Lingrong Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui
{"title":"Static-Based Test Case Dynamic Generation for SQLIVs Detection","authors":"Lingrong Li, Junxin Qi, Nan Liu, Lifang Han, Baojiang Cui","doi":"10.1109/BWCCA.2015.59","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.59","url":null,"abstract":"We proposed a novel approach to generate test cases for detecting SQLIVs (SQL Injection vulnerabilities), one of the most foremost threats to Web applications. Dynamic testing procedures need to construct an appropriate test to launch a simulated attack on the target system, so test case generation is a crucial step, which directly affects the efficiency of detection. The traditional test case generation technologies have many flaws, for example, blind injection would create a lot of invalid test cases that fail to reach the sink point of vulnerability after filtered out. On the other hand, the test structure far from comprehensive would lead to blind test spots, giving rise to inefficiency and high false alarm rate. Therefore, we propose to use static analysis results to guide test case dynamic generation. A sequence of injection points and filter missing information of SQL vulnerabilities obtained in the static analysis can be passed as parameters to the dynamic detection module to generate more targeted test parameters. In order to generate more accurate test set, we parse the test parameters into two parts: the parameter basic structure and the parameter control information, which will help eliminate a lot of unnecessary redundancy attacks. This kind of joint test case generation is just the innovative point of our paper, practically making for more efficient and accurate dynamic detection.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bao-kang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, I. You
{"title":"A Tutorial on Quantum Key Distribution","authors":"Bao-kang Zhao, Bo Liu, Chunqing Wu, Wanrong Yu, I. You","doi":"10.1109/BWCCA.2015.77","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.77","url":null,"abstract":"Quantum Key Distribution (QKD) technology, based on quantum uncertainty principle, no-cloning theorem and Heisenberg uncertainty principle, can generate information-theoretically secure keys for communication parties. Typical QKD systems include the quantum communication phase and the post-processing phase and can be divided into three families: Device Dependent QKD, Source-Device Independent QKD and Measurement-Device Independent QKD. Nowadays, QKD is already mature enough for real-life applications. High-speed, long-distance and multi-access QKD technologies and security patches against quantum hacking are both continuously research tendency of QKD in the future.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114877659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui
{"title":"Space Time Protocol Based on IEEE1588","authors":"Jun Yang, Yong Guo, Zijing Cheng, Kai Lin, Baojiang Cui","doi":"10.1109/BWCCA.2015.61","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.61","url":null,"abstract":"With the increase in the number of satellites, the security time synchronization protocol between satellites and servers on the ground increasingly important. But, the time protocol that existing in space lack of security protections. Also, SEIEEE1588's author has gathered the advantage of both NTP and IEEE1588 protocol raise a security enhanced IEEE1588 protocol for deep-space environment (SEIEEE1588). The protocol just using symmetric encryption algorithm, does not consider the strong identity authentication, reasonable key update and other security measures. This paper on the basis of IEEE1588 and SEIEEE1588, research the time synchronization mechanism of IEEE1588, the security measures of SEIEEE1588 and safe data transmission protocols. At last, redesign the time synchronization protocol that contains identity authentication that use digital certificate to verify the identity of both sides, asymmetric encryption algorithm and reasonable key updates, to suitable the deep-space that is poor link quality, limited node computing power.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115593188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Evjola Spaho, L. Barolli, Vladi Koliçi, Algenti Lala
{"title":"Performance Evaluation of Different Routing Protocols in a Vehicular Delay Tolerant Network","authors":"Evjola Spaho, L. Barolli, Vladi Koliçi, Algenti Lala","doi":"10.1109/BWCCA.2015.46","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.46","url":null,"abstract":"Vehicular networks have highly dynamic network topology and characterized by disruptive and intermittent connectivity. Vehicular Delay-Tolerant Network (VDTN) architecture is used to deal with these connectivity constraints. In order to handle disconnections and long delays in vehicular network scenarios, VDTN uses store-carry-and-forward approach. In this work, we evaluate the performance of three different routing protocols in a VDTN. We study the impact of transmission range and ttl on the network performance. For the simulation we have used the Opportunistic Network Environment (ONE) simulator. The performance is analyzed using three metrics: Delivery probability, Overhead ratio and Average Latency. The simulation results show that the increase of transmission range increase the delivery probability and overhead ratio and decrease the latency for three routing models. The increase of ttl from 30 to 60 min increases three performance metrics, but further increase does not effect anymore the network performance.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121039428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling for Short-Form HTTP Adaptive Streaming Considering Memory Effect","authors":"Shipeng Yu, Wen’an Zhou, Ran Tao, Yanjun Hou","doi":"10.1109/BWCCA.2015.25","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.25","url":null,"abstract":"With the rapid development of Information and Communication Technology, mobile HTTP adaptive streaming (HAS) technologies have gained popularity. Thusly, the ability to evaluate users' Quality of Experience (QoE) is important. However, changing the transmitted video quality as employed by HAS poses more psychological impact like memory effect on subjectively perceived video quality and modeling HAS QoE considering memory effect is still a challenge. In this paper, we propose a QoE model for short-form HAS video considering memory effect. In order to assess the effect that each segment has in the overall video quality, a subjective online test based on the wisdom of the crowds is conducted. The result shows primacy effect is more obvious than recency effect in short-form videos. The proposed method is validated by plenty subjective tests and the simulation results show that our QoE model for short-form video is powerful.