2021 International Conference on Advanced Computing and Endogenous Security最新文献

筛选
英文 中文
A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC 基于ECC的物联网轻量级认证与密钥协商协议
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013341
Bing Li, Guohe Zhang, Shaochong Lei, H. Fu, Jinlei Wang
{"title":"A Lightweight Authentication and Key Agreement Protocol for IoT Based on ECC","authors":"Bing Li, Guohe Zhang, Shaochong Lei, H. Fu, Jinlei Wang","doi":"10.1109/IEEECONF52377.2022.10013341","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013341","url":null,"abstract":"The quick development of the Internet of Things (IoT) makes the IoT devices become appealing targets of various cyberattacks. Authentication and key agreement (AKA) protocol are the most important measures to ensure the security of IoT. However, it is still quite challenging to devise proper AKA protocols for IoT because of the resource-constrained nature of IoT devices. In this paper, we have proposed a new lightweight AKA protocol for IoT based on elliptic curve cryptography (ECC). Our proposed AKA protocol can achieve mutual authentication and ECC-based session key establishment simultaneously. To enhance security and provide anonymity, our protocol uses the one-time password and dynamic identity information which are updated in every round of mutual authentication through a well-designed update operation. To assess our protocol, we carry out security and performance analyses. The obtained results show that our protocol with a high level of security has low complexity and small computational cost and is appropriate to be applied in resource-constrained IoT devices.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114464662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching Design in Multi-IRS-UAV-assisted Multi-pair Anti-jamming Communication Networks 多红外-无人机辅助多对抗干扰通信网络的匹配设计
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013344
Z. Hou, Jin Chen, Guoxin Li, Yu-zhen Huang, Yifan Xu, Yuhua Xu
{"title":"Matching Design in Multi-IRS-UAV-assisted Multi-pair Anti-jamming Communication Networks","authors":"Z. Hou, Jin Chen, Guoxin Li, Yu-zhen Huang, Yifan Xu, Yuhua Xu","doi":"10.1109/IEEECONF52377.2022.10013344","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013344","url":null,"abstract":"This paper studies the matching optimization problem in multi-IRS-UAV-assisted multi-pair anti-jamming communication networks. The matching relationship between the transmitters and IRS-UAVs is formed to improve the overall anti-jamming performance, and we formulate it as a non-substitutable many-to-many matching problem. To solve this problem, we propose a low-complexity distributed matching-based optimization algorithm. Numerical results show that the proposed algorithm has a significant performance improvement than the random matching algorithm and is even close to optimal performance.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123483473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast recoverable heterogeneous quad-core lockstep architecture 快速可恢复异构四核锁步架构
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013101
Kai Liu, Yu Li, Ouyang Ling
{"title":"Fast recoverable heterogeneous quad-core lockstep architecture","authors":"Kai Liu, Yu Li, Ouyang Ling","doi":"10.1109/IEEECONF52377.2022.10013101","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013101","url":null,"abstract":"With the increasing demand of industry and automobile for reliability, various redundant software and hardware technologies are introduced into system design. In this paper, we present a fast recoverable heterogeneous quad-core lockstep architecture to mitigate single event upset (SEU) and common-mode failure(CMF) problems. Two ARM processors and Two RISC-V processors are integrated in a loosely-coupled lockstep mode and a recovery scheme is implemented without frequent processor context saving.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121514934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview of Relation Extraction 关系提取概述
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013099
Xuhui Song, Hongtao Yu, Shaomei Li, Xinbang Hu, Huansha Wang
{"title":"Overview of Relation Extraction","authors":"Xuhui Song, Hongtao Yu, Shaomei Li, Xinbang Hu, Huansha Wang","doi":"10.1109/IEEECONF52377.2022.10013099","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013099","url":null,"abstract":"With the rapid development of big data, information extraction has gradually become a hot research issue. As one of the sub tasks of information extraction, relation extraction is widely used in the fields of knowledge atlas, intelligent question answering and so on. According to the development history of relation extraction, this paper expounds relation extraction based on traditional machine learning, relation extraction based on deep learning and relation extraction in open domain, summarizes the representative research methods, models and achievements, and summarizes and prospects the possible research directions in the future.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125801444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of pseudolite supplemented geolocation system for universal receiver 通用接收机伪卫星辅助定位系统设计
