Shijie Wang, Yuanyuan Gao, Nan Sha, Guangna Zhang, Huadong Luo, Yi Chen
{"title":"Physical Layer Security in Two-tier Heterogeneous Cellular Networks over Nakagami Channel during Uplink Phase","authors":"Shijie Wang, Yuanyuan Gao, Nan Sha, Guangna Zhang, Huadong Luo, Yi Chen","doi":"10.1109/ICCSN.2018.8488329","DOIUrl":"https://doi.org/10.1109/ICCSN.2018.8488329","url":null,"abstract":"In this paper, we study the connection and secrecy performance under two-tier cellular network during uplink phase, where both large-scale factor (path propagation loss) and small-scale factor (Nakagami fading) are considered, which are beyond the scope of the existing works. Analytical expressions of network connection and secrecy probabilities are derived, which are validated through Monte Carlo simulations. Numerical results reveal that the theoretical expressions of connection and secrecy probabilities are in good agreement with simulation results. Moreover, simulation results demonstrate that larger m value, which means stronger LOS component, leads to a worse connection performance, but a better secrecy secrecy performance.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123710279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dong-shan Wang, Yue Ma, Jiang Du, Yutong Ji, Yanbin Song
{"title":"Security-Enhanced Signaling Scheme in Software Defined Optical Network","authors":"Dong-shan Wang, Yue Ma, Jiang Du, Yutong Ji, Yanbin Song","doi":"10.1109/iccsn.2018.8488276","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488276","url":null,"abstract":"The communication security issue is of great importance and should not be ignored in backbone optical networks which is undergoing the evolution toward software defined networks (SDN). With the aim to solve this problem, this paper conducts deep analysis into the security challenge of software defined optical networks (SDON) and proposes a so-called security-enhanced signaling scheme of SDON. The proposed scheme makes full advantage of current OpenFIow protocol with some necessary extensions and security improvement, by combining digital signatures and message feedback with efficient PKI (Public Key Infrastructure) in signaling procedure of OpenFIow interaction. Thus, this security-enhanced signaling procedure is also designed in details to make sure the end-to-end trusted service connection. Simulation results show that this proposed approach can greatly improve the security level of large-scale optical network for Energy Internet services with better performance in term of connection success rate performance.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130276061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinrui Lin, Rong Xu, Haiyu Zeng, Guangxia Li, Shiwei Tian
{"title":"Optimization of Power Allocation Based on Cooperative Game in Wireless Location Network","authors":"Jinrui Lin, Rong Xu, Haiyu Zeng, Guangxia Li, Shiwei Tian","doi":"10.1109/iccsn.2018.8488265","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488265","url":null,"abstract":"For a wireless location network using ultra-wideband signals, the positioning accuracy of the network is affected by the transmission power of the anchors when the power resources are limited. The square position error bound is introduced as the standard of the positioning accuracy of the network, and a functional model of the square position error bound of the network and the transmission power of the anchors is established. Based on this model, a power optimization allocation algorithm based on cooperative game was proposed to achieve the goal of improving positioning accuracy. Simulation results show that the algorithm reduces the square position error bound of the network, which effectively improves the positioning accuracy.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129627542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Active Android Application Repacking Detection Approach","authors":"Xin Sun, Jiajia Han, Hua Dai, Qinyuan Li","doi":"10.1109/iccsn.2018.8488263","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488263","url":null,"abstract":"Repackaging applications as the main carrier of Android malware have caused huge losses to users. In addition, the third-party application market that Android applications rely on is characterized by missing audits and lax supervision, which further encourages the distribution of repackaged applications. Most of the traditional repackaging detection approaches need to rely on a third-party detection platform to passively determine whether or not the Android application is repackaged, which has a high false negative rate. In order to solve the problem, this paper proposes an active detection approach for Android code repacking. The approach embeds code watermarking with the detection code into the appropriate conditional branch code block by means of dynamic loading to achieve the hidden purpose. Then, the active detection approach compares the consistency of the runtime application signature and the original code watermarking signature to realize the code repackaging recognition. Finally, this work takes eight different types of Android applications from Github on three different mobile phones to verify the validity of the approach. Experimental results show that an Android application containing a selfdetecting code watermarking can effectively perform repackaging detection without relying on third parties.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121833883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A New Sclera Segmentation and Vessels Extraction Method for Sclera Recognition","authors":"Wei Dong, Han Zhou, Dong Xu","doi":"10.1109/ICCSN.2018.8488229","DOIUrl":"https://doi.org/10.1109/ICCSN.2018.8488229","url":null,"abstract":"As a unique biometric trait, the research of sclera blood vessels have becomes active recently, because the sclera vessels can be captured under visible-wavelength light condition rather than near infrared light condition. However, the performance of sclera identification system degrades a lot due to unsatisfactory sclera segmentation and tedious extraction process. In this paper, we propose a novel sclera segmentation algorithm and an improved sclera vessels extraction method. The accurate and efficient sclera segmentation method is proposed based on improved OSTU algorithm. Besides, the vessels extraction method is put forward by adaptive histogram equalization method and Gabor filters. The experimental results on UBIRIS.vl database prove that the proposed sclera vessels extraction algorithm performs well and the sclera segmentation method has an obvious improvement in terms of efficiency and accuracy over than other segmentation algorithms.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126782894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Routing Strategy Based on Network Coding Under Energy Constraint in MDTN","authors":"Yajuan Li, Xiangyu Bai, Xiaojuan Zhang","doi":"10.1109/ICCSN.2018.8488257","DOIUrl":"https://doi.org/10.1109/ICCSN.2018.8488257","url":null,"abstract":"The mobile delay tolerant network has some features results in transmit message is limited in one touch. In order to transmit more messages in one touch, network encoding technology is introduced. It effectively improves this problem. The mobile devices in the mobile delay tolerant network have the advantages of mobility, portability, but there are also problems, such as: limited energy, node sociality. When the energy of the node in the network is exhausted, it will affect the performance of the network. Therefore, the introduction of energy management strategies into the network coding routing strategy is of great significance to the performance improvement of the mobile delay tolerant network. In this paper, through the ONE to achieve the routing strategy proposed in this paper, and then compared with some existing routing strategy. Experimental results show that the routing strategy proposed in this paper can effectively improve the rate of message delivery, reduce delay, and reduce network overhead.