Bing Li, Guohe Zhang, Shaochong Lei, H. Fu, Jinlei Wang
{"title":"A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC","authors":"Bing Li, Guohe Zhang, Shaochong Lei, H. Fu, Jinlei Wang","doi":"10.1109/IEEECONF52377.2022.10013341","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013341","url":null,"abstract":"The quick development of the Internet of Things (IoT) makes the IoT devices become appealing targets of various cyberattacks. Authentication and key agreement (AKA) protocol are the most important measures to ensure the security of IoT. However, it is still quite challenging to devise proper AKA protocols for IoT because of the resource-constrained nature of IoT devices. In this paper, we have proposed a new lightweight AKA protocol for IoT based on elliptic curve cryptography (ECC). Our proposed AKA protocol can achieve mutual authentication and ECC-based session key establishment simultaneously. To enhance security and provide anonymity, our protocol uses the one-time password and dynamic identity information which are updated in every round of mutual authentication through a well-designed update operation. To assess our protocol, we carry out security and performance analyses. The obtained results show that our protocol with a high level of security has low complexity and small computational cost and is appropriate to be applied in resource-constrained IoT devices.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Z. Hou, Jin Chen, Guoxin Li, Yu-zhen Huang, Yifan Xu, Yuhua Xu
{"title":"Matching Design in Multi-IRS-UAV-assisted Multi-pair Anti-jamming Communication Networks","authors":"Z. Hou, Jin Chen, Guoxin Li, Yu-zhen Huang, Yifan Xu, Yuhua Xu","doi":"10.1109/IEEECONF52377.2022.10013344","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013344","url":null,"abstract":"This paper studies the matching optimization problem in multi-IRS-UAV-assisted multi-pair anti-jamming communication networks. The matching relationship between the transmitters and IRS-UAVs is formed to improve the overall anti-jamming performance, and we formulate it as a non-substitutable many-to-many matching problem. To solve this problem, we propose a low-complexity distributed matching-based optimization algorithm. Numerical results show that the proposed algorithm has a significant performance improvement than the random matching algorithm and is even close to optimal performance.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast recoverable heterogeneous quad-core lockstep architecture","authors":"Kai Liu, Yu Li, Ouyang Ling","doi":"10.1109/IEEECONF52377.2022.10013101","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013101","url":null,"abstract":"With the increasing demand of industry and automobile for reliability, various redundant software and hardware technologies are introduced into system design. In this paper, we present a fast recoverable heterogeneous quad-core lockstep architecture to mitigate single event upset (SEU) and common-mode failure(CMF) problems. Two ARM processors and Two RISC-V processors are integrated in a loosely-coupled lockstep mode and a recovery scheme is implemented without frequent processor context saving.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xuhui Song, Hongtao Yu, Shaomei Li, Xinbang Hu, Huansha Wang
{"title":"Overview of Relation Extraction","authors":"Xuhui Song, Hongtao Yu, Shaomei Li, Xinbang Hu, Huansha Wang","doi":"10.1109/IEEECONF52377.2022.10013099","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013099","url":null,"abstract":"With the rapid development of big data, information extraction has gradually become a hot research issue. As one of the sub tasks of information extraction, relation extraction is widely used in the fields of knowledge atlas, intelligent question answering and so on. According to the development history of relation extraction, this paper expounds relation extraction based on traditional machine learning, relation extraction based on deep learning and relation extraction in open domain, summarizes the representative research methods, models and achievements, and summarizes and prospects the possible research directions in the future.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Yang, Yongjun Liu, Chunxiao Dong, Bo Gao, Mei Tian, Yawei Ji
{"title":"Design of pseudolite supplemented geolocation system for universal receiver","authors":"B. Yang, Yongjun Liu, Chunxiao Dong, Bo Gao, Mei Tian, Yawei Ji","doi":"10.1109/IEEECONF52377.2022.10013350","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013350","url":null,"abstract":"Global navigation satellite system (GNSS) has been widely used around the world, but problems like low signal intensity or signal been blocked could often cause the users unable to collect enough satellite signal for position purpose. A pseudolite geolocation system is designed which can worked instead of non-line-of-sight (NLOS) satellites, cooperate with on orbit GNSS satellites. We detailed a novel pseudolite system consists and working progress. Through application scenario analysis and simulation we verified that pseudorange errors is the main factor affect position accuracy, therefore, we provide pseudolite testing and correction methods. In addition, we also verified that pseudolite can significantly improve positioning accuracy in high buildings around urban environment.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method","authors":"Yong-Bing Zhang, Liang Jin, Qiang Han","doi":"10.1109/IEEECONF52377.2022.10013332","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013332","url":null,"abstract":"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fangxu Lu, Zhichao Mi, Ning Zhao, Hai Wang, Yulu Tian