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013350
B. Yang, Yongjun Liu, Chunxiao Dong, Bo Gao, Mei Tian, Yawei Ji
{"title":"Design of pseudolite supplemented geolocation system for universal receiver","authors":"B. Yang, Yongjun Liu, Chunxiao Dong, Bo Gao, Mei Tian, Yawei Ji","doi":"10.1109/IEEECONF52377.2022.10013350","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013350","url":null,"abstract":"Global navigation satellite system (GNSS) has been widely used around the world, but problems like low signal intensity or signal been blocked could often cause the users unable to collect enough satellite signal for position purpose. A pseudolite geolocation system is designed which can worked instead of non-line-of-sight (NLOS) satellites, cooperate with on orbit GNSS satellites. We detailed a novel pseudolite system consists and working progress. Through application scenario analysis and simulation we verified that pseudorange errors is the main factor affect position accuracy, therefore, we provide pseudolite testing and correction methods. In addition, we also verified that pseudolite can significantly improve positioning accuracy in high buildings around urban environment.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128808192","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method 基于插值多项式方法的物理层认证机制
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013332
Yong-Bing Zhang, Liang Jin, Qiang Han
{"title":"Physical Layer Authentication Mechanism Based on Interpolated Polynomial Method","authors":"Yong-Bing Zhang, Liang Jin, Qiang Han","doi":"10.1109/IEEECONF52377.2022.10013332","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013332","url":null,"abstract":"Most of the existing physical layer challenge-response authentication methods assume that the attacker does not have access to the channel information of both legitimate parties. Their security relies on the privacy of the wireless channel strongly. However, in the actual communication environment, the above assumption is difficult to guarantee that if the attacking party obtains the legitimate channel information, it can directly crack the key based on the authentication response. To address these problems, this paper proposes a physical layer authentication mechanism based on the interpolated polynomial method using polynomial interpolation. First, the authentication parties extract the wireless channel characteristics and combine them with the shared key to obtain the joint key. Then both parties use the same key pair to construct their respective curve equations by Newton interpolation polynomial. Subsequently, the sender randomly selects the data not in the joint key to substitute into the equation to construct the authentication vector and send it to the authenticating party. Finally, the authenticating party sets the authentication threshold according to the requirements and calculates the matching result based on the data in the authentication vector for judgment. The simulation results show that the method has great security and authentication success rate.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":" 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113948199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Deployment of Dynamic UAV Base Station based on Mobile Users 基于移动用户的动态无人机基站三维部署
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013331
Fangxu Lu, Zhichao Mi, Ning Zhao, Hai Wang, Yulu Tian
{"title":"3D Deployment of Dynamic UAV Base Station based on Mobile Users","authors":"Fangxu Lu, Zhichao Mi, Ning Zhao, Hai Wang, Yulu Tian","doi":"10.1109/IEEECONF52377.2022.10013331","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013331","url":null,"abstract":"The deployment of multiple dynamic rotary-wing UAV base stations is studied for moving users. The cumulative utility of the communication network is maximized by adding and applying the three paremeters of the UAV base stations in terms of total channel transmission rate, mobile energy consumption, and coverage utility. The UAV base station performs different motions in different time slots, which translates the process into a Markov decision process. Since the user moves randomly within the time slot, the reward function value of the “next two steps” of the dynamic UAV base station is considered. The mobility prediction of the user is taken into account to some extent, and finally the mobile strategy of the UAV base station within the current time slot is selected comprehensively. The simulation results show that the improved algorithm is effective in achieving the best coverage of the UAV base station.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"17 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113931814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Physical layer key generation for non-codebook transmission mode of 5G TDD system 5G TDD系统非码本传输模式的物理层密钥生成
