2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications最新文献

筛选
英文 中文
Securing Domain Name System Combined with MIPv6 for Mobile Hosts 移动主机结合MIPv6的安全域名系统
Younchan Jung, Marnel S. Peradilla, W. Atwood
{"title":"Securing Domain Name System Combined with MIPv6 for Mobile Hosts","authors":"Younchan Jung, Marnel S. Peradilla, W. Atwood","doi":"10.1109/TrustCom.2013.26","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.26","url":null,"abstract":"DNS is the standard mechanism for name to IP address resolution. The DNS has been extended to DNSSEC to add security by providing origin authentication and data integrity by the process of creating signatures periodically, which results in intensive computations. Adding digital signatures to a domain increases each record size by 5-7 times, which puts a burden of DNS reply messages on the authoritative name servers. The goal of this paper is to find secure DNS mechanism, which cause relatively low computation loads and reply burden especially for infrastructure mode MANET gateways that are responsible for name resolution services as well as local mobility management for mobile hosts. This paper proposes SECDNS (Secure DNS) mechanism that handles secure query/reply transactions using the one-time session key generated per a query basis. In the proposed SECDNS, burden for securing DNS is distributed for every DNS queries. We analyze how many SECDNS transactions can the session key with a given length handle and suggest the solution of the anti-MITM attack scheme, which protects the name resolution services against the possible MITM attacks and make it useless for the enemy to decrypt the SECDNS reply messages in time.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121310006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks 基于特征选择的计算机网络入侵检测方法
Nelcileno V. S. Araujo, R. Oliveira, E. T. Ferreira, V. Nascimento, A. Shinoda, B. Bhargava
{"title":"Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks","authors":"Nelcileno V. S. Araujo, R. Oliveira, E. T. Ferreira, V. Nascimento, A. Shinoda, B. Bhargava","doi":"10.1109/TrustCom.2013.37","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.37","url":null,"abstract":"Intrusions in computer networks have driven the development of various techniques for intrusion detection systems (IDSs). In general, the existing approaches seek two goals: high detection rate and low false alarm rate. The problem with such proposed solutions is that they are usually processing intensive due to the large size of the training set in place. We propose a technique that combines a fuzzy ARTMAP neural network with the well-known Kappa coefficient to perform feature selection. By adding the Kappa coefficient to the feature selection process, we managed to reduce the training set substantially. The evaluation results show that our proposal is capable of detecting intrusions with high accuracy rates while keeping the computational cost low.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125194324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks 基于拓扑层次的无线传感器网络多值信任路由
Zhongwei Chen, Ruihua Zhang, Lei Ju, Wei Wang
{"title":"Multivalued Trust Routing Based on Topology Level for Wireless Sensor Networks","authors":"Zhongwei Chen, Ruihua Zhang, Lei Ju, Wei Wang","doi":"10.1109/TrustCom.2013.185","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.185","url":null,"abstract":"In wireless sensor network (WSN), many low cost sensor nodes are deployed over a geographically limited area without well-established infrastructure. They accomplish the task together. Malicious sensor nodes are well disguised in sensor nodes, so they can attack the whole network using the natural cooperation of WSN. In order to detect malicious nodes and enhance the security of network, this paper presents a novel multivalued trust routing protocol, called MTR, which is based on the concept of sensor's trust and level in topology structure of network. Protocol MTR employs sensor's trust and the number of hops from sensor nodes to Base Station (BS) to ensure the stability of the net. The simulation results show that protocol MTR significantly improves the reliability data transmission to BS and the time to live in the present of compromise nodes.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125259759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Reliability-Based Trust Management Mechanism for Cloud Services 基于可靠性的云服务信任管理机制
Wenjuan Fan, H. Perros
{"title":"A Reliability-Based Trust Management Mechanism for Cloud Services","authors":"Wenjuan Fan, H. Perros","doi":"10.1109/TRUSTCOM.2013.194","DOIUrl":"https://doi.org/10.1109/TRUSTCOM.2013.194","url":null,"abstract":"With the increasing demand for cloud services, trust management has become a challenging and important issue in a cloud computing environment. In a trust management mechanism, trust feedback is used to derive trust evaluation results. However, the reliability of the trust feedback from cloud service users needs to be considered, because unreliable trust feedback can produce wrong trust results. In this paper, we first propose a trust management framework for cloud computing environments, and then we introduce an effective reliability-based filtering mechanism to ensure the reliability of trust feedback for cloud computing services. The filtering mechanism uses two important factors, namely, familiarity and consistency, to filter out unreliable trust feedback. Our experiments show that our proposed reliability-based trust management mechanism is effective.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122507005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Location Management Algorithm for LEO Satellite Networks 一种低轨道卫星网络位置管理算法
Yanpeng Ma, Wei Peng, Xiaofeng Wang, Bao-kang Zhao, Jinshu Su, Chunqing Wu
{"title":"A Location Management Algorithm for LEO Satellite Networks","authors":"Yanpeng Ma, Wei Peng, Xiaofeng Wang, Bao-kang Zhao, Jinshu Su, Chunqing Wu","doi":"10.1109/TrustCom.2013.164","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.164","url":null,"abstract":"Location management is a challenging issue for datagram service in LEO satellite constellation networks due to ceaseless satellite handover of land mobile nodes. With the aid of GEO satellites, a novel location management system is proposed. Mathematical analysis and simulations have been done to evaluate the performance of the proposed system.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"239 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122869281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
