2017 23rd Asia-Pacific Conference on Communications (APCC)最新文献

筛选
英文 中文
Cyber-physical authentication for metro systems 城域系统的网络物理认证
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-11 DOI: 10.23919/APCC.2017.8304066
Huaqun Guo, Jun Wen Wong
{"title":"Cyber-physical authentication for metro systems","authors":"Huaqun Guo, Jun Wen Wong","doi":"10.23919/APCC.2017.8304066","DOIUrl":"https://doi.org/10.23919/APCC.2017.8304066","url":null,"abstract":"This paper aims to address control device security issue with Metro systems. It would be devastating in the event that control devices are suffering from cyber attacks or physical attacks. Thus, in this paper, we present a cyber-physical authentication approach which combine an add-on security module (AOSM) and a cyber security protocol for cyber-physical device authentication and data transmission. Tests and performance evaluation have then been done to show the feasibility of the proposed protocol as the time efficiency of the protocol is critical to the functionality of the control system.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124560761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Analytical performance analysis for blind quantum source separation with time-varying coupling 时变耦合盲量子源分离的解析性能分析
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-11 DOI: 10.23919/APCC.2017.8303976
Y. Deville, A. Deville, Simon Rebeyrol, A. Mansour
{"title":"Analytical performance analysis for blind quantum source separation with time-varying coupling","authors":"Y. Deville, A. Deville, Simon Rebeyrol, A. Mansour","doi":"10.23919/APCC.2017.8303976","DOIUrl":"https://doi.org/10.23919/APCC.2017.8303976","url":null,"abstract":"Classical, i.e. non-quantum, blind source separation (BSS) methods estimate unknown source signals by using only mixed signals obtained by transferring these source signals through a mixing transform, which typically has unknown parameter values. We developed quantum versions of BSS, in which the mixing parameter values almost always remained fixed over time. We here show that rapidly varying mixing is much more complex to handle, because unknown quantum states cannot be cloned, i.e. copied. We avoid this issue thanks to a specific separating system based on a master-slave structure. We provide an original analytical analysis of the performance of that structure, depending on the mismatch between its master and slave inverting blocks.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A scheme for lightweight SCADA packet authentication 轻量级SCADA报文认证方案
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-11 DOI: 10.23919/APCC.2017.8304051
Luying Zhou, Huaqun Guo, Dong Li, Jianying Zhou, Jun Wen Wong
{"title":"A scheme for lightweight SCADA packet authentication","authors":"Luying Zhou, Huaqun Guo, Dong Li, Jianying Zhou, Jun Wen Wong","doi":"10.23919/APCC.2017.8304051","DOIUrl":"https://doi.org/10.23919/APCC.2017.8304051","url":null,"abstract":"Development and deployment of cyber security measures for legacy SCADA systems usually encounter challenges of limited computation resources in the field devices for supporting the designed cryptography processing. This paper presents a scheme with which the field device performs message authentication and integrity check only on selected critical packets such that it protects the system operation while avoiding high computation workload, and applies the scheme to a transportation SCADA system. The proposed scheme takes into account of the SCADA computation power limitation and real time requirements, and the extreme difficulty of making any changes to hardware or software in the legacy system. AES-CCM and symmetric key methods are applied for providing message authentication and integrity, and a bump-in-the-wire (BITW) implementation approach is adopted to avoid the changes to the legacy system. This lightweight packet authentication scheme is implemented and demonstrated over a testbed of a metro transportation SCADA system. Experiments show the effects of the scheme in blocking malicious packet attack and the comparison with a firewall approach.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129571913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Obfuscated malicious javascript detection scheme using the feature based on divided URL 使用基于分割URL的特性混淆恶意javascript检测方案
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8303992
Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, I. Sasase
{"title":"Obfuscated malicious javascript detection scheme using the feature based on divided URL","authors":"Shoya Morishige, Shuichiro Haruta, Hiromu Asahina, I. Sasase","doi":"10.23919/APCC.2017.8303992","DOIUrl":"https://doi.org/10.23919/APCC.2017.8303992","url":null,"abstract":"On web application services, detecting obfuscated malicious JavaScript utilized for the attacks such as Drive-by-Download is an urgent demand. Obfuscation is a technique that modifies some elements of program codes and is used to evade the pattern matching of traditional anti-virus softwares. In particular, encode obfuscation is adopted in almost all malicious JavaScript codes as the most effective technique to hide their malicious intents. Therefore, many approaches focus on encode obfuscation to detect malicious JavaScript. However, we point out that malicious JavaScript obfuscated by the techniques except for encode obfuscation can easily evade those approaches. Motivated by the above, in this paper, we first investigated the malicious files that previous schemes cannot detect, and found that some files contain divided URL in their codes. In order to detect such JavaScript codes as malicious, we propose obfuscated malicious JavaScript detection scheme using the feature based on divided URL. We focus on the fact that the segments of URL are declared as variables and connected later. Our scheme stores variables and their contents in the dictionary type object and in the connection parts, verifies that malicious URL can be reconstructed. By the computer simulation with real dataset, we show that our scheme improves the detection effectiveness of the conventional scheme.