Search all articles

+ Advanced search
Search articles within:
13 articles

An Immune-inspired Adaptive Automated Intrusion Response System Model

Ling-xi Peng, Dong-qing Xie, Ying Gao, Wen-bin Chen, Fu-fang Li, Wu Wen, Jue Wu
Pages: 808 - 815
An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the...

A Novel Location-aided Routing Algorithm for Mobile Ad Hoc Network with a Small Expenditure on Route-Discovery

Hong Peng, Shi-yuan Fu, Li-min Meng, Xia Liu
Pages: 816 - 823
The location-aided routing algorithm adopts the flooding mechanism to transmit route control packet in mobile Ad Hoc networks. Such mechanism not only affects nodes which do not join the final route, but also needs a large number of unnecessary deliveries of control packets. To address this issue, we...

A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

Liu Ya-li, Qin Xiao-lin, Li Bo-han, Liu Liang
Pages: 824 - 833
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message...

Synchronization of Time-Delay Chaotic System in Presence of Noise

Min Lei, Hai-peng Peng, Chun-yu Yang, Li-xiang Li
Pages: 834 - 840
Chaotic synchronization, as a key technique of chaotic secure communication, has received much attention in recent years. This paper proposes a nonlinear synchronization scheme for the time-delay chaotic system in the presence of noise. In this scheme, an integrator is introduced to suppress the influence...

Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments

Hai-yang Hu, Zhong-jin Li, Li-guo Huang, Hua Hu
Pages: 841 - 850
A Peer-to-Peer (P2P) system relies on the cooperation of the peers and the contributions of their resources. To motivate autonomous peers share their resources, the system needs to support effective resource allocation strategies with respect to peers’ task priorities, and their personal information...

A Credibility-based Congestion Control Scheme and its Performance Evaluation

Jin-xin Zhang, Man-gui Liang, Shu-juan Wang
Pages: 851 - 859
A congestion control scheme based on credibility is proposed. In this scheme, the whole network is divided into several independent domains, and each domain contains a congestion control server (CCS) and several control modules (CM). The CCS is used to collect credit information and make punishment decisions...

Safety and Availability Checking for User Authorization Queries in RBAC

Jian-feng Lu, Jian-min Han, Wei Chen, Jin-Wei Hu
Pages: 860 - 867
This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable...

Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation

Ming Wan, Ying Liu, Jian-qiang Tang, Hong-ke Zhang, Si-yu Lin
Pages: 868 - 877
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier...

Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks

Liang-yu Luan, Ying-fang Fu, Peng Xiao, Ling-xi Peng
Pages: 878 - 886
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting,...

A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

Qian Xiao, Kang-feng Zheng, Shou-shan Luo, Xu Cui
Pages: 887 - 895
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network coding is designed. DPP&PP makes use of a new...

Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network

Wei Li, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, Qing-ju Wang
Pages: 896 - 904
The LED is a new lightweight cipher, which was published in CHES 2011. This cipher could be applied in the Wireless Sensor Network to provide security. On the basis of the single byte-oriented fault model, we propose a differential fault analysis on the LED cipher. The attack could recover its 64-bit...

A Complex Estimation Function based on Community Reputation for On-line Transaction Systems

Yu Yang, Shang-bao Gong, Yu-cui Guo, Min Lei, Yan Yang
Pages: 905 - 912
A reputation management system is crucial in online transaction systems, in which a reputation function is its central component. We propose a generalized set-theoretic reputation function in this paper, which can be configured to meet various assessment requirements of a wide range of reputation scenarios...