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126257294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Can a Network Distribute Video Programs","authors":"Junyi Men, Xingjun Wang","doi":"10.1109/iccsn.2018.8488310","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488310","url":null,"abstract":"The network traffic, especially the video streaming traffic, has been increasing dramatically in recent years and this trend is deemed to continue for the foreseeable future. Video-On-Demand (VOD) is a promising technology for many important applications, and has become more and more popular among users. However, it suffers from several key problems: the network congestion, the increasing latency and the large amount of investment. A mature technology, Content Delivery Network (CND), with the benefits of reduced bandwidth consumption, reduced network congestion, and low network request delay, seems to be a perfect solution to this problem. However, the benefit is not significant compared with the increased investment and energy consumption of the network. A feasible solution to solve this problem is periodic broadcasting. The periodic broadcasting method allows the various receivers to share the same periodic broadcast channels, and therefore enjoy the same video with little bandwidth consumption. In this paper, based on the principle of periodic broadcasting, we propose a distribution scheme named OCPB to distribute video programs. In the OCPB scheme, the total network traffic increases very slowly (approximately Iogarithmically) with the increase of the number of clients. As the larger number of clients is, the more bandwidth we have saved.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"73 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133989827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-Sensitive Network Simulation for Multi Marine-Air Platforms Basing on SPMA Protocol","authors":"Xudong Liu, Huagui Li, Jian Yang, Xu Yang","doi":"10.1109/iccsn.2018.8488277","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488277","url":null,"abstract":"To meet the low delay transmission requirement for “time sensitive” business under the condition of large network load in battlefield environment, a kind of mobile ad hoc network system based on SPMA protocol is studied. Multi marine-air platforms confront scenario with message, voice and video business service running is molded with OPNET software, and the simulation is implemented to obtain the network parameters like throughput, traffic dropped and network delay under different transmission priority or backoff strategy. Results show that, the “time sensitive” network can still archive low delay business transmission under heavy network load that three kinds of business are running at the same time, and it can be further reduced when back-off services number is increased.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132577181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xu Huang, R. Rojas, A. C. Madoc, Sheikh Md. Rabiul Islam
{"title":"Biomedic Signal Processing and Analysis of Neuroimaging from fNIRS for Human Pain","authors":"Xu Huang, R. Rojas, A. C. Madoc, Sheikh Md. Rabiul Islam","doi":"10.1109/ICCSN.2018.8488323","DOIUrl":"https://doi.org/10.1109/ICCSN.2018.8488323","url":null,"abstract":"One of major biomedical signals, pain, and its diagnosis has been critical but hard in clinical practice, in particularly for nonverbal patients. However, as we know that neuroimaging methods, such as functional near-infrared spectroscopy (fNIRS), have shown some great encouraging assessing neuronal function corresponding to nociception and pain. Specially some research results strongly suggest that neuroimaging, together with supports from machine learning, may be practically used to not only facilitate but also can predict different cognitive tasks over this challenge. The aim of this current research is to expand our previous studies by exploring the classification of fNIRS signals (oxyhaemoglobin) according to temperature level (we define cold and hot) and corresponding pain intensity (say low and high) by means of machine learning models. In order to find out the relations between temperatures and pain intensity, we defined and used the quantitative sensory testing to determine pain threshold and pain tolerance for the cold and heat in all eighteen-healthy people. The classification algorithm is based on a bag-of-words approach, a histogram representation was used in document classification based on the frequencies of extracted words and adapted for time series. Two machine learning algorithms were used separately, namely, K-nearest neighbor (K-NN) and support vector machines (SVM). A comparison between two sets of fNIRS channels was made in our classification task. The results showed that K-NN obtained slightly better results (92.1%) than SVM (91.3%) with all the 24 channels; however, the performances slightly dropped if using only channels from the region of interest with K-NN (91.5%) and SVM (90.8%). These research results encourage potential applications of fNIRS in the development of a physiologically based diagnosis of human pain, including in clinical parties.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132638871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Area-Efficient Delay-based PUF Based on Logic Gates","authors":"Dongxing Wang, Leibo Liu, Bo Wang, Shaojun Wei","doi":"10.1109/iccsn.2018.8488275","DOIUrl":"https://doi.org/10.1109/iccsn.2018.8488275","url":null,"abstract":"As a promising circuit primitive, Physical Unclonable Function (PUF) draws extensive attention and research. PUF can extract features of integrated circuits (ICs) from random process variations and be applied for identification, device authentication and secret key generation, etc. To improve the security of PUF, the outputs of independent PUFs are XOR-mixed together, which requires more circuits. In this paper, we propose an area-efficient delay-based PUF based on logic gates, which exploits delay differences of logic gates. To improve the security of the PUF, an output network is designed to combine the outputs from multiple delay lines. It has been demonstrated that the PUF satisfies the Strict Avalanche Criterion (SAC) and can pass NIST randomness test. SPICE-based evaluation using TSMC 65nm technology validates the high uniqueness of the PUF. Synthesized results with the Synopsys Design Compiler of PUFs using TSMC 65nm technology validate their low area overhead.","PeriodicalId":243383,"journal":{"name":"2018 10th International Conference on Communication Software and Networks (ICCSN)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127120593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}