2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
Information Security Routing Protocol in the WSN WSN中的信息安全路由协议
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.260
Li Wei, Chengwu Ming, Liu Mingming
{"title":"Information Security Routing Protocol in the WSN","authors":"Li Wei, Chengwu Ming, Liu Mingming","doi":"10.1109/IAS.2009.260","DOIUrl":"https://doi.org/10.1109/IAS.2009.260","url":null,"abstract":"With the development and wide application of WSN (Wireless Sensor Network), the information security becomes a serious problem, especially when the WSN applied in military field. Whereas the general WSN routing protocols focus on the transmission efficiency, reliability and energy-efficiency, not on the security. This paper integrates the international popular AES encryption standard, RSA public-key encryption mechanism and digital signature technology to improve classic AODV routing protocol, and shows an SAODV routing protocol which has both energy efficiency and information security. The theoretical analysis and simulation show: when adding security mechanism to AODV in the routing layer, the system owns the defensive ability for the hidden security problem, such as the eavesdropping, coaxing, imitation, replay, denial of service and HELLO diffusion etc and the normal performance of the network almost conform to the AODV protocol.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Paper Study of Embedded System Design Based on RFID Securities 基于RFID证券的嵌入式系统设计研究
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.199
Ling-feng Shi, X. Lai, Bao-Long Guo
{"title":"Paper Study of Embedded System Design Based on RFID Securities","authors":"Ling-feng Shi, X. Lai, Bao-Long Guo","doi":"10.1109/IAS.2009.199","DOIUrl":"https://doi.org/10.1109/IAS.2009.199","url":null,"abstract":"The paper presents embedded system design project based on RFID (Radio-Frequency Identification) securities. The project adopts RFID to complete reading and writing tags, and embedded system to implement system control, communication, signal processing, showing results, human-computer interaction, and so on. Module of RFID is made of MFCR500 of Philips, AT89S52 of Atmel, and integrated antenna. The embedded system is made of S3C2410 as kernel chip from Samsung. The whole system integrates portable securities, communication, and distribution management.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
One-way Hash Function Construction Based on Conservative Chaotic Systems 基于保守混沌系统的单向哈希函数构造
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.209
Qing-hua Zhang, Han Zhang, Z. Li
{"title":"One-way Hash Function Construction Based on Conservative Chaotic Systems","authors":"Qing-hua Zhang, Han Zhang, Z. Li","doi":"10.1109/IAS.2009.209","DOIUrl":"https://doi.org/10.1109/IAS.2009.209","url":null,"abstract":"An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length and each message block is iterated some times through standard map. Both the iterations results of every round and the plaintext block determine the two initial values and the steps of iterations in next round. Some items of the result in the final round are chosen to be transformed into Hash value of 128 bits. Theoretical analysis and computer simulation show that this algorithm has good effect in irreversibility, weak collision and sensitivity to initial values. The method is safer in security than the Hash function based on low- dimensional dissipative chaotic maps and it is easy to realize.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114399020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling 基于辐射源尺度的红外焦平面成像非均匀性校正算法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.110
En-ke Li, Shangqian Liu, Shimin Yin, Xiao-ning Fu
{"title":"Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling","authors":"En-ke Li, Shangqian Liu, Shimin Yin, Xiao-ning Fu","doi":"10.1109/IAS.2009.110","DOIUrl":"https://doi.org/10.1109/IAS.2009.110","url":null,"abstract":"Mathematical method was studied for the non-uniformity correction of IRFPA based on radiation source scaling for the engineering applications of infrared imaging system. It is indicated that the complicated engineering problem can be solved by the method of function interpolation or function fitting. Some dependent correction algorithms are derived based on this principle, such as cubic spline function interpolation, B-spline function least squares fitting and polynomial least squares fitting. These algorithms are proved by experiments that they can highly adapt to the broad dynamic range and non-linearity of IRFPA and are suitable for engineering applications with fast computing speed and high calibration precision.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128591529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hierarchical Distributed Alert Correlation Model 分层分布式警报关联模型
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.26
Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang
{"title":"Hierarchical Distributed Alert Correlation Model","authors":"Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang","doi":"10.1109/IAS.2009.26","DOIUrl":"https://doi.org/10.1109/IAS.2009.26","url":null,"abstract":"Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurring or attempted intrusions and highly improve security expert’s work efficiency. Traditional alert correlation system adopts a centralized architecture which can be easily over flooded by the raw alarms. To address this issue, a distributed alert correlation model based on hierarchical architecture is proposed. This model greatly improves the performance of alert correlation through integrating three novel methods. The experiments show effectiveness of this alert correlation model on 2000 DARPA intrusion detection scenario specific datasets.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors 一种基于正交向量的高效分层群密钥管理方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.237
