2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)最新文献

筛选
英文 中文
An Two Dimension detection to node replication attacks in mobile sensor networks 移动传感器网络节点复制攻击的二维检测
Chang Zhou, Ze Wang
{"title":"An Two Dimension detection to node replication attacks in mobile sensor networks","authors":"Chang Zhou, Ze Wang","doi":"10.1109/ICASID.2016.7873918","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873918","url":null,"abstract":"The node replication attack is one of the notorious attacks which can be easily launched by the adversary in wireless sensor networks. A lot of literatures have studied to mitigate the node replication attack in static wireless sensor networks. However, the detection to the replica in the mobile sensor networks is more difficult to implement. To avoid centralized detection, some existing schemes try to identify a replicated node by meeting mobile nodes with the same ID but different characteristics. To facilitate discovery of the contradictory characteristics, a hybrid detection including local detection and global detection is proposed — Two Dimension Detecting Scheme. And for different malicious activity, we proposed a detection scheme can deal with different attacks — Advanced Two Dimension Detecting Scheme. The local detection is performed in a local area much smaller than the whole deployed area to improve the meeting probability of the contradictory locations. Furthermore, the distant replicated nodes can also be efficiently detected by the global detection. The complementary two levels of detection achieve quick finding of the replicas with reasonable overhead.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123431805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Miniature MEMS Fabry-Perot interferometry pressure sensor and the fabrication system 微型MEMS法布里-珀罗干涉压力传感器及其制造系统
Chun Lin, Xiaomeng Fang
{"title":"Miniature MEMS Fabry-Perot interferometry pressure sensor and the fabrication system","authors":"Chun Lin, Xiaomeng Fang","doi":"10.1109/ICASID.2016.7873927","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873927","url":null,"abstract":"Optical Fabry-Perot (F-P) fiber sensor is fascinating and widely used, especially in biological fields. Herewith a tiny F-P pressure sensor is built by micro electromechanical system (MEMS), of which the outer diameter is less than 300 micrometer. To assemble the sensor on the end of fiber, a special fabrication system is established based on machine vision technology. According to the experimental results, the sensitivity of F-P fiber sensor is about 1.3 nm/kPa, long time drift is about 5 nm, and the linearity error is less than 0.6 %.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130649442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Formal verification of RFID protocols using nuXmv 使用nuXmv正式验证RFID协议
Guanjie Yuan, Shigong Long
{"title":"Formal verification of RFID protocols using nuXmv","authors":"Guanjie Yuan, Shigong Long","doi":"10.1109/ICASID.2016.7873917","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873917","url":null,"abstract":"The security of Radio-Frequency Identification (RFID) tags are one of the key prerequisites for its commercial application. Due to its limited computing power, formal verification protocols are an important prerequisite to effectively answering the challenges of security in RFID systems. By means of nuXmv, a clear and concise symbolic model checker, a methodology for verifying RFID protocols is put forward. We illustrate this approach by describing our analysis of hash-lock protocol, a well-known RFID protocol. We verified some properties of the protocol and discussed the security issues of hash-lock protocol. We proposed an attacker model which is appropriate for hash-lock protocol.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132848130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance optimization and simulation verification of LTE network planning based on micro coverage 基于微覆盖的LTE网络规划性能优化与仿真验证
Na Li, Chengti Huang, Mingjie Zhuang
{"title":"Performance optimization and simulation verification of LTE network planning based on micro coverage","authors":"Na Li, Chengti Huang, Mingjie Zhuang","doi":"10.1109/ICASID.2016.7873932","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873932","url":null,"abstract":"Today's mobile network traffic is growing in an exponential way, the current cellular system structure has been changed due to the lack of spectrum and the other factors, such as the difficulty of property coordination and the higher rent expense. In this paper, several interference management techniques in HetNet are studied, and the effects of the PCI program on the LTE coverage is analyzed. This engineering aiming at the train station, which is a typical example of the hot scenes for network planning simulation, and the weak coverage areas are supplemented by using micro coverage technology for coverage. Then the impact of micro coverage technology on the performance of the system is analyzed. Finally, the corresponding deployment proposals for small base station are given.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123362583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A segmentation approach for tissue images using non-dominated sorting GA 一种基于非支配排序遗传算法的组织图像分割方法
Weihua Zhu, Ying Shen
{"title":"A segmentation approach for tissue images using non-dominated sorting GA","authors":"Weihua Zhu, Ying Shen","doi":"10.1109/ICASID.2016.7873885","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873885","url":null,"abstract":"Medical images are usually used for assisting the doctors to make decisions or diagnoses, the segments are commonly corresponded to different tissue classes, pathologies, and other biologically relevant structures, thus it is very important in the medical diagnose. This paper uses adipose tissue images for example to show the feasibility of the proposed non-dominated sorting Genetic Algorithm (NSGA) model for segmentation. NSGA-based segmentation approach is capable of find the best solution which is close to the Pareto frontier based on the hierarchical structure of population. The experiments show the outperformance of the proposed model over NSGA and sorting Genetic Algorithm (SGA) approaches. The outperformance of the proposed model may attributed to the adaptive determination of the parameters for working out the sharing function which gives the positive impacts on the algorithms.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128614584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A pipelined sign-error LMS adaptive filter architecture with low computational complexity 一种低计算复杂度的流水线符号误差LMS自适应滤波器结构
Ming Liu, Mingjiang Wang, De Liu