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116644102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cellular Automaton Model of Traffic with Railroad Crossing","authors":"Chihiro Suwa, Kaoru Fujioka","doi":"10.1109/BWCCA.2015.5","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.5","url":null,"abstract":"It has been shown that a cellular automaton is useful to simulate traffic flow. Kashii Sando in Fukuoka City is known as a notoriously busy road that approaches a shrine. Therefore, we focus on the road and introduce a cellular automaton model to simulate the bottleneck situation due to a railroad crossing. We introduce parameters such as traffic volume, initial traffic volume, and car stop time in front of the crossing. We show that a traffic jam is considerably affected by the time that cars are stopped at the railroad crossing.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117148121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli
{"title":"Selection of Secure Actors in Wireless Sensor and Actor Networks Using Fuzzy Logic","authors":"Donald Elmazi, Takaaki Inaba, Shinji Sakamoto, Tetsuya Oda, Makoto Ikeda, L. Barolli","doi":"10.1109/BWCCA.2015.51","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.51","url":null,"abstract":"In Wireless Sensor and Actor Networks (WSANs), sensors and actors collaborate together to get the information about the physical environment and perform appropriate actions. In order to provide effective sensing and acting, a distributed local coordination mechanism is necessary among sensors and actors. In this work, we consider the actor node selection problem and we propose a fuzzy-based system that based on data provided by sensors and actors selects an appropriate actor node. We use 4 input parameters. Different from our previous work, we consider also the security. The output parameter is Actor Selection Decision (ASD). The simulation results show that the proposed system selects secure actor nodes in order to have short delays, low energy consumption and proper task assignment.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129257982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tsuyoshi Takahashi, Y. Shibata, S. Imata, Nobuo Suzuki
{"title":"Evaluation of Wake-on-Demand Accurate Activation and In-Vehicle Wireless Connecation Control","authors":"Tsuyoshi Takahashi, Y. Shibata, S. Imata, Nobuo Suzuki","doi":"10.1109/BWCCA.2015.37","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.37","url":null,"abstract":"Recently, many research studies have contributed to the connection of in-vehicle devices with a cloud network and to management of the status of these devices on a server outside the vehicle. For these cases, an in-vehicle router is important because in-vehicle devices communicate with the external server via the in-vehicle router. The in-vehicle router activates devices outside the vehicle as necessary and maintain a stable speed for the in-vehicle devices. We proposed two methods to reduce the inaccurate activation of wireless devices and improve the throughput for in-vehicle wireless communication. The proposed methods were evaluated through field tests. These results showed that the probability of false positives was reduced and the throughput for each passenger was improved for each vehicle. These two methods were integrated into one system, and the system was used to provide appropriate information only for users who visited a destination.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128801601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sheraz Hussain, N. Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez
{"title":"Improved Adaptive Cooperative Routing in Underwater Wireless Sensor Networks","authors":"Sheraz Hussain, N. Javaid, Syed Zarar, Muhammad Zain-ul-Abidin, Mudassir Ejaz, Taimur Hafeez","doi":"10.1109/BWCCA.2015.93","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.93","url":null,"abstract":"In Underwater Wireless Sensor Networks (UWSNs), reliability is an important factor which effects the overall performance of the network. As the underwater environment is noisy and due to multipath fading and poor link quality, the reliability of the network and data integrity is affected. With cooperative routing, the reliability and the integrity of the data is improved. In this paper two relay nodes and a master node is selected for the transmission of data from source to the sink. Master node is selected among the neighbouring nodes which has low depth, high residual energy and must lie outside the threshold defined. On the basis of depth threshold of source node and the master node, two relay nodes are selected for the retransmission mechanism. Simulation results show that IACR achieves better results with respect to packet acceptance ratio, throughput, network lifetime and packet drop as compared to ACE.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"2015 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127714207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hui Tian, Youyun Xu, Kui Xu, Xingkang Hou, Xiaochen Xia, Wenfeng Ma
{"title":"Differential Multiply-and-Forward and Selective Combining Based Multi-relay TDBC Protocol","authors":"Hui Tian, Youyun Xu, Kui Xu, Xingkang Hou, Xiaochen Xia, Wenfeng Ma","doi":"10.1109/BWCCA.2015.16","DOIUrl":"https://doi.org/10.1109/BWCCA.2015.16","url":null,"abstract":"In this paper, we propose a differential multiplyand-forward (DMF) and selective combining (SC) based multirelay time division broadcasting (TDBC) protocol, named as DMF-SC, in rayleigh fading channels. Different from amplify and-forward relaying (AF) and decode-and-forward (DF) relaying, in DMF multi-relaying, each relay broadcasts the product of two signals received from two terminals. The decision variables from the direct and cascaded links at the terminal node are selective combined to obtain the cooperative diversity. Theoretical analyses and simulation results show that the proposed DMFSC protocol can obtain a order N + 1 cooperative diversity, and outperforms AF, DF and multiplicative network coding protocols with differential modulation. Meanwhile, no channel state information is needed at the terminals with the proposed DMF-SC based multi-relay TDBC protocol.","PeriodicalId":193597,"journal":{"name":"2015 10th International Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA)","volume":"80 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128128242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}