{"title":"An Two Dimension detection to node replication attacks in mobile sensor networks","authors":"Chang Zhou, Ze Wang","doi":"10.1109/ICASID.2016.7873918","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873918","url":null,"abstract":"The node replication attack is one of the notorious attacks which can be easily launched by the adversary in wireless sensor networks. A lot of literatures have studied to mitigate the node replication attack in static wireless sensor networks. However, the detection to the replica in the mobile sensor networks is more difficult to implement. To avoid centralized detection, some existing schemes try to identify a replicated node by meeting mobile nodes with the same ID but different characteristics. To facilitate discovery of the contradictory characteristics, a hybrid detection including local detection and global detection is proposed — Two Dimension Detecting Scheme. And for different malicious activity, we proposed a detection scheme can deal with different attacks — Advanced Two Dimension Detecting Scheme. The local detection is performed in a local area much smaller than the whole deployed area to improve the meeting probability of the contradictory locations. Furthermore, the distant replicated nodes can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick finding of the replicas with reasonable overhead.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Miniature MEMS Fabry-Perot interferometry pressure sensor and the fabrication system","authors":"Chun Lin, Xiaomeng Fang","doi":"10.1109/ICASID.2016.7873927","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873927","url":null,"abstract":"Optical Fabry-Perot (F-P) fiber sensor is fascinating and widely used, especially in biological fields. Herewith a tiny F-P pressure sensor is built by micro electromechanical system (MEMS), of which the outer diameter is less than 300 micrometer. To assemble the sensor on the end of fiber, a special fabrication system is established based on machine vision technology. According to the experimental results, the sensitivity of F-P fiber sensor is about 1.3 nm/kPa, long time drift is about 5 nm, and the linearity error is less than 0.6 %.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formal verification of RFID protocols using nuXmv","authors":"Guanjie Yuan, Shigong Long","doi":"10.1109/ICASID.2016.7873917","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873917","url":null,"abstract":"The security of Radio-Frequency Identification (RFID) tags are one of the key prerequisites for its commercial application. Due to its limited computing power, formal verification protocols are an important prerequisite to effectively answering the challenges of security in RFID systems. By means of nuXmv, a clear and concise symbolic model checker, a methodology for verifying RFID protocols is put forward. We illustrate this approach by describing our analysis of hash-lock protocol, a well-known RFID protocol. We verified some properties of the protocol and discussed the security issues of hash-lock protocol. We proposed an attacker model which is appropriate for hash-lock protocol.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance optimization and simulation verification of LTE network planning based on micro coverage","authors":"Na Li, Chengti Huang, Mingjie Zhuang","doi":"10.1109/ICASID.2016.7873932","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873932","url":null,"abstract":"Today's mobile network traffic is growing in an exponential way, the current cellular system structure has been changed due to the lack of spectrum and the other factors, such as the difficulty of property coordination and the higher rent expense. In this paper, several interference management techniques in HetNet are studied, and the effects of the PCI program on the LTE coverage is analyzed. This engineering aiming at the train station, which is a typical example of the hot scenes for network planning simulation, and the weak coverage areas are supplemented by using micro coverage technology for coverage. Then the impact of micro coverage technology on the performance of the system is analyzed. Finally, the corresponding deployment proposals for small base station are given.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A segmentation approach for tissue images using non-dominated sorting GA","authors":"Weihua Zhu, Ying Shen","doi":"10.1109/ICASID.2016.7873885","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873885","url":null,"abstract":"Medical images are usually used for assisting the doctors to make decisions or diagnoses, the segments are commonly corresponded to different tissue classes, pathologies, and other biologically relevant structures, thus it is very important in the medical diagnose. This paper uses adipose tissue images for example to show the feasibility of the proposed non-dominated sorting Genetic Algorithm (NSGA) model for segmentation. NSGA-based segmentation approach is capable of find the best solution which is close to the Pareto frontier based on the hierarchical structure of population. The experiments show the outperformance of the proposed model over NSGA and sorting Genetic Algorithm (SGA) approaches. The outperformance of the proposed model may attributed to the adaptive determination of the parameters for working out the sharing function which gives the positive impacts on the algorithms.