2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)最新文献

筛选
英文 中文
Static-Based Test Case Dynamic Generation for SQLIVs Detection 基于静态的测试用例动态生成SQLIVs检测
Lingrong Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui
{"title":"Static-Based Test Case Dynamic Generation for SQLIVs Detection","authors":"Lingrong Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui","doi":"10.1109/BWCCA.2015.59","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.59","url":null,"abstract":"We proposed a novel approach to generate test cases for detecting SQLIVs (SQL Injection vulnerabilities), one of the most foremost threats to Web applications. Dynamic testing procedures need to construct an appropriate test to launch a simulated attack on the target system, so test case generation is a crucial step, which directly affects the efficiency of detection. The traditional test case generation technologies have many flaws, for example, blind injection would create a lot of invalid test cases that fail to reach the sink point of vulnerability after filtered out. On the other hand, the test structure far from comprehensive would lead to blind test spots, giving rise to inefficiency and high false alarm rate. Therefore, we propose to use static analysis results to guide test case dynamic generation. A sequence of injection points and filter missing information of SQL vulnerabilities obtained in the static analysis can be passed as parameters to the dynamic detection module to generate more targeted test parameters. In order to generate more accurate test set, we parse the test parameters into two parts: the parameter basic structure and the parameter control information, which will help eliminate a lot of unnecessary redundancy attacks. This kind of joint test case generation is just the innovative point of our paper, practically making for more efficient and accurate dynamic detection.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Tutorial on Quantum Key Distribution 量子密钥分发教程
Bao-kang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, I. You
{"title":"A Tutorial on Quantum Key Distribution","authors":"Bao-kang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, I. You","doi":"10.1109/BWCCA.2015.77","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.77","url":null,"abstract":"Quantum Key Distribution (QKD) technology, based on quantum uncertainty principle, no-cloning theorem and Heisenberg uncertainty principle, can generate information-theoretically secure keys for communication parties. Typical QKD systems include the quantum communication phase and the post-processing phase and can be divided into three families: Device Dependent QKD, Source-Device Independent QKD and Measurement-Device Independent QKD. Nowadays, QKD is already mature enough for real-life applications. High-speed, long-distance and multi-access QKD technologies and security patches against quantum hacking are both continuously research tendency of QKD in the future.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Space Time Protocol Based on IEEE1588 基于IEEE1588的时空协议
Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui
{"title":"Space Time Protocol Based on IEEE1588","authors":"Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui","doi":"10.1109/BWCCA.2015.61","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.61","url":null,"abstract":"With the increase in the number of satellites, the security time synchronization protocol between satellites and servers on the ground increasingly important. But, the time protocol that existing in space lack of security protections. Also, SEIEEE1588's author has gathered the advantage of both NTP and IEEE1588 protocol raise a security enhanced IEEE1588 protocol for deep-space environment (SEIEEE1588). The protocol just using symmetric encryption algorithm, does not consider the strong identity authentication, reasonable key update and other security measures. This paper on the basis of IEEE1588 and SEIEEE1588, research the time synchronization mechanism of IEEE1588, the security measures of SEIEEE1588 and safe data transmission protocols. At last, redesign the time synchronization protocol that contains identity authentication that use digital certificate to verify the identity of both sides, asymmetric encryption algorithm and reasonable key updates, to suitable the deep-space that is poor link quality, limited node computing power.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115593188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance Evaluation of Different Routing Protocols in a Vehicular Delay Tolerant Network 车载容延迟网络中不同路由协议的性能评价
Evjola Spaho, L. Barolli, Vladi Koliçi, Algenti Lala
{"title":"Performance Evaluation of Different Routing Protocols in a Vehicular Delay Tolerant Network","authors":"Evjola Spaho, L. Barolli, Vladi Koliçi, Algenti Lala","doi":"10.1109/BWCCA.2015.46","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.46","url":null,"abstract":"Vehicular networks have highly dynamic network topology and characterized by disruptive and intermittent connectivity. Vehicular Delay-Tolerant Network (VDTN) architecture is used to deal with these connectivity constraints. In order to handle disconnections and long delays in vehicular network scenarios, VDTN uses store-carry-and-forward approach. In this work, we evaluate the performance of three different routing protocols in a VDTN. We study the impact of transmission range and ttl on the network performance. For the simulation we have used the Opportunistic Network Environment (ONE) simulator. The performance is analyzed using three metrics: Delivery probability, Overhead ratio and Average Latency. The simulation results show that the increase of transmission range increase the delivery probability and overhead ratio and decrease the latency for three routing models. The increase of ttl from 30 to 60 min increases three performance metrics, but further increase does not effect anymore the network performance.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Modeling for Short-Form HTTP Adaptive Streaming Considering Memory Effect 考虑记忆效应的短格式HTTP自适应流建模
Shipeng Yu, Wen’an Zhou, Ran Tao, Yanjun Hou
