{"title":"A Topology Based Differential Privacy Scheme for Average Path Length Query","authors":"Tong Dong, Yong Zeng, Mengli Liu, Zhihong Liu, Jianfeng Ma, Xiao-yan Zhu","doi":"10.1109/NaNA.2019.00067","DOIUrl":"https://doi.org/10.1109/NaNA.2019.00067","url":null,"abstract":"Differential privacy is heavily used in privacy protection due to it provides strong protection against private data. The existing differential privacy scheme mainly implements the privacy protection of nodes or edges in the network by perturbing the data query results. Most of them cannot meet the privacy protection requirements of multiple types of information. In order to overcome these issues, a differential privacy security mechanism with average path length (APL) query is proposed in this paper, which realize the privacy protection of both network vertices and edge weights. Firstly, by describing APL, the reasons for choosing this attribute as the query function are analyzed. Secondly, global sensitivity of APL query under the need of node privacy protection and edge-weighted privacy protection is proved. Finally, the relationship between data availability and privacy control parameters in differential privacy is analyzed through experiments.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114898301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Distributed Computing Framework Research for Avionics Cloud","authors":"Jianchun Xie, Zhonghua Wang, Yahui Li","doi":"10.1109/NANA.2018.8648728","DOIUrl":"https://doi.org/10.1109/NANA.2018.8648728","url":null,"abstract":"In the avionics cloud computing environment, the resource distributed in different task area, whatever partitioned by physical of logical, need to be cooperate together to compute a task. For the avionic computing environment, a set of distributed framework are presented in this paper, which include computing model, hardware framework and software model. The framework almost contains the technical character of the classical open framework, and can directly used for avionics products manufacture.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of the Enhanced Anti-Xprobe2","authors":"Junliang Ma, Xili Wang, Bing Xiao","doi":"10.1109/NaNA.2016.70","DOIUrl":"https://doi.org/10.1109/NaNA.2016.70","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116269075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wenxia Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan
{"title":"A New Interference Aware Routing Metric for Multi-radio Multi-channel Wireless Mesh Networks","authors":"Wenxia Ji, Yichuan Wang, Yanxiao Liu, Lei Zhu, Weigang Ma, Li Yan","doi":"10.1109/NaNA.2016.47","DOIUrl":"https://doi.org/10.1109/NaNA.2016.47","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126783467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Construction of MDS Matrices Based on the Primitive Elements of the Finite Field","authors":"You Wu, Xin Dong, Jin Bo Wang, Wen-zheng Zhang","doi":"10.1109/NaNA53684.2021.00090","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00090","url":null,"abstract":"With the advent of the information age, the protected objects and application environments vary greatly. Using the same standard algorithm with fixed logic is difficult to meet the increasingly diversified cryptographic application requirements of cloud computing, Internet of things and 5g network environment. Dynamic variable cryptographic algorithm can improve the security and adaptability of cryptographic algorithm, which is the focus of cryptographic algorithm research and design at present. The key to the research and design of dynamic variable cryptographic algorithms is to find dynamic variable cryptographic components with good cryptographic performance. MDS (Maximum Distance Separable) is often used in the diffusion layer design of block ciphers because of its optimal diffusion characteristics. Traditional MDS transformation generally adopts MDS matrices in the finite field. While using them in dynamic variable cryptographic algorithms, it is difficult to realize parametric application because of their logical differences and implementation imbalance. Aiming at the lightweight MDS variable design requirements of dynamic variable cryptographic algorithm, this paper first proposes a MDS parametric construction method based on block cyclic shift and XOR operation. Compared with the traditional MDS construction in the finite field, we obtain a class of MDS component clusters with larger scale which is convenient for software and hardware implementation. The main design idea is to convert the multiplication operation in the finite field into cyclic shift operation, and introduce parameters to participate in the MDS operation in the way of direct XOR. Based on the MDS matrix in AES diffusion layer, two kinds of variable MDS diffusion layers are given by this method. We adopt the consistent structure based on cyclic shift and XOR operation, and each parameter corresponds to a different MDS transformation. The free transformation of operations in different finite fields of traditional MDS matrix can be realized by adjusting the parameters, which can be used for the parametric design of diffusion layer of dynamic variable cryptographic algorithm.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126674079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Protection method of continuous location uploading based on local differential privacy","authors":"Xiong Wang, Weidong Yang","doi":"10.1109/NaNA51271.2020.00035","DOIUrl":"https://doi.org/10.1109/NaNA51271.2020.00035","url":null,"abstract":"Research on the protection of location privacy of mobile users is now receiving widespread attention. Many scholars have proposed many methods to protect user's location. However, it is still difficult to ensure that the user's location information is not leaked when the user's location is continuously uploaded. In response to these problems, a location privacy protection method based on LDP is proposed. The two-dimensional map is projected into one-dimensional space through the Hilbert curve, and the sub-areas are dynamically divided according to the number of users in the area; the RAPPOR is used to make sure the user's location information is disturbed and then uploaded to the server. In the case of continuous upload, the server can obtain the distribution of users in real time, but cannot know the precise location data of each user. Through experiments on real data sets and simulation experiments, the results prove that the LDP-based location privacy protection method can effectively protect the continuously uploaded user location information from being leaked.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121028179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Empirical Study of Unsolicited Content Injection into a Website","authors":"Jianming Fu, Mengfei Xie, Yingjun Wang, Xufen Mei","doi":"10.1109/NaNA.2017.39","DOIUrl":"https://doi.org/10.1109/NaNA.2017.39","url":null,"abstract":"","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114802268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on PDCCH Channel in 5G NR System","authors":"Tianyi Liang, Huijie Zhu","doi":"10.1109/NaNA53684.2021.00027","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00027","url":null,"abstract":"In the 5th Generation Mobile Communication Technology (5G) system, physical downlink control channel (PDCCH) controls the transmission and reception of uplink and downlink data by transmitting Downlink Control Information (DCI), which is the core of the physical channel control of the 5G system. Obtain the DCI information to obtain the uplink and downlink scheduling information of the signal, thereby providing more possibilites for effectively interfering with the mobile signal. In this paper, by studying the signal transmitting end, the corresponding resource demapping, deinterleaving, decoding and other algorithms are used to realize the full link processing of the receiving end and obtain DCI information. The actual 5G signal collected is processed, which verifies the reliability and accuracy of the algorithm.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127121738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Network Traffic Oriented Malware Detection in IoT (Internet-of-Things)","authors":"Wangwang Wang, Yunchun Zhang, Chengjie Li, Xuchenming Sun, Yuting Zhong, Xin Zhang","doi":"10.1109/NaNA53684.2021.00059","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00059","url":null,"abstract":"With the wide popularity of Internet-of-Things (IoT), machine learning-based malware detection systems are incapable of being installed on IoT devices due to restricted computing power and resources. To bridging the above gap, this paper proposes an integrated deep learning system for malware detection based on features extracted from network packet, NetFlow and malware samples. By referring models popular in natural language processing domain, 7 neural networks with attention mechanism are designed based on both character-level and word-level features. The results demonstrated that all models achieve satisfactory performance on accuracy, recall, precision and F1-Score. Among them, Transformer outperforms other models on character-level features with 99.83% accuracy. By using word-level features, all models achieve better performance than models on character-level features with the best accuracy as 99.54%. By visualizing heat map, we measured and ordered features in descending order based on their contributions to final classification. It is important to find out that features that greatly contribute in IoT malware detection are almost the same with those in network anomaly detection.","PeriodicalId":185215,"journal":{"name":"International Conference on Networking and Network Applications","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126660149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}