{"title":"Securing Domain Name System Combined with MIPv6 for Mobile Hosts","authors":"Younchan Jung, Marnel S. Peradilla, W. Atwood","doi":"10.1109/TrustCom.2013.26","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.26","url":null,"abstract":"DNS is the standard mechanism for name to IP address resolution. The DNS has been extended to DNSSEC to add security by providing origin authentication and data integrity by the process of creating signatures periodically, which results in intensive computations. Adding digital signatures to a domain increases each record size by 5-7 times, which puts a burden of DNS reply messages on the authoritative name servers. The goal of this paper is to find secure DNS mechanism, which cause relatively low computation loads and reply burden especially for infrastructure mode MANET gateways that are responsible for name resolution services as well as local mobility management for mobile hosts. This paper proposes SECDNS (Secure DNS) mechanism that handles secure query/reply transactions using the one-time session key generated per a query basis. In the proposed SECDNS, burden for securing DNS is distributed for every DNS queries. We analyze how many SECDNS transactions can the session key with a given length handle and suggest the solution of the anti-MITM attack scheme, which protects the name resolution services against the possible MITM attacks and make it useless for the enemy to decrypt the SECDNS reply messages in time.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121310006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nelcileno V. S. Araujo, R. Oliveira, E. T. Ferreira, V. Nascimento, A. Shinoda, B. Bhargava
{"title":"Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks","authors":"Nelcileno V. S. Araujo, R. Oliveira, E. T. Ferreira, V. Nascimento, A. Shinoda, B. Bhargava","doi":"10.1109/TrustCom.2013.37","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.37","url":null,"abstract":"Intrusions in computer networks have driven the development of various techniques for intrusion detection systems (IDSs). In general, the existing approaches seek two goals: high detection rate and low false alarm rate. The problem with such proposed solutions is that they are usually processing intensive due to the large size of the training set in place. We propose a technique that combines a fuzzy ARTMAP neural network with the well-known Kappa coefficient to perform feature selection. By adding the Kappa coefficient to the feature selection process, we managed to reduce the training set substantially. The evaluation results show that our proposal is capable of detecting intrusions with high accuracy rates while keeping the computational cost low.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks","authors":"Zhongwei Chen, Ruihua Zhang, Lei Ju, Wei Wang","doi":"10.1109/TrustCom.2013.185","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.185","url":null,"abstract":"In wireless sensor network (WSN), many low cost sensor nodes are deployed over a geographically limited area without well-established infrastructure. They accomplish the task together. Malicious sensor nodes are well disguised in sensor nodes, so they can attack the whole network using the natural cooperation of WSN. In order to detect malicious nodes and enhance the security of network, this paper presents a novel multivalued trust routing protocol, called MTR, which is based on the concept of sensor's trust and level in topology structure of network. Protocol MTR employs sensor's trust and the number of hops from sensor nodes to Base Station (BS) to ensure the stability of the net. The simulation results show that protocol MTR significantly improves the reliability data transmission to BS and the time to live in the present of compromise nodes.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Reliability-Based Trust Management Mechanism for Cloud Services","authors":"Wenjuan Fan, H. Perros","doi":"10.1109/TRUSTCOM.2013.194","DOIUrl":"https://doi.org/10.1109/TRUSTCOM.2013.194","url":null,"abstract":"With the increasing demand for cloud services, trust management has become a challenging and important issue in a cloud computing environment. In a trust management mechanism, trust feedback is used to derive trust evaluation results. However, the reliability of the trust feedback from cloud service users needs to be considered, because unreliable trust feedback can produce wrong trust results. In this paper, we first propose a trust management framework for cloud computing environments, and then we introduce an effective reliability-based filtering mechanism to ensure the reliability of trust feedback for cloud computing services. The filtering mechanism uses two important factors, namely, familiarity and consistency, to filter out unreliable trust feedback. Our experiments show that our proposed reliability-based trust management mechanism is effective.