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A pipelined sign-error LMS adaptive filter architecture with low computational complexity","authors":"Ming Liu, Mingjiang Wang, De Liu","doi":"10.1109/ICASID.2016.7873923","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873923","url":null,"abstract":"Motivated by reduction of computational complexity, this work develops a pipelined adaptive filter architecture using the sign-error least mean square (LMS) algorithm. The calculation consumed for the proposed algorithm was less than half of the conventional architectures. Besides, the proposed designs derived by retiming technique and with low latency also provide a faster convergence and a higher throughput than those of the delayed LMS (DLMS) algorithm. Using the proposed algorithm, we have designed two different fine-grained pipelined structures compared to the existing ones. In order to reduce latency of the circuits, we use multiple-input addition algorithm to optimize the architecture with less hardware.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of encryption mechanism in KeePass Password Safe 2.30","authors":"Hengwei Zhang, Jingxin Hong, Jun Hu","doi":"10.1109/ICASID.2016.7873914","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873914","url":null,"abstract":"In the Internet era, there are a lot of places that require a password, such as login forum, e-mile, MSN, etc. How to effectively remember the password? It has become a required course to people. KeePass Password Safe is designed to solve the problem that human can't remember so many passwords, which contains a strong password generation engine and encryption storage function, and provides a secure password storage space, As a result, people may manage all the password safely only need to remember an initial password, and the security of the document mainly through the software's own encryption functions to ensure. But with the new method of crack and the speed of the computer running speed, its security has been on a risk. In this paper, we analyzed the latest version of KeePass encryption/decryption mechanism, and then designed a comparison experiment with earlier version, the experiment used brute-force means to recover the password on CPU-based platform and GPU-based platform respectively. We analyzed the security of KeePass through the experiment result at last.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lou Shichao, F. Ruan, Su Ming, Wang Tuo, Wang Heng, Xiao Wenjun, Zhi Qijun
{"title":"Gap detecting system design for measurement system of non-contact electrostatic discharge","authors":"Lou Shichao, F. Ruan, Su Ming, Wang Tuo, Wang Heng, Xiao Wenjun, Zhi Qijun","doi":"10.1109/ICASID.2016.7873922","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873922","url":null,"abstract":"Non-contact electrostatic discharge(ESD) taken popularly place in many situations, of military weapon, industrial product, aerospace vehicle, and even in people daily living. Discharge current pulse in non-contact electrostatic discharge with small gap has rise time in nanoseconds, produced wide band disturbance, hence may resulted in serious threat or even damage to microelectronic systems and electronic products. A new electrostatic discharge test system has been designed and made to test electrostatic discharge with different gaps, so as to research their strong influence on discharge result. A design of gap-measuring was proposed for the new ESD test system. Based on the module proposed test data was sent to PLC and and be compared with the position. Discharge current corresponding to each discharge gap was simultaneously measured and analysed, aiming to improve quantitative research of non-contact ESD properties.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130667675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A study on preprocessing method for steganalysis feature extraction","authors":"Jingxin Hong, Jun Hu, Hengwei Zhang","doi":"10.1109/ICASID.2016.7873886","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873886","url":null,"abstract":"The application of image steganography has greatly satisfied the needs of individuals and public security communication. Although steganography technology provides a convenient way to protect personal information exchange, it also becomes an effective tool for criminals. Steganalysis studying is very necessary. The position and capacity of secret information in stego images depend on the sharpness of the region in the adaptive steganography algorithms in spatial domain. According to this feature we propose a region segmentation pre-processing method in this paper, which is based on absolute difference of gray intensity. In order to improve the features discrimination, She entire image is divided into three different regions roughly, and then features are extracted. Those features have a higher correlation according to region characteristics. This proposed method offers a significant improvement in detection accuracy when compared to Region Segmentation method.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling of graphene-based sensor for super sensitivity application in bio-molecular detection","authors":"Yangbing Wu, Hui Yin, Donghui Guo","doi":"10.1109/ICASID.2016.7873934","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873934","url":null,"abstract":"Graphene-based sensors can detecte bio-molecular with super sensitivity, the single electron effect plays a role that can not be ignored. In this paper, based on the hexagonal network topology structure and the single electron tunneling model, we present the single electron devices network model for graphene-based electronic. And, the boundary constraint conditions and connected and coupling relation matrix of graphene-based sensor are described. As well as, a simple electrical expression formalism of the detected molecules about graphene-based sensors is introduced to reduce computational complexity of this model.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}