{"title":"3D Deployment of Dynamic UAV Base Station based on Mobile Users","authors":"Fangxu Lu, Zhichao Mi, Ning Zhao, Hai Wang, Yulu Tian","doi":"10.1109/IEEECONF52377.2022.10013331","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013331","url":null,"abstract":"The deployment of multiple dynamic rotary-wing UAV base stations is studied for moving users. The cumulative utility of the communication network is maximized by adding and applying the three paremeters of the UAV base stations in terms of total channel transmission rate, mobile energy consumption, and coverage utility. The UAV base station performs different motions in different time slots, which translates the process into a Markov decision process. Since the user moves randomly within the time slot, the reward function value of the “next two steps” of the dynamic UAV base station is considered. The mobility prediction of the user is taken into account to some extent, and finally the mobile strategy of the UAV base station within the current time slot is selected comprehensively. The simulation results show that the improved algorithm is effective in achieving the best coverage of the UAV base station.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"17 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113931814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical layer key generation for non-codebook transmission mode of 5G TDD system","authors":"Zhi Cao, Liang Jin, Qian Han","doi":"10.1109/IEEECONF52377.2022.10013102","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013102","url":null,"abstract":"The design and analysis of traditional physical layer key generation schemes are mostly based on the general communication models. They did not really consider the actual communication scenarios, such as 5G communication. This paper proposed a physical layer key generation scheme for 5G TDD system in non-codebook transmission mode. In our scheme, the gNB uses SRS to complete downlink channel estimation and generates an adapted precoding matrix to assist the downlink signal transmission. Based on existing parameters obtained in the precoding matrix generation, the gNB predicts the signal received by the UE and uses it as a shared source of randomness. The whole process conforms to the 5G protocol. The key extraction can be completed during the interaction between the communication parties, realizing the unity of security and communication.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-performance optimization of SM4-GCM based on FPGA","authors":"S. Lv, Bin Li, Xiaojie Chen, Qinglei Zhou","doi":"10.1109/IEEECONF52377.2022.10013330","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013330","url":null,"abstract":"SM4-GCM is an encryption algorithm with authentication function. The algorithm achieves the purpose of data security and information integrity. The SM4-GCM algorithm, implemented using traditional software methods, has low throughput and high resource consumption. In order to further improve the algorithm performance, this paper uses FPGA to optimize the SM4-GCM algorithm to achieve full-pipeline parallel acceleration. Firstly, the SM4 module is optimized using pipelining techniques. Then, the GHASH module is optimized using the Karatsuba algorithm and fast reduction. Finally, a loosely coupled architecture is used to connect various modules with asynchronous FIFOs, which improves the resource utilization and throughput of the FPGA circuit. The experimental results show that the throughput of the optimized SM4-GCM algorithm reaches 28.8 Gbps. It is better than other schemes, has a higher throughput, and meets the actual application requirements.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cooperative Localization Algorithm Based on UAV Platform","authors":"Lu Zhang, Jianbo Yang, Ziyan Zhang, Peng Cai","doi":"10.1109/IEEECONF52377.2022.10013095","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013095","url":null,"abstract":"Aiming at the location of fixed radiation source, a cooperative location method combining TDOA location and FDOA (frequency difference location) is proposed based on UAV platform and directional antenna. Firstly, relying on the directional antenna of the UAV platform and based on the received signal strength, the method roughly locates the radiation source and searches the best location point, so that the radiation source is located at the vertical position of the two location points; Then, according to the TDOA location and FDOA algorithms, the emitter location is calculated cooperatively; Finally, the positioning accuracy is simulated and analyzed. The results show that when the time difference measurement and frequency difference measurement are controlled within a certain range, the error of joint positioning can be controlled in a small range, which is inversely proportional to the distance between the two positioning points and directly proportional to the distance between the radiation source and the positioning point. This method makes full use of the UAV mobile search function to optimize the positioning points, and then cooperates with TDOA and frequency difference positioning, which can effectively improve the positioning efficiency while reducing the point position error.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117135152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}