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Location Management Algorithm for LEO Satellite Networks","authors":"Yanpeng Ma, Wei Peng, Xiaofeng Wang, Bao-kang Zhao, Jinshu Su, Chunqing Wu","doi":"10.1109/TrustCom.2013.164","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.164","url":null,"abstract":"Location management is a challenging issue for datagram service in LEO satellite constellation networks due to ceaseless satellite handover of land mobile nodes. With the aid of GEO satellites, a novel location management system is proposed. Mathematical analysis and simulations have been done to evaluate the performance of the proposed system.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High Radix Montgomery Modular Multiplier on Modern FPGA","authors":"Pingjian Wang, Zongbin Liu, Lei Wang, Neng Gao","doi":"10.1109/TrustCom.2013.180","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.180","url":null,"abstract":"Montgomery algorithm is the most common mechanism for implementing modular multiplication. This work proposes a new systolic architecture to perform high radix Montgomery algorithm on modern FPGA, which is rich in dedicated hardcore multiplier resources, and the new architecture is suitable to be used in public key coprocessors. In the modern FPGA application design, using dedicated hardcore in FPGA is the recommended designing ideas. In this work, by following this new design concept, the new multiplier architecture can reach to a high throughput. Compared with the same architecture work, the improved architecture saves nearly half of the dedicated multiplier in FPGA.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigating Malicious Updates: Prevention of Insider Threat to Databases","authors":"Harini Ragavan, B. Panda","doi":"10.1109/TrustCom.2013.95","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.95","url":null,"abstract":"Insider threats cause serious damage to data in any organization and is considered as a grave issue. In spite of the presence of threat prevention mechanisms, insiders can continue to attack a database by figuring out the dependency relationships among data items. Thus, examining write operations performed by an insider by taking advantage of dependencies aids in mitigating insider threats. We have developed two attack prevention models, which involve logs and dependency graphs respectively, to monitor data items and prevent malicious operations on them. The developed algorithms have been implemented on a simulated database and the results show that the models effectively mitigate insider threats arising from write operations.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Long Wang, Rubing Duan, Xiaorong Li, Sifei Lu, T. Hung, R. Calheiros, R. Buyya
{"title":"An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds","authors":"Long Wang, Rubing Duan, Xiaorong Li, Sifei Lu, T. Hung, R. Calheiros, R. Buyya","doi":"10.1109/TrustCom.2013.128","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.128","url":null,"abstract":"As more and more data can be generated at a faster-than-ever rate nowadays, it becomes a challenge to processing large volumes of data for complex data analysis. In order to address performance and cost issues of big data processing on clouds, we present a novel design of adaptive workflow management system which includes a data mining based prediction model, workflow scheduler, and iteration controls to optimize the data processing via iterative workflow tasks. We proposed a new heuristic algorithm, called Upgrade Fit, which dynamically and continuously reallocates multiple types of cloud resources to fulfill the performance and cost requirements. The iterative workflow tasks can be bursty bags of tasks to be executed repetitively for data processing. A real application of weather forecast workflow has been used to evaluate the capability of our system for large volume image data processing. Experimental system has been set up and the results indicate that the system can effectively handle multiple types of cloud resources and optimize the performance iteratively.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Andreas Huebner, Christian Facchi, Markus Meyer, H. Janicke
{"title":"A Model-Based Approach for RFID Application Testing","authors":"Andreas Huebner, Christian Facchi, Markus Meyer, H. Janicke","doi":"10.1109/TrustCom.2013.181","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.181","url":null,"abstract":"A new approach for testing Radio Frequency Identification applications is presented in this paper. Therefore, a set based semantics is introduced to describe RFID applications. The approach uses UML to model the characteristics of the system under test. The combination of three different model-types, which consist of a Domain Model, a Movement Model and Process Models, allows for the extraction of test cases and the evaluation of functional aspects of the application under test. This model-based test approach is validated on an example case study, of processes in a retail clothing shop.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps","authors":"Z. Baig, Saif Ahmad, S. M. Sait","doi":"10.1109/TrustCom.2013.196","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.196","url":null,"abstract":"The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131931625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}