Junchang Wang, X. Lin
{"title":"An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors","authors":"Junchang Wang, X. Lin","doi":"10.1109/IAS.2009.237","DOIUrl":"https://doi.org/10.1109/IAS.2009.237","url":null,"abstract":"This paper proposes a novel orthogonal algorithm and protocol of efficient group key management for secure multicast in distributed systems. In the proposed method, the sever only requires to multicast to update the group key after a subgroup or a user left and therefore bandwidth is reduced effectively. The nice features of the proposed scheme include few messages required in updating and almost instant reception of the new key information. Performance evaluation for the proposed scheme is also presented to show the superiority of the proposed method.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Role and Activity Based Access Control Model for University Identity and Access Management System 基于角色和活动的大学身份与访问管理系统访问控制模型
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.43
Shuliang Zheng, D. Jiang, Qixin Liu
{"title":"A Role and Activity Based Access Control Model for University Identity and Access Management System","authors":"Shuliang Zheng, D. Jiang, Qixin Liu","doi":"10.1109/IAS.2009.43","DOIUrl":"https://doi.org/10.1109/IAS.2009.43","url":null,"abstract":"Although RBAC model has received broad support as a generalized access control solution, it has several innate limitations. We propose a Role and Activity Based Access Control model called R-ABAC, which extends the traditional RBAC model with the notion of participation, act and activity. An activity is an abstraction of the application environment, and organizes participations and acts as a digraph for expressing dependency of activity steps, as well as containing rich context information such as time, location and system status. An implementation of R-ABAC model has been applied to a university unified identity and access management system (UIAMS).","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards 一个增强的远程用户认证方案,为智能卡提供相互认证和密钥协议
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.17
Chun-Ta Li
{"title":"An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards","authors":"Chun-Ta Li","doi":"10.1109/IAS.2009.17","DOIUrl":"https://doi.org/10.1109/IAS.2009.17","url":null,"abstract":"In 2005, Yoon et al. proposed a user-friendly remote user authentication scheme using smart cards. The security of their scheme is based on one-way hash function and they claimed that their scheme is secured from attacks and achievable for proving mutual authentication, freely choosing password, no verification tables, and involving very lightweight hashing operations. However, we find that Yoon et al.’s scheme suffers from the denial of service attack and performs only unilateral authentication (only user authentication). In this paper we consequently propose an enhanced version to eliminate the vulnerability. Furthermore, our enhanced scheme can also provide mutual authentication and key agreement between a remote server and login users.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol 无证书单向认证双方密钥协议
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.183
Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang
{"title":"Certificateless One-Way Authenticated Two-Party Key Agreement Protocol","authors":"Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang","doi":"10.1109/IAS.2009.183","DOIUrl":"https://doi.org/10.1109/IAS.2009.183","url":null,"abstract":"Key agreement is one of the fundamental cryptographic primitives in public key cryptography. It plays an important role for securing systems in practice. In this paper, we present the first certificateless One-Way authenticated Two-Party key agreement protocol. The security of the proposed protocol is analyzed based on the intractability of the standard discrete logarithm (DL) and bilinear Diffie-Hellman (BDH) problems. For efficiency, our protocol enjoys low complexity in both communication and computation.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123929003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Testability Analysis of Grounding Grids Using Network Transformation 基于网络变换的接地网可测试性分析
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.238
Tao Niu, Yingjia Zhang, D. Zhang, Liqiang Liu, Xianjue Luo
{"title":"Testability Analysis of Grounding Grids Using Network Transformation","authors":"Tao Niu, Yingjia Zhang, D. Zhang, Liqiang Liu, Xianjue Luo","doi":"10.1109/IAS.2009.238","DOIUrl":"https://doi.org/10.1109/IAS.2009.238","url":null,"abstract":"A novel topology analysis method is presented to analyze the testability of grounding grids, and creditability is firstly proposed as an important index to evaluate the results. In this method, inaccessible nodes are eliminated by wye-delta transformation, followed by the calculation of testability and creditability index in the reverse direction. Simulation results are provided to prove this method.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信