users password exposed if this server is compromised by an adversary. When an attacker obtains the information stored on...
The performance of industrial communication networks are a key element for developing high-speed distributed data acquisition systems. This paper presents a practical networked data acquisition system who implements distributed data acquisition linking field sensors to PC through EtherCAT bus. we evaluate the performance of the designed networked data acquisition system and provide the verified results...
SIP flow management should respect the specific characteristics of SIP protocol applied in multimedia or telecom services for meeting stringent quality of service (QoS) requirement. The specific characteristics include explicit session structure for correlating a series of SIP messages, stringent response time required by real-time applications, extra overhead imposed by SIP message retransmission,...
Clustering is an effective topology control approach in wireless sensor networks, which can prolong the lifetime and also improve the capability of networks. The main difference between different clustering protocols is the way in which to elect the CH (cluster head). This paper introduced several different phases in a round of a clustering protocol and how to determine the number of the clusters,...
With the promotion of industry community, wireless sensor network (WSN) has been widely applied to many fields. In this paper, current research status and possible development trend of application-oriented wireless sensor network (AOWSN) are introduced firstly. Second, we analyze and compare the short distance wireless communication protocols that can be used in WSN such as ZigBee, Wibree, Rubee,...
Many application-specific wireless sensor network (WSN) systems require small size and low power features due to their limited resources, and their use in distributed, wireless environments. In this paper, we present a light-weight distributed algorithm for line-crossing recognition, together with its analysis, implementation, and experimental evaluation within a prototype wireless sensor network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.