Advanced Materials Research Vols. 546-547

Paper Title Page

Abstract: The intended data-flow in a vulnerable program is subject to be subverted by attacks which exploit buffer overflows or format string vulnerabilities to write data to unintended location. In Mobile Telecommunication it is especially important on data safety. These attacks can be classified into two types: control-flow-attacks exploit buffer overflows or other vulnerabilities to overwrite a return address, a function pointer, or some other piece of control-data; non-control-data attacks exploit similar vulnerabilities to overwrite security critical data without subverting the intended control-flow in the program. The control-flow attacks are well studied and widely used, so there are several typical approaches to prevent them, which monitor the sequence of system calls emitted by the application being monitored and utilize control-flow information of the system calls for intrusion detection. However, the non-control-data attacks are rare for the reason that they rely on specific semantics of the target applications, and there are only few works that defend them to some extent. In order to prevent non-control-data attacks, we leverage dynamic taint technique to track the instruction level relationship between different system call arguments and construct taint graph which can represent behavior profile of a benign program in this paper..
1101
Abstract: Wireless sensor networks have been extensively deployed in the electric power systems for sensing, transmission and control, which provide more opportunities for wireless low power radios to operate. As the next generation electricity system, the smart grid should possess the capability to transmit reliable and real-time information to the control centers of the utilities. In order to solve the issues such as heterogeneous coexistence, spectrum scarcity, tremendous data processing and Security guarantees, revolutionary communication architecture is urgently demanded. In this paper, after analyzing the hierarchical structure of smart grid and illustrating the principle of WCSN in smart grids, we propose the security architecture of wireless sensor networks based on cognitive radio for smart grids, which can be used as a reference to design and develop the Wireless Cognitive Sensor Network (WCSN) security schemes in the electric power systems.
1107
Abstract: In this paper, a wireless local area network (WLAN) authentication scheme is proposed to both enhance the security and the working efficiency of the network. The authentication sever (AS) and the mobile terminals are properly configured with different workloads of signature generations and signature verifications. We propose using the RSA-PSS-MR scheme and the improved ElGamal scheme. Firstly, the Recovery features of the RSA-PSS-MR scheme have reduced the communication bandwidth sharply since the public keys are not necessary to transmit in our scheme. Secondly, the asymmetry calculation of signature generations and verifications of the improved ElGamal scheme can be well used to configure the scheme. The proposed scheme resolves the real-time transmission problem of authentication.
1113
Abstract: This article analyzes the "cloud computing" concept and characteristics, and the application of "cloud computing" in the army informatization network from the five areas, introduces several challenges brought about by cloud computing.
1119
Abstract: With the continuous development of terminal technologies, the use of mobile terminals is becoming more and more diverse. Many value-added services brought by such applications gradually become to be the firm's new profit opportunity. The location itself has great value; with the display of electronic map or with the support of geographic information database, a variety of information can be shown, tracked and handled. Such location-based services (LBS) is widely used in the field of public wireless data, and mobile location services is recognized as the most attractive wireless data value-added business in 3G network. This paper discusses three positioning standards of the 3GPP first; and then combined with the existing GSM/GPRS cellular radio communication network, it mainly gives specific positioning implementation strategies of single base station in the TD-SCDMA (Time Division Synchronous Code Division Multiple Access) system.
1124
Abstract: The overexploitation of groundwater has caused many serious hydrological geological disasters in the world wide. In order to solve this subject, a groundwater level monitoring system which adopts C/S architecture design and is composed of a monitoring center, transmission network and monitoring terminals is proposed. The monitoring center is made up of a computer with professional monitoring software. The monitoring terminals are arranged at different area as required, and access Internet to transmit data to remote monitoring center server through GPRS net work. The monitoring center server is responsible for receiving, processing, storage, display and analysis the data about groundwater from monitoring terminals. The experimental results show that the system is stable, high precision, stability and timeliness of features, and realizes the automatic collection and centralized management of groundwater monitoring data that provides a reliable scientific basis for sustainable utilization development of groundwater resources and geological hazards forecasting.
1130
Abstract: Aiming to the security control for data transmission between networks with different security levels, this paper establishes a security model that adapts to the different security level networks for data transmission control, designs the network transmission control technical architecture based on the model, and achieves the safety requirements of transmission control.
1136
Abstract: Improvement of government performance is always the fundamental goals and the fundamental value that the public administration pursues. Proceed from the special duality identity of government, this paper designs an index system on government performance. And then predicts the quantitative assessment of government performance based on BP neural network in order to build a forward-looking quantitative assessment system. The accuracy and effectiveness of the system is verified by experiments.
1141
Abstract: In the light of synchronization acquisition of receiving technology, this paper propose a two-step solution which is energy detection and synchronization search to achieve acquisition quickly. First, use energy detection to narrow the searching area, then to search. This method can overcome the complexity of receiver algorithm occurred during the previous designations and improve the synchronization acquisition speed at the same time and finally to obtain fast synchronous acquisition. The experimental results show the feasibility of the synchronization algorithm, which has great improvement compared with the existing algorithms and can balance the complexity and synchronization performance and ensure the synchronization accuracy in conditions of certain signal to noise ratio.
1147
Abstract: Both research and application development in the area of multi-agent currently undertakes rapid expansion but only if adequate security can be provided. Without a correct security mechanism, multi-agent system suffers from fundamental insecurities. By considering both the historical contribution of computer security and the needs of agent-based systems, we present requirements for multi-agent systems security which emphasize the identification and evolution of agents. Existing security models are evaluated against these requirements and generally found wanting. On the other hand, the state of agents have dynamic attribute and that its environment has fuzzy attribute. So, we introduced Dynamic Fuzzy Logic (DFL[14]) to describe agent and the changing of its state. Artificial Immune System (AIS) is a novel evolutionary paradigm inspired by the biological aspects of the immune system. There are widely agreed in characteristics of agents and AIS, such as dynamic, self-study, self-adaptability, self-organization, etc. So it is a natural thing that AI theory is introduced into multi-agent. In this paper, we present the multi-agent immune secure model based on DFL , then a application example is given to simulate the process of the model.
1152

Showing 191 to 200 of 279 Paper Titles