{"title":"A Distributed Real-Time Operating System with Distributed Shared Memory for Embedded Control Systems","authors":"Takahiro Chiba, Myungryun Yoo, T. Yokoyama","doi":"10.1109/DASC.2013.71","DOIUrl":"https://doi.org/10.1109/DASC.2013.71","url":null,"abstract":"The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some Special Issues of Network Security Monitoring on Big Data Environments","authors":"Langzhou Liu, Jun Lin","doi":"10.1109/DASC.2013.30","DOIUrl":"https://doi.org/10.1109/DASC.2013.30","url":null,"abstract":"Big Data possesses profound information of our society, and therefore, it impacts numerous aspects of human society, with a large amount of data from large-scale heterogeneous network environments, we should analyze some special issues of network security monitoring on Big Data environments. This paper propose data cleaning for various types of data sources and analysis Big Data on network security through security event on multiple associations rules. This study provides some ideas for network security monitoring on Big Data environments.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122789192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Key Technology for Phase-Shift Laser Range Finder","authors":"Su Xianbo, Tan Jianjun, Xu Jian, Huan ShaoJun","doi":"10.1109/DASC.2013.68","DOIUrl":"https://doi.org/10.1109/DASC.2013.68","url":null,"abstract":"Laser range finder is one of the effective and automatic methods for distance measurement, making distance measurement much easier and safer in the places where people can't reach. Laser range finder helps to measure the distance accurately by finding the difference of phase which brings by modulated wave through the distance. Through the analysis of existing laser ranging technologies as well as the comparison of the different technological performance, phase-shift laser ranging method is proposed. This thesis aims to study some key technologies on phase-shift laser ranging for short-distance laser range finding sensor.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124112311","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New System Interconnection Architecture Based on RapidIO Using Partial Reconfiguration","authors":"Zhan Xu, Xiao Wu, Yi Wu","doi":"10.1109/DASC.2013.75","DOIUrl":"https://doi.org/10.1109/DASC.2013.75","url":null,"abstract":"Now in the field of embedded system, high-speed interconnection based on parallel or serial LVDS technology is becoming increasingly important. Because of this the first RapidIO offerings available in the market were FPGA based, RapidIO interconnection had been identified as significant emerging technologies for FPGAs to support. At the same time, as the FPGAs increase in size, they are being large enough to accommodate both the static RapidIO interface and the reconfigurable logic. So, a consistent I/O interface is provided to support Reconfigurable Partition. This paper presents a new system interconnection architecture based on RapidIO to achieve the FPGA run-time Reconfigurable Partition.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125764343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ADS-B Data Authentication Based on AH Protocol","authors":"Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang","doi":"10.1109/DASC.2013.32","DOIUrl":"https://doi.org/10.1109/DASC.2013.32","url":null,"abstract":"With the evolution of traditional civil aviation into \"e-enabled\" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang
{"title":"A Wireless Resources Allocation Method for D2MD Communication under IMT-A System","authors":"Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang","doi":"10.1109/DASC.2013.121","DOIUrl":"https://doi.org/10.1109/DASC.2013.121","url":null,"abstract":"A wireless resources allocation method for Device-to-Multi-Device (D2MD) communication under the control of base station is proposed. In the premise of ensuring quality of services (QoS) of all D2MD groups, the method can allocate wireless resources for D2MD groups through three steps: mode selection, spectrum allocation and power control. Simulation results show that the method can select the high-spectrum-efficiency mode which reuses the spectrum of cellular users for most D2MD communications, and does not affect cellular communications, the interference to cellular uplink of proposed suboptimal LCH algorithm which allocates cellular spectrums for D2MD groups to reuse can achieve the same level as the optimal algorithm, in addition, the calculating complexity is lower therefore shortening the response time of the base station.