{"title":"A pipelined sign-error LMS adaptive filter architecture with low computational complexity","authors":"Ming Liu, Mingjiang Wang, De Liu","doi":"10.1109/ICASID.2016.7873923","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873923","url":null,"abstract":"Motivated by reduction of computational complexity, this work develops a pipelined adaptive filter architecture using the sign-error least mean square (LMS) algorithm. The calculation consumed for the proposed algorithm was less than half of the conventional architectures. Besides, the proposed designs derived by retiming technique and with low latency also provide a faster convergence and a higher throughput than those of the delayed LMS (DLMS) algorithm. Using the proposed algorithm, we have designed two different fine-grained pipelined structures compared to the existing ones. In order to reduce latency of the circuits, we use multiple-input addition algorithm to optimize the architecture with less hardware.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131191225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analysis of encryption mechanism in KeePass Password Safe 2.30 KeePass Password Safe 2.30加密机制分析
Hengwei Zhang, Jingxin Hong, Jun Hu
{"title":"Analysis of encryption mechanism in KeePass Password Safe 2.30","authors":"Hengwei Zhang, Jingxin Hong, Jun Hu","doi":"10.1109/ICASID.2016.7873914","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873914","url":null,"abstract":"In the Internet era, there are a lot of places that require a password, such as login forum, e-mile, MSN, etc. How to effectively remember the password? It has become a required course to people. KeePass Password Safe is designed to solve the problem that human can't remember so many passwords, which contains a strong password generation engine and encryption storage function, and provides a secure password storage space, As a result, people may manage all the password safely only need to remember an initial password, and the security of the document mainly through the software's own encryption functions to ensure. But with the new method of crack and the speed of the computer running speed, its security has been on a risk. In this paper, we analyzed the latest version of KeePass encryption/decryption mechanism, and then designed a comparison experiment with earlier version, the experiment used brute-force means to recover the password on CPU-based platform and GPU-based platform respectively. We analyzed the security of KeePass through the experiment result at last.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"330 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123542108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gap detecting system design for measurement system of non-contact electrostatic discharge 非接触式静电放电测量系统的间隙检测系统设计
Lou Shichao, F. Ruan, Su Ming, Wang Tuo, Wang Heng, Xiao Wenjun, Zhi Qijun
{"title":"Gap detecting system design for measurement system of non-contact electrostatic discharge","authors":"Lou Shichao, F. Ruan, Su Ming, Wang Tuo, Wang Heng, Xiao Wenjun, Zhi Qijun","doi":"10.1109/ICASID.2016.7873922","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873922","url":null,"abstract":"Non-contact electrostatic discharge(ESD) taken popularly place in many situations, of military weapon, industrial product, aerospace vehicle, and even in people daily living. Discharge current pulse in non-contact electrostatic discharge with small gap has rise time in nanoseconds, produced wide band disturbance, hence may resulted in serious threat or even damage to microelectronic systems and electronic products. A new electrostatic discharge test system has been designed and made to test electrostatic discharge with different gaps, so as to research their strong influence on discharge result. A design of gap-measuring was proposed for the new ESD test system. Based on the module proposed test data was sent to PLC and and be compared with the position. Discharge current corresponding to each discharge gap was simultaneously measured and analysed, aiming to improve quantitative research of non-contact ESD properties.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130667675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on preprocessing method for steganalysis feature extraction 隐写特征提取的预处理方法研究
Jingxin Hong, Jun Hu, Hengwei Zhang
{"title":"A study on preprocessing method for steganalysis feature extraction","authors":"Jingxin Hong, Jun Hu, Hengwei Zhang","doi":"10.1109/ICASID.2016.7873886","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873886","url":null,"abstract":"The application of image steganography has greatly satisfied the needs of individuals and public security communication. Although steganography technology provides a convenient way to protect personal information exchange, it also becomes an effective tool for criminals. Steganalysis studying is very necessary. The position and capacity of secret information in stego images depend on the sharpness of the region in the adaptive steganography algorithms in spatial domain. According to this feature we propose a region segmentation pre-processing method in this paper, which is based on absolute difference of gray intensity. In order to improve the features discrimination, She entire image is divided into three different regions roughly, and then features are extracted. Those features have a higher correlation according to region characteristics. This proposed method offers a significant improvement in detection accuracy when compared to Region Segmentation method.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134313529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Modeling of graphene-based sensor for super sensitivity application in bio-molecular detection 基于石墨烯的超灵敏生物分子检测传感器建模
Yangbing Wu, Hui Yin, Donghui Guo
{"title":"Modeling of graphene-based sensor for super sensitivity application in bio-molecular detection","authors":"Yangbing Wu, Hui Yin, Donghui Guo","doi":"10.1109/ICASID.2016.7873934","DOIUrl":"https://doi.org/10.1109/ICASID.2016.7873934","url":null,"abstract":"Graphene-based sensors can detecte bio-molecular with super sensitivity, the single electron effect plays a role that can not be ignored. In this paper, based on the hexagonal network topology structure and the single electron tunneling model, we present the single electron devices network model for graphene-based electronic. And, the boundary constraint conditions and connected and coupling relation matrix of graphene-based sensor are described. As well as, a simple electrical expression formalism of the detected molecules about graphene-based sensors is introduced to reduce computational complexity of this model.","PeriodicalId":294777,"journal":{"name":"2016 10th IEEE International Conference on Anti-counterfeiting, Security, and Identification (ASID)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125586931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信