The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasing of mobile devices, Device-to-Device(D2D) communication is considered as a promising technology for achieving direct communication of devices. But the security issues still remain to be solved. In this paper, We utilize D2D communication between UEs in proximity to share epidemic media contents. We propose a Secure Content Sharing Protocol(SCSP) that combine with the credibility...
Increasingly sophisticated code obfuscation techniques are quickly adopted by malware developers to escape from malware detection and to thwart the reverse engineering effort of security analysts. State-of-the-art de-obfuscation approaches rely on dynamic analysis, but face the challenge of low code coverage as not all software execution paths and behavior will be exposed at specific profiling runs...
Insertion of scan chains, as the most common DFT technique, provides a powerful way for the structural testing of integrated circuits (IC). However, it can be easily misused by unauthorized parties to acquire critical design information. Scan-based attacks are one kind of side channel attacks that reveal the comprehensive information of IC design noninvasively. Reports have shown many successful scan...
UHF-RFID (Ultra High Frequency Radio Frequency Identification), with the feature of reliable, accurate and fast, has been used in the vehicular traffic management system to relief the urban traffic congestion, air pollution etc. To strengthen the system security and improve the performance of the tag, a secure, high performance UHF-RFID tag is designed and implemented in this paper. Authentication...
In this paper, we study the secrecy performance of a cellular network, where a device-to-device (D2D) communication shares the spectral resources with a multi-antenna base station (BS). By assuming known the channel state information (CSI) of the legitimate user and using the maximal ratio transmission (MRT) at the BS, we first derive a closed-form expression of the ergodic secrecy capacity (ESC)...
This paper proposes a 4-layer device virtualization system architecture based on multi peer nodes. First, the different layers of deployment and the operation processes of the system are discussed, then the resource management and the information flow are described. Finally, the interface and task assignment of the proposed system is discussed using experiments and the effectiveness and stability...
After wormhole attacks the routing mechanism of wireless sensor network (WSN) is damaged, then the hop count and distance between nodes cannot be well matched, so that the WSN becomes the anisotropic sensor network, resulting in security treats for WSN. Considering that wormhole attacks can cause the changing of node connectivity, through the theoretical analysis and derivation, the paper has proposed...
In this paper, we investigate the physical layer security of multiple-input single-output single-antenna eavesdropper relaying networks with imperfect channel state information. Different from traditional strategies in relay systems, which would halt the communication if the relay could not decode the signal successfully, we propose a robust secure transmission strategy which switches between cooperative...
We investigate the physical layer security in non-regenerative untrusted relay networks, where the relay is a potential eavesdropper despite its cooperatively relaying the information. The current research and development of untrusted relay is often based on the assumption of perfect channel knowledge or the capability of variable-rate transmissions which is decided by instantaneous channel state...
We investigate physical-layer security (PLS) for multi-antenna and multi-relay networks with transmit beamforming and relay selection under feedback delay. The connection outage probability (COP) and secrecy outage probability (SOP) are derived to evaluate the reliability and security. Besides, we introduce a novel definition of the reliable-and-secure probability (RSP) to combat the correlation between...
In this paper, we investigate the problem of jointly designing optimum linear precoder and decoder with secrecy constraints, where two legitimate parties communicate in the presence of an eavesdropper over multiple-input multiple-output (MIMO) Gaussian channels. In particular, we focus on optimizing the linear transceiver to guarantee a certain quality of service (QoS) level for the legitimate receiver...
A Transient Stability Analysis & Control (TSA&C) system has been developed and installed at PJM Interconnection several years ago, to perform on-line Dynamic Security Assessment (DSA) for the PJM power system. TSA&C was successfully applied to investigate an event that took place recently in the PJM system. This paper presents this application example to illustrate value and benefit of...
The existing network information security is mainly focused on the classification of gateway or network perimeter and so on. The lack of measures relevant to security threat from intranet hosts leads to information divulging with great loss. The intranet should be of high security. And it's a latent threat when the intranet users visit the website with illegal motives. In view of these, the security...
With China's constant perfection and development of securities market in public offer system, some professional researchers propose an implementation of grading management over sponsor representative. It is urgent to establish a scientific system to evaluate the overall quality of sponsor representative. This paper applies the method of fuzzy decision into the evaluation on sponsor representative...
Open source applications have flourished recent years. Meanwhile, security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, it is necessary to find automatic solutions. To address this problem we propose an approach that combines constraint-based analysis and model checking together. Model checking technology as a constraint solver...
According to access network requirement, ,fusion access network based IP is put forward, integrated NAS with IP SAN two mainstream access network model. This design of unified access network based storage server, access network topology and main function models improves the efficiency of data storage.
Discuss the insulation detect methods firstly, then, the principle of insulation detect system, how to detect it exactly and its' problems using in diving vehicle are detailed in the paper. The insulation detect system which is used to detect the watertight cables, connectors in the vehicle, is important to the unmanned diving vehicle security. The insulation detect system is adapt to any of the unmanned...
This paper introduces the characteristics of the wireless network, including self-organizing, dynamic topology, wireless communications and so on, which make the network nodes have limited energy, the same as processing power, storage capacity and communication capabilities, therefore, the efficient use of energy, maximizing its network cycle is the wireless sensor network's core issue. Network coding...
Protective measures for server invasions should not solely focus on events before an invasion occur. Recording and monitoring successful server invasions with endless streams of security mechanisms should be employed attentively to reduce the loss of data due to successful intrusion attacks on any system. Overlooking this will inevitably lead to detrimental data loss and stray away from the key issue...
Open source applications have flourished over recent years. Meanwhile security vulnerabilities in such applications have grown. Since manual code auditing is error-prone, time-consuming and costly, automatic solutions have become necessary. In this paper we address program vulnerabilities by static code analysis. First, we use flow-insensitive and interprocedural constraint-based analysis to extract...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.