{"title":"Modeling for Short-Form HTTP Adaptive Streaming Considering Memory Effect","authors":"Shipeng Yu, Wen’an Zhou, Ran Tao, Yanjun Hou","doi":"10.1109/BWCCA.2015.25","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.25","url":null,"abstract":"With the rapid development of Information and Communication Technology, mobile HTTP adaptive streaming (HAS) technologies have gained popularity. Thusly, the ability to evaluate users' Quality of Experience (QoE) is important. However, changing the transmitted video quality as employed by HAS poses more psychological impact like memory effect on subjectively perceived video quality and modeling HAS QoE considering memory effect is still a challenge. In this paper, we propose a QoE model for short-form HAS video considering memory effect. In order to assess the effect that each segment has in the overall video quality, a subjective online test based on the wisdom of the crowds is conducted. The result shows primacy effect is more obvious than recency effect in short-form videos. The proposed method is validated by plenty subjective tests and the simulation results show that our QoE model for short-form video is powerful.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Cellular Automaton Model of Traffic with Railroad Crossing 铁路道口交通的元胞自动机模型
Chihiro Suwa, Kaoru Fujioka
{"title":"A Cellular Automaton Model of Traffic with Railroad Crossing","authors":"Chihiro Suwa, Kaoru Fujioka","doi":"10.1109/BWCCA.2015.5","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.5","url":null,"abstract":"It has been shown that a cellular automaton is useful to simulate traffic flow. Kashii Sando in Fukuoka City is known as a notoriously busy road that approaches a shrine. Therefore, we focus on the road and introduce a cellular automaton model to simulate the bottleneck situation due to a railroad crossing. We introduce parameters such as traffic volume, initial traffic volume, and car stop time in front of the crossing. We show that a traffic jam is considerably affected by the time that cars are stopped at the railroad crossing.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy Logic 基于模糊逻辑的无线传感器和Actor网络安全Actor选择
Donald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
{"title":"Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy Logic","authors":"Donald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/BWCCA.2015.51","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.51","url":null,"abstract":"In Wireless Sensor and Actor Networks (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters. Different from our previous work, we consider also the security. The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system selects secure actor nodes in order to have short delays, low energy consumption and proper task assignment.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Evaluation of Wake-on-Demand Accurate Activation and In-Vehicle Wireless Connecation Control 随需应变精确激活与车载无线连接控制的评估
Tsuyoshi Takahashi, Y. Shibata, S. Imata, Nobuo Suzuki
{"title":"Evaluation of Wake-on-Demand Accurate Activation and In-Vehicle Wireless Connecation Control","authors":"Tsuyoshi Takahashi, Y. Shibata, S. Imata, Nobuo Suzuki","doi":"10.1109/BWCCA.2015.37","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.37","url":null,"abstract":"Recently, many research studies have contributed to the connection of in-vehicle devices with a cloud network and to management of the status of these devices on a server outside the vehicle. For these cases, an in-vehicle router is important because in-vehicle devices communicate with the external server via the in-vehicle router. The in-vehicle router activates devices outside the vehicle as necessary and maintain a stable speed for the in-vehicle devices. We proposed two methods to reduce the inaccurate activation of wireless devices and improve the throughput for in-vehicle wireless communication. The proposed methods were evaluated through field tests. These results showed that the probability of false positives was reduced and the throughput for each passenger was improved for each vehicle. These two methods were integrated into one system, and the system was used to provide appropriate information only for users who visited a destination.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128801601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Improved Adaptive Cooperative Routing in Underwater Wireless Sensor Networks 改进的水下无线传感器网络自适应协同路由
Sheraz Hussain, N. Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez
{"title":"Improved Adaptive Cooperative Routing in Underwater Wireless Sensor Networks","authors":"Sheraz Hussain, N. Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez","doi":"10.1109/BWCCA.2015.93","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.93","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs), reliability is an important factor which effects the overall performance of the network. As the underwater environment is noisy and due to multipath fading and poor link quality, the reliability of the network and data integrity is affected. With cooperative routing, the reliability and the integrity of the data is improved. In this paper two relay nodes and a master node is selected for the transmission of data from source to the sink. Master node is selected among the neighbouring nodes which has low depth, high residual energy and must lie outside the threshold defined. On the basis of depth threshold of source node and the master node, two relay nodes are selected for the retransmission mechanism. Simulation results show that IACR achieves better results with respect to packet acceptance ratio, throughput, network lifetime and packet drop as compared to ACE.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Differential Multiply-and-Forward and Selective Combining Based Multi-relay TDBC Protocol 基于差分复用转发和选择性组合的多中继TDBC协议
Hui Tian, Youyun Xu, Kui Xu, Xingkang Hou, Xiaochen Xia, Wenfeng Ma
{"title":"Differential Multiply-and-Forward and Selective Combining Based Multi-relay TDBC Protocol","authors":"Hui Tian, Youyun Xu, Kui Xu, Xingkang Hou, Xiaochen Xia, Wenfeng Ma","doi":"10.1109/BWCCA.2015.16","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.16","url":null,"abstract":"In this paper, we propose a differential multiplyand-forward (DMF) and selective combining (SC) based multirelay time division broadcasting (TDBC) protocol, named as DMF-SC, in rayleigh fading channels. Different from amplify and-forward relaying (AF) and decode-and-forward (DF) relaying, in DMF multi-relaying, each relay broadcasts the product of two signals received from two terminals. The decision variables from the direct and cascaded links at the terminal node are selective combined to obtain the cooperative diversity. Theoretical analyses and simulation results show that the proposed DMFSC protocol can obtain a order N + 1 cooperative diversity, and outperforms AF, DF and multiplicative network coding protocols with differential modulation. Meanwhile, no channel state information is needed at the terminals with the proposed DMF-SC based multi-relay TDBC protocol.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信