Applied Mechanics and Materials Vols. 631-632

Paper Title Page

Abstract: With the extensively applying of Wireless Sensor Networks (WSN), its' security drew more and more attention. In all the security issues in WSN, session key is fundamental one with great challenge. Due to the constraints of limited hardware resources and computational capabilities, use asymmetric encryption mechanisms in session key are not suitable for WSN. And there are usually a puzzle for existing symmetric encryption mechanisms that they produced heavy communication cost. In this paper, we presented a session key transmission scheme based on an algorithm of Data Partitioning with Coding, named DPC. By using of non-perfect secret sharing, we optimized the communication costs significantly and keep the security in high level. The analysis and simulations prove that our scheme has good performance.
882
Abstract: This paper describes the design ideas of intelligent management system for open labs based on wireless transmission. The student legal identity authentication is completed using IC cards and the equipments power supply is controlled using wireless digital transceiver chip nRF401.The system hardware is simple, no complex wiring, easy to use. It can be used in any laboratory of electronic equipment, has the very good practicability and wide application prospects.
889
Abstract: In this paper, a novel proxy re-encryption (PRE) scheme with keyword search is proposed, where only the ciphertext containing the keyword set by the delegator can be transformed by the semi-trusted proxy and then decrypted by delegatee. In the proposed scheme, the semi-trusted proxy can convert the ciphertext encrypted under the delegator’s public key into the ciphertext encrypted under the delegatee’s public key. In addition, only the delegatee’s email gateway with a trapdoor can test whether or not a given cipheretext containing some keyword, but can learn nothing else about the sensitive data of email. We proposed an identity-based proxy re-encryption with keyword search scheme, where the delegator and the delegatee extract keys from a trusted party called the key generator center (KGC), who generates public-private key pair for delegator and delegatee based on their identities. Meanwhile, the identity-based proxy re-encryption with keyword search scheme satisfies the properties of PRE including unidirectionality, multi-use and transparency. Additionally, the proposed scheme is efficient in terms of both computation and communication, and can realize security privacy preserving in cloud computing environments.
897
Abstract: By analyzing a variety of computer network architectures, we can find that researchers establish different computer network models from their different starting points and get different computer network architectures by different modularization methods. We establish a well modularized non-layered computer network architecture. This paper compares it with the layered architecture and obtains a conclusion that it is superior to the layered architecture. We have developed two framework prototypes of it. In the one of them we develop some application softwares of TCP/IP, including E-mail, FTP, Web and standard IP telephone, which have been tested by the third-party. It could show the accuracy and easily implemented property of this architecture.
902
Abstract: Recently, many mobile user authentication schemes with user anonymity for wireless communications have been proposed. In 2012, Li and Lee proposed a novel user authentication and privacy preserving scheme with smart cards for wireless communications. In 2013, Jeon et al. proposed an improved user authentication scheme, and claimed their scheme achieves user anonymity and more efficient. On the basis of their work, we put forward a new user authentication scheme using elliptic curve cryptography with user anonymity for wireless communications. The security and performance analysis show that the new scheme is more secure and efficient for wireless communications.
906
Abstract: This paper discussed the current variety of effective multi-channel self-organizing network channel allocation techniques and proposed a combination of two access methods CSMA and TDMA. By using broadband wireless self-organizing network channel and OPNET simulation tools,the methods can build self-organizing network simulation scenarios that proposed network protocols performance analysis. This self-organizing network channel allocation can effectively transmit information and avoid the conflict of different communication node distribution of the corresponding channel.
910
Abstract: An intrusion detection system (IDS) using agent technology was designed for wireless sensor network of clustering structure. An IDS agent which includes two different agents was deployed in every node of network. One is local detection agent and another is global detection agent. They complete different tasks of detection. Based on Bluetooth communication technology, Bluetooth scattering network formation algorithm TPSF was employed to construct the cluster layer of sensor network and to finish task assignment of different agents. The TPSF algorithm was improved by limiting the role of nodes to lighten the complexity of nodes, so the IDS agents can work effectively and the safety coefficient of nodes is improved.
914
Abstract: At present, MD5 algorithm is commonly used in the file transfer system to conduct the tests of file integrity, but when a file is too large, it will take a long time to generate MD5 code for the whole file, with the result of reducing the transmission efficiency of the file. Based on this conduction, a fast algorithm of file integrity detection is provided, which can generate MD5 code with the file size and some random content of the file. Although the algorithm cannot test files roundly, it is integrated into the file transfer system. The test results show that this algorithm can detect the file integrity faster, and when the file is damaged or tampered with, the probability of detecting changes of the file content is higher than the theoretical value. The algorithm has great value in engineering applications.
918
Abstract: This paper presents an application-layer attack detection method based on hidden semi-markov models. In this method, the keywords of an application-layer protocol and their inter-arrival times are used as the observations, a hidden semi-markov model is used to describe the application-layer behaviors of a normal user who is using some application-layer protocol. This method is also based anomaly detection. In theory, application-layer anomaly detection can identify the known, unknown and novel attacks happened on application-layer. The experimental results show that this method can identify several application-layer attacks, and has high detection accuracy and low false positive ratio.
923
Abstract: ROSI (Return On Security Investment) has attracted a great deal of attention in recent years. By inheriting Gordon and Loeb 2002 security breach probability function, we present an adaptive economics model of investment in information security integrating dynamic characteristics of outside threat probability and detective mechanism, and deduce some guidelines for optimal investment amount.
928

Showing 181 to 190 of 295 Paper Titles