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116685627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Simultaneous wireless information and power transfer in relay networks with finite blocklength codes 有限码块长度中继网络中的同步无线信息和功率传输
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8304073
Yulin Hu, Yao Zhu, A. Schmeink
{"title":"Simultaneous wireless information and power transfer in relay networks with finite blocklength codes","authors":"Yulin Hu, Yao Zhu, A. Schmeink","doi":"10.23919/APCC.2017.8304073","DOIUrl":"https://doi.org/10.23919/APCC.2017.8304073","url":null,"abstract":"This paper considers simultaneous wireless information and power transfer (SWIPT) mechanisms in a relaying network with finite blocklength (FBL) codes. The reliability of the network is optimized under both a power splitting (PS) protocol and a proposed joint PS and time switching (TS) protocol. Under both protocols, we first determine the overall error probability formulation of the SWIPT-enabled two-hop transmission in the FBL regime. Subsequently, we state and solve optimization problems minimizing the overall error probability. Via numerical analysis, we show the appropriateness of our analytical model and demonstrate the performance advantage of the proposed protocol in comparison to TS and PS protocols. In addition, we provide interesting insights on the system behavior by characterizing the impact of the blocklength, transmit power and packet size on the reliability performance.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120936989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An analysis of changing enterprise network traffic characteristics 分析不断变化的企业网络流量特征
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8303960
David Murray, Terry Koziniec, S. Zander, M. Dixon, P. Koutsakis
{"title":"An analysis of changing enterprise network traffic characteristics","authors":"David Murray, Terry Koziniec, S. Zander, M. Dixon, P. Koutsakis","doi":"10.23919/APCC.2017.8303960","DOIUrl":"https://doi.org/10.23919/APCC.2017.8303960","url":null,"abstract":"Studies on the composition and nature of Internet protocols are crucial for continued research and innovation. This study used three different methods to investigate the presence and level of support for various Internet protocols. Internet traffic entering and exiting a university network was passively captured, anonymised and analysed to test protocol usage. Active tests probed the Internet's most popular websites and experiments on the default behaviour of popular client, server and mobile operating systems were performed to reconcile the findings of the passive data collection. These results are valuable to research areas, such as those using emulations and simulations, where realism is dependent on the accuracy of the underlying assumptions about Internet traffic. Prior work is leveraged to explore changes and protocol adoption trends. This study shows that the majority of Internet traffic is now encrypted. There has also been an increase in large UDP frames, which we attribute to the Google QUIC protocol. Support for TCP options such as Selective Acknowledgements (SACK) and Maximum Segment Size (MSS) can now be assumed. Explicit Congestion Notification (ECN) usage is still marginal, yet active measurement shows that many servers will support the protocol if requested. Recent IETF standards such as Multipath TCP and TCP Fast Open have small but measurable levels of adoption.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126711926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
An M-ary code shifted differential chaos shift keying scheme 一种码移微分混沌移位键控方案
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8304007
Yunsheng Tan, Weikai Xu, Shaohua Hong
{"title":"An M-ary code shifted differential chaos shift keying scheme","authors":"Yunsheng Tan, Weikai Xu, Shaohua Hong","doi":"10.23919/APCC.2017.8304007","DOIUrl":"https://doi.org/10.23919/APCC.2017.8304007","url":null,"abstract":"In this paper, by applying M-ary constellation modulation to code shifted differential chaos shift keying (CS-DCSK), a new M-ary DCSK which is called CS-MDCSK, is proposed. In the proposed scheme, the reference chaos signal is the same with the CS-DCSK, and the two orthogonal components of information bearing signal are obtained by two Walsh codes. Furthermore, the proposed CS-MDCSK is extended to general scheme (GCS-MDCSK), which transmits more than one M-ary constellation information bearing signals with one reference. Since high order constellations are used, the proposed scheme enhances the spectrum efficiency compared to CS-DCSK and GCS-DCSK. By computer simulations, the bit error rate (BER) performance of two proposed systems are compared to that of CS-DCSK and GCS-DCSK, respectively. Simulation results show that the proposed systems outperform the CS-DCSK and GCS-DCSK when 4-ary constellation is applied.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"83 3-4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114034580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Modeling the large-scale visible light backscatter communication network 大规模可见光背向散射通信网络建模