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131842539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Delay Aware Broadcast Forwarding Protocol for Asynchronous Duty-Cycled WSNs","authors":"Peizhong Shi, Yun Wang","doi":"10.1109/DASC.2013.72","DOIUrl":"https://doi.org/10.1109/DASC.2013.72","url":null,"abstract":"Multi-hop broadcasts are more difficult in duty-cycled wireless sensor networks where each node stays awake only for a fraction of a time interval and neighborhood nodes are not simultaneously awake to receive data. In this paper, we exploit the problem of multi-hop broadcasts in low duty-cycled wireless sensor networks, and propose a delay aware broadcast forwarding protocol called DCEB. DCEB neither assumes time synchronization for sleep scheduling, which requires all neighboring nodes to wake up at the same time, nor assumes duty-cycled awareness, which makes the protocol difficult to use in low duty-cycled operations. The decision conditions of broadcast forwarding time with or without delay constraint are deduced. Experimental results prove that DCEB cuts the energy consumption of a multi-hop broadcast by reducing broadcast costs under the decision conditions.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128999687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhe Jiang, Yi Luo, Naihu Wu, Chunjiang He, Pingpeng Yuan, Hai Jin
{"title":"Managing Large Scale Unstructured Data with RDBMS","authors":"Zhe Jiang, Yi Luo, Naihu Wu, Chunjiang He, Pingpeng Yuan, Hai Jin","doi":"10.1109/DASC.2013.135","DOIUrl":"https://doi.org/10.1109/DASC.2013.135","url":null,"abstract":"With the rapid development of information technology, the needs of unstructured data storage and processing is growing rapidly, which develops a new requirement for the database storage. Traditional row-oriented relational databases appear to be inadequate for the data query and analysis. In this paper, we propose a novel approach to store the unstructured data in a relational database. By splitting the VALUE property of the unstructured KEY/VALUE data and recreating the two-dimensional data, the original data can be stored in relational databases. The system introduced in this paper is designed to handle this task. In addition, this system rebuilds the SQL as its query language, which makes it compatible with relational databases. In experiments of the query for unstructured data, the outcomes show that the system is good at decomposing the SQL statement submitted by users, and generating the corrected sub-query statements. The results of the experiments show that the performance of this system is good.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133490950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Limin Xiao, Chunjie Xu, Jin Qin, Guangjun Qin, Mingfa Zhu, Li Ruan, Zhiyao Wang, Mingquan Li, D. Tan
{"title":"Secure Distribution of Big Data Based on BitTorrent","authors":"Limin Xiao, Chunjie Xu, Jin Qin, Guangjun Qin, Mingfa Zhu, Li Ruan, Zhiyao Wang, Mingquan Li, D. Tan","doi":"10.1109/DASC.2013.42","DOIUrl":"https://doi.org/10.1109/DASC.2013.42","url":null,"abstract":"Recently, big data becomes more and more widespread on the Internet, as various P2P protocols, especially BitTorrent, make great contribution. Accompanied with BitTorrent spreading, however, malicious activities, divulging sensitive data and other security problems arise. Relative researches and analyses indicate that existing means of protecting P2P network are sophisticated but intricate when distributing big data, leading inefficiency of implementation. In this paper, a scheme to distribute big data securely and efficiently on BitTorrent network is proposed, which can be implemented in server, authorizing peers' admittances and actions, hence protecting sensitive data in the network. To achieve this goal, identity verification and cipher system are embedded into BitTorrent protocol, enabling the server to regulate and keep trace of peers' behaviors and sensitive data. The experimental results show the functional effectiveness of this scheme, as well as acceptable overhead on server.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129549552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Workflow Management Systems Meet Model Drive Architecture","authors":"Chao Zhang, Ping Gu, Yan Li","doi":"10.1109/DASC.2013.44","DOIUrl":"https://doi.org/10.1109/DASC.2013.44","url":null,"abstract":"In order to solve the problem of conversions among workflow management system models, and improve the efficiency of the development of workflow management systems. Based on model driven architecture(MDA), the paper gives the workflow model, and utilizes transformation languages to generate source model. In the actual process of software development, the method is conducive to improve the efficiency of development. In this paper, the method can adapt to the diversities of external environment, and improve the workflow management system robustness which has a certain application significance.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115377656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}