High Radix Montgomery Modular Multiplier on Modern FPGA 基于现代FPGA的高基数蒙哥马利模乘法器
Pingjian Wang, Zongbin Liu, Lei Wang, Neng Gao
{"title":"High Radix Montgomery Modular Multiplier on Modern FPGA","authors":"Pingjian Wang, Zongbin Liu, Lei Wang, Neng Gao","doi":"10.1109/TrustCom.2013.180","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.180","url":null,"abstract":"Montgomery algorithm is the most common mechanism for implementing modular multiplication. This work proposes a new systolic architecture to perform high radix Montgomery algorithm on modern FPGA, which is rich in dedicated hardcore multiplier resources, and the new architecture is suitable to be used in public key coprocessors. In the modern FPGA application design, using dedicated hardcore in FPGA is the recommended designing ideas. In this work, by following this new design concept, the new multiplier architecture can reach to a high throughput. Compared with the same architecture work, the improved architecture saves nearly half of the dedicated multiplier in FPGA.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127012530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Mitigating Malicious Updates: Prevention of Insider Threat to Databases 减轻恶意更新:防止数据库的内部威胁
Harini Ragavan, B. Panda
{"title":"Mitigating Malicious Updates: Prevention of Insider Threat to Databases","authors":"Harini Ragavan, B. Panda","doi":"10.1109/TrustCom.2013.95","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.95","url":null,"abstract":"Insider threats cause serious damage to data in any organization and is considered as a grave issue. In spite of the presence of threat prevention mechanisms, insiders can continue to attack a database by figuring out the dependency relationships among data items. Thus, examining write operations performed by an insider by taking advantage of dependencies aids in mitigating insider threats. We have developed two attack prevention models, which involve logs and dependency graphs respectively, to monitor data items and prevent malicious operations on them. The developed algorithms have been implemented on a simulated database and the results show that the models effectively mitigate insider threats arising from write operations.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121850361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds 计算云中自适应工作流管理的迭代优化框架
Long Wang, Rubing Duan, Xiaorong Li, Sifei Lu, T. Hung, R. Calheiros, R. Buyya
{"title":"An Iterative Optimization Framework for Adaptive Workflow Management in Computational Clouds","authors":"Long Wang, Rubing Duan, Xiaorong Li, Sifei Lu, T. Hung, R. Calheiros, R. Buyya","doi":"10.1109/TrustCom.2013.128","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.128","url":null,"abstract":"As more and more data can be generated at a faster-than-ever rate nowadays, it becomes a challenge to processing large volumes of data for complex data analysis. In order to address performance and cost issues of big data processing on clouds, we present a novel design of adaptive workflow management system which includes a data mining based prediction model, workflow scheduler, and iteration controls to optimize the data processing via iterative workflow tasks. We proposed a new heuristic algorithm, called Upgrade Fit, which dynamically and continuously reallocates multiple types of cloud resources to fulfill the performance and cost requirements. The iterative workflow tasks can be bursty bags of tasks to be executed repetitively for data processing. A real application of weather forecast workflow has been used to evaluate the capability of our system for large volume image data processing. Experimental system has been set up and the results indicate that the system can effectively handle multiple types of cloud resources and optimize the performance iteratively.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128046710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
A Model-Based Approach for RFID Application Testing 基于模型的RFID应用测试方法
Andreas Huebner, Christian Facchi, Markus Meyer, H. Janicke
{"title":"A Model-Based Approach for RFID Application Testing","authors":"Andreas Huebner, Christian Facchi, Markus Meyer, H. Janicke","doi":"10.1109/TrustCom.2013.181","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.181","url":null,"abstract":"A new approach for testing Radio Frequency Identification applications is presented in this paper. Therefore, a set based semantics is introduced to describe RFID applications. The approach uses UML to model the characteristics of the system under test. The combination of three different model-types, which consist of a Domain Model, a Movement Model and Process Models, allows for the extraction of test cases and the evaluation of functional aspects of the application under test. This model-based test approach is validated on an example case study, of processes in a retail clothing shop.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133947561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps 利用自组织地图检测智能电网通信基础设施中的侵入性活动
Z. Baig, Saif Ahmad, S. M. Sait
{"title":"Detecting Intrusive Activity in the Smart Grid Communications Infrastructure Using Self-Organizing Maps","authors":"Z. Baig, Saif Ahmad, S. M. Sait","doi":"10.1109/TrustCom.2013.196","DOIUrl":"https://doi.org/10.1109/TrustCom.2013.196","url":null,"abstract":"The Smart Grid Infrastructure (SGI) provides for sustainable, affordable and uninterrupted electricity supply to consumers. The communications infrastructure of the SGI is prone to several malicious attacks identified in the recent past. Customer-specific electricity readings are communicated up the SGI hierarchy from consumer devices to centralized servers through intermediary devices such as smart meters and data concentrators/aggregators. In this paper, we model the attacks against the home area network of the SGI, through definition and generation of routine device behaviors. Any observed deviation from the defined normal profile is labeled as a malicious attack. Subsequently, we propose a Self-Organizing Map (SOM)-based approach towards training and testing of centralized SGI devices to qualify them for identifying anomalies accurately. The proposed scheme is capable of detecting anomalous readings within a consumer's household, with reasonable accuracies.","PeriodicalId":206739,"journal":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131931625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信