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8303983
Xiaozheng Wang, Kaifeng Han, Minglun Zhang
{"title":"Modeling the large-scale visible light backscatter communication network","authors":"Xiaozheng Wang, Kaifeng Han, Minglun Zhang","doi":"10.23919/APCC.2017.8303983","DOIUrl":"https://doi.org/10.23919/APCC.2017.8303983","url":null,"abstract":"The future Internet-of-things (IoT) is motivating the development of our daily services as well as revolutionizing the way we interplay with our life. The ubiquitous visible light communication (VLC) technique has been seamlessly combined into the energy-efficient backscatter communication system, called the visible-light backscatter communication (VL-BackCom), for powering the massive number of IoT devices and prolonging their working-time. In the VL-BackCom system, the tag can modulate and backscatter the visible light signal (by switching the liquid crystal display (LCD) shutter) illuminated from light source to its nearby receiver. However, few work focuses on modeling and analyzing the performance of the large-scale VL-BackCom network. To this end, this paper makes the first attempt to model and investigate the network performance, namely the success VL-BackCom probability and network capacity, by borrowing the analytical tractable tool from stochastic geometry. The network topology is modeled using the analytical tractable generalized Gauss-Poisson process (GPP) under some justifiable assumptions, yielding a lower bound for practical VL-BackCom network with irregular deployment. The expressions of the success VL-BackCom probability and network capacity are clearly derived to characterize the VL-BackCom link's reliability as well as the spatial success transmission density, respectively. Moreover, the effects of backscatter parameters, say duty cycle and reflection coefficient, on network performance are also studied.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128491835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Implementation of a pipeline division-free MMSE MIMO detector that support soft-input and soft-output 实现了一种支持软输入和软输出的无分路MMSE MIMO检测器
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8303962
Ziqiang Li, Liyu Lin, Yun Chen, Xiaoyang Zeng
{"title":"Implementation of a pipeline division-free MMSE MIMO detector that support soft-input and soft-output","authors":"Ziqiang Li, Liyu Lin, Yun Chen, Xiaoyang Zeng","doi":"10.23919/APCC.2017.8303962","DOIUrl":"https://doi.org/10.23919/APCC.2017.8303962","url":null,"abstract":"This paper mainly addresses on MIMO decoder implementations that support iterative detecting and decoding. Based on MMSE-PIC algorithm, we present architectures for optimized matrix inverse and LLR caculation that are division free. We also present a parallel complex matrix QR decomposition scheme to develop a pipeline VLSI achitecture. ASIC realization of this architecture for both 2 × 2 and 4 × 4 configuration are also finished, the synthesis result shows that peak throughput of 4 × 4 design reachs 1.43Gbps at the area cost of 797k logic gates. The 2 × 2 design also have a relative high hardware effeciency compared with the state of art implementation.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130487549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on idle slot availability prediction for WLAN using a probabilistic neural network 基于概率神经网络的WLAN空闲时隙可用性预测研究
2017 23rd Asia-Pacific Conference on Communications (APCC) Pub Date : 2017-12-01 DOI: 10.23919/APCC.2017.8304030
Julian Webber, A. Mehbodniya, Yafei Hou, K. Yano, T. Kumagai
{"title":"Study on idle slot availability prediction for WLAN using a probabilistic neural network","authors":"Julian Webber, A. Mehbodniya, Yafei Hou, K. Yano, T. Kumagai","doi":"10.23919/APCC.2017.8304030","DOIUrl":"https://doi.org/10.23919/APCC.2017.8304030","url":null,"abstract":"We have recently proposed a multi-band wireless local area network (WLAN) system as a solution to the increasingly crowded frequency space. Efficiency can be improved by an agile transceiver that transmits on an idle channel on either or both bands concurrently, and a busy/idle (B/I) predictor will form part of the sensing unit for such a system. A probabilistic neural network (PNN) is studied here for predicting upcoming WLAN B/I status based on pattern matching and classification of previous state patterns. IEEE 802.11 wireless data frames were captured at two hot-spots on multiple channels and the B/I status estimated. The prediction performance is compared for two different locations, channels, prediction matrix dimensions, B/I vs channel occupancy ratio (COR) input types, and frequency of retraining. Results show that the PNN has good potential to estimate the number of idle slots in the upcoming 20 slots and the performance improves with regular retraining.","PeriodicalId":320208,"journal":{"name":"2017 23rd Asia-Pacific Conference on Communications (APCC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121139930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信