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013102
Zhi Cao, Liang Jin, Qian Han
{"title":"Physical layer key generation for non-codebook transmission mode of 5G TDD system","authors":"Zhi Cao, Liang Jin, Qian Han","doi":"10.1109/IEEECONF52377.2022.10013102","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013102","url":null,"abstract":"The design and analysis of traditional physical layer key generation schemes are mostly based on the general communication models. They did not really consider the actual communication scenarios, such as 5G communication. This paper proposed a physical layer key generation scheme for 5G TDD system in non-codebook transmission mode. In our scheme, the gNB uses SRS to complete downlink channel estimation and generates an adapted precoding matrix to assist the downlink signal transmission. Based on existing parameters obtained in the precoding matrix generation, the gNB predicts the signal received by the UE and uses it as a shared source of randomness. The whole process conforms to the 5G protocol. The key extraction can be completed during the interaction between the communication parties, realizing the unity of security and communication.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127056869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-performance optimization of SM4-GCM based on FPGA 基于FPGA的SM4-GCM的高性能优化
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013330
S. Lv, Bin Li, Xiaojie Chen, Qinglei Zhou
{"title":"High-performance optimization of SM4-GCM based on FPGA","authors":"S. Lv, Bin Li, Xiaojie Chen, Qinglei Zhou","doi":"10.1109/IEEECONF52377.2022.10013330","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013330","url":null,"abstract":"SM4-GCM is an encryption algorithm with authentication function. The algorithm achieves the purpose of data security and information integrity. The SM4-GCM algorithm, implemented using traditional software methods, has low throughput and high resource consumption. In order to further improve the algorithm performance, this paper uses FPGA to optimize the SM4-GCM algorithm to achieve full-pipeline parallel acceleration. Firstly, the SM4 module is optimized using pipelining techniques. Then, the GHASH module is optimized using the Karatsuba algorithm and fast reduction. Finally, a loosely coupled architecture is used to connect various modules with asynchronous FIFOs, which improves the resource utilization and throughput of the FPGA circuit. The experimental results show that the throughput of the optimized SM4-GCM algorithm reaches 28.8 Gbps. It is better than other schemes, has a higher throughput, and meets the actual application requirements.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133860431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Localization Algorithm Based on UAV Platform 基于无人机平台的协同定位算法
2021 International Conference on Advanced Computing and Endogenous Security Pub Date : 2022-04-21 DOI: 10.1109/IEEECONF52377.2022.10013095
Lu Zhang, Jianbo Yang, Ziyan Zhang, Peng Cai
{"title":"A Cooperative Localization Algorithm Based on UAV Platform","authors":"Lu Zhang, Jianbo Yang, Ziyan Zhang, Peng Cai","doi":"10.1109/IEEECONF52377.2022.10013095","DOIUrl":"https://doi.org/10.1109/IEEECONF52377.2022.10013095","url":null,"abstract":"Aiming at the location of fixed radiation source, a cooperative location method combining TDOA location and FDOA (frequency difference location) is proposed based on UAV platform and directional antenna. Firstly, relying on the directional antenna of the UAV platform and based on the received signal strength, the method roughly locates the radiation source and searches the best location point, so that the radiation source is located at the vertical position of the two location points; Then, according to the TDOA location and FDOA algorithms, the emitter location is calculated cooperatively; Finally, the positioning accuracy is simulated and analyzed. The results show that when the time difference measurement and frequency difference measurement are controlled within a certain range, the error of joint positioning can be controlled in a small range, which is inversely proportional to the distance between the two positioning points and directly proportional to the distance between the radiation source and the positioning point. This method makes full use of the UAV mobile search function to optimize the positioning points, and then cooperates with TDOA and frequency difference positioning, which can effectively improve the positioning efficiency while reducing the point position error.","PeriodicalId":193681,"journal":{"name":"2021 International Conference on Advanced Computing and Endogenous Security","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117135152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信