N. Huang, C. Wang, I-Ju Liao, Chengtah Lin, Chia-Nan Kao
{"title":"An OpenFlow-based collaborative intrusion prevention system for cloud networking","authors":"N. Huang, C. Wang, I-Ju Liao, Chengtah Lin, Chia-Nan Kao","doi":"10.1109/ICCSN.2015.7296133","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296133","url":null,"abstract":"Software-Defined Networking (SDN) is an emerging architecture that is ideal for today's high-bandwidth, dynamic network environments. In this architecture, the control and data planes are decoupled from each other. Although much research has been performed into how SDN can resolve some of the most-glaring security issues of traditional networking, less research has addressed cloud security threats, and, in particular, botnet/malware detection and in-cloud attacks. This work proposes an intrusion prevention system for cloud networking with SDN solutions. To realize collaborative defense, mechanisms of botnet/malware blocking, scan filtering and honeypot are implemented. Malicious traffic is isolated because bot-infected VMs are removed effectively and efficiently from the private cloud. The scanning behavior can be filtered at a very early stage of prevention, making the VMs less exploitable. A honeypot mechanism is also deployed to trap attackers. Experimental results show the high detection rate, high prevention accuracy and low vulnerability of the proposed system.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131606148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data synchronization on Android clients","authors":"Ashish Kedia, Anusha Prakash","doi":"10.1109/ICCSN.2015.7296156","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296156","url":null,"abstract":"Past decade has witnessed meteoric advances in the field of mobile computing owing to the development of affordable hardware technologies as well as user-friendly software platforms. Android, the platform marketed by Google has boomed in sales over the past few years making it one of the major mobile platforms in the market. The steady growth of wireless information and communication technology in convergence with rise in the penetration of Internet has led to the evolution of a wide range of mobile applications like news, multi-player games, social networking, messaging, etc. that need to access remote data. For the optimal functioning of all these applications an efficient synchronization mechanism is vital. However smart-phones have limited computational resources, power restrictions and intermittent Internet connections which pose a challenge for smooth synchronization. This paper proposes a two-way data synchronization mechanism between multiple Android clients and a central server to address these challenges. We employ a batching logic to ensure efficient data transfer in poor network environments and a server-side conflict resolution mechanism to reduce overhead on the clients, which ensures optimal processing and battery power consumption by the clients.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129919260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"UWB antenna design and implementation for microwave medical imaging applications","authors":"M. Bah, Jingsong Hong, D. A. Jamro","doi":"10.1109/ICCSN.2015.7296144","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296144","url":null,"abstract":"In this manuscript, two UWB compact directive balance antipodal Vivaldi antennas (BAVA) for microwave medical imaging applications have been designed and implemented. Simulated and measured results have shown good agreement. An antenna array has been designed to simulate the breast cancer detection; the coupling between the antenna elements was minimized. Good impedance matching is obtained; high gain and low cross polarization are achieved. The antenna achieved also good directivity which explains about its capability of transmitting and receiving a narrow pulse signal, which is very important in target detection such as breast cancer detection through medical imaging.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mutual authentication protocol for RFID security using NFSR","authors":"T. Suresh, M. Ramakrishnan","doi":"10.1109/ICCSN.2015.7296165","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296165","url":null,"abstract":"Radio-Frequency Identification (RFID) is an automated identification procedure, relying on storing and remotely recovering information using devices called RFID tag. RFID tags contain an electronic product code (EPC) that may uniquely determine every tagged item. The RFID tag stores its distinctive EPC with related product information within the tag's memory and sends this information whenever the reader requests them. Researchers have proven that the Electronic Product Code (EPC) Class-1 Generation-2 (C1G2) specification has critical security problems. In this paper, we proposed a new ultra lightweight mutual authentication scheme to overcome weakness in an EPC C1G2 Protocol. We only use XOR operation and appropriate Non-Linear Feedback Shift Register (NFSR) to accomplish high security. Security analysis demonstrates that our protocol will offer numerous privacy properties and avoid suffering from different kinds of attacks, including tag anonymity, reader privacy, transfer secrecy, tag, location protection and mutual authentication, replay attack etc. The proposed scheme was simulated using the ISE simulator and synthesized using Xilinx synthesis technology. The proposed method was implemented on FPGA.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116407088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
H Zhao, Hequn Liu, Ya-Ping Liu, Chaoqing Tang, Gaofeng Pan
{"title":"Physical layer security of maximal ratio combining in underlay cognitive radio unit over Rayleigh fading channels","authors":"H Zhao, Hequn Liu, Ya-Ping Liu, Chaoqing Tang, Gaofeng Pan","doi":"10.1109/ICCSN.2015.7296154","DOIUrl":"https://doi.org/10.1109/ICCSN.2015.7296154","url":null,"abstract":"In this paper, we investigate the secrecy outage performance of maximal ratio combining (MRC) in cognitive radio networks (CRNs) over Rayleigh fading channels. In a single input multiple output wiretap system, we consider a secondary user SU-TX transmits confidential messages to another secondary user SU-RX equipped with K (K>1) antennas while MRC technique is adopted to improve its received signal-to-noise ratio. Meanwhile, an eavesdropper exists to overhear the information between SU-TX and SU-RX. SU-TX adopts the underlay strategy to meet the quality of service of the primary user without spectrum sensing. In this paper, we derive the closed-form expressions for the secrecy outage probability and the probability of nonzero secrecy capacity of MRC scheme in CRNs over Rayleigh fading channels. Simulations are conducted to validate the accuracy of our proposed analytical models.","PeriodicalId":319517,"journal":{"name":"2015 IEEE International Conference on Communication Software and Networks (ICCSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124419229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}