Min Liang, Hui Zhang, Fei Gao, Hao Wang, Jun Wei, Minghe Huang
{"title":"Research on Multi-user Access Control Scheme for Private Cloud in Space Control Center","authors":"Min Liang, Hui Zhang, Fei Gao, Hao Wang, Jun Wei, Minghe Huang","doi":"10.1109/ICCSN.2019.8905252","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905252","url":null,"abstract":"The attribute-based encryption (ABE) mechanism enables fine-grained access control of sensitive data and data encryption. The ciphertext-policy ABE (CP-ABE) based on the ideal lattices has the advantages of small private key length and high computational efficiency. Aiming at the multi-task parallel and multi-user access of Space Control Center, this paper analyzes the multi-user data access mode and data encryption key structure of Space Control Center and proposes a kind of ABE access control scheme based on ideal lattice in private cloud for Space Control Center. This paper also designs s targeted direct attribute revocation mechanism. Security analysis and program comparison were carried out. The analysis shows that the scheme can meet the multi-user access control requirements of Space Control Center, and the access control granularity meets the actual situation.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132523672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Security Mechanism in the Internet of Things by Interacting HTTP and MQTT Protocols","authors":"Abdulaleem Ali Almazroi","doi":"10.1109/ICCSN.2019.8905262","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905262","url":null,"abstract":"The Internet of Things (IoT) links many devices to the internet to make the environment smarter. Its applications use varies from the habitat (the Smart Home, for example the automatic or remote control of the temperature) to that of the city (Smart Cities with for example the management of public lighting), transport (e.g. road traffic supervision) and industry (industrial radio networks). Wireless sensor networks consider a very important technology in the Internet of Things. They make it possible to present the characteristics and the state of the objects (or environments) in which they are implanted (or deployed) like web services on the Internet. Nevertheless, the opening of sensor networks to the internet presents a serious problem from the standpoint of security because the networks of sensors connected to the internet become accessible remotely and in a ubiquitous way by any malicious host on the internet. In this paper, we have proposed a mechanism for the security of the human-to-thing by interacting HTTP and MQTT protocols in IoT. The proposed solution protects end-to-end human-to-object communications, while considering the material and technological heterogeneities between the devices involved, with a significant mitigation of the impact of denial of service threats which severely menace IoT's built-in sensor networks.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131727308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Liu Jian, Leibo Liu, Yanan Lu, Jianfeng Zhu, Shaojun Wei
{"title":"Comparing Branch Predictors for Distributed-Controlled Coarse-Grained Reconfigurable Arrays","authors":"Liu Jian, Leibo Liu, Yanan Lu, Jianfeng Zhu, Shaojun Wei","doi":"10.1109/ICCSN.2019.8905283","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905283","url":null,"abstract":"Coarse-Grained Reconfigurable Array (CGRA) is a kind of spatial architecture that can achieve high parallelism. However, the control flow between instructions limits the parallelism and introduces pipeline stalls, significantly degrading the performance of the applications with intensive control flows. So, branch prediction is indispensable. Since CGRAs are composed of many processing elements (PEs) and the pipeline in a PE is not as deep as that in traditional processors, the branch predictors need to be reappraised. In this paper, we propose a hybrid branch predictor for CGRAs by exploiting the advantages of two complementary branch predictors. The result shows that the hybrid predictor performs best among all the predictors in the experiment. The hybrid predictor improves prediction accuracy by 4.48% compared with the bimodal predictor which is used in a latest CGRA related research.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123014774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dynamic Configuration of Optical Physical Layer Using SDN and Optical Network Description Language","authors":"Nitin K. Lohar, Subrat Kar","doi":"10.1109/ICCSN.2019.8905249","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905249","url":null,"abstract":"Optical networks, which were once considered to be static, are now becoming more flexible and dynamic. Software-defined networking (SDN) has an essential role in the provisioning and management of these networks. There is also a requirement to describe the heterogeneous network resources in a unified manner to the SDN controller. In this paper, we develop a novel semantic framework called Optical Network Description Language (ONDL) which is used to describe entities in the optical network. We show its applicability by emulating a physical layer topology and its control using the developed SDN controller based on ONDL. For any network event, we obtain the response time as <100 ms and observe that the total time to configure a device is dependent upon the individual node configuration time.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123117825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Probabilistic Caching Mechanism Based on Software Defined Content Centric Network","authors":"Yanyu Gao, Jinhe Zhou","doi":"10.1109/ICCSN.2019.8905366","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905366","url":null,"abstract":"In-network caching is one of the core ideas of content centric network (CCN). The in-network caching strategy commonly used in CCN is inefficient, so a probabilistic caching mechanism SBPC based on software defined content centric network was proposed to efficiently utilize the whole network caching resource. SBPC uses controller to aware topology information and link state information in whole network, it quantify the importance of nodes according to their degree centrality, closeness centrality, betweenness centrality and eigenvector centrality. By means of matching node importance and content popularity, content is cached according to a probability caculated through node importance and content popularity. Simulation results show that SBPC can effectively increase the cache hit ratio, at the same time decrease the content acquisition hop and request delay compared with Lce, ProbCache, Prob(0.5) and Betw which are the traditional caching mechanisms in CCN.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116241296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emotional Induction Study of Video in Menstrual Cycle through ECG Signal","authors":"Juan Yu, G. Liu, Y. Fang, Yalei Ma","doi":"10.1109/ICCSN.2019.8905367","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905367","url":null,"abstract":"The purpose of this study is to investigate the effects of different phases of the menstrual cycle (follicular phase and luteal phase) on emotion induction of video through ECG signal. Firstly, the ECG data of twenty subjects were acquired when they were watching positive, negative or neutral videos in follicular phase and luteal phase, respectively. Then, the RR interval series were obtained from the ECG data. Finally, some statistical, such as the mean, the standard deviation, the first and second differences between consecutive RR intervals, and the root mean square and Krawchouk moment features were extracted from the RR interval series to evaluate the effects of different phases of the menstrual cycle on emotion induction by using extreme learning machine. The results shown that women were more irritated and more likely to induce negative emotions during the luteal phase.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123759921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Model Checking Based Survivability Evaluation Framework of Wireless Network","authors":"Lei Li, Zhifeng Liu, Conghua Zhou","doi":"10.1109/ICCSN.2019.8905269","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905269","url":null,"abstract":"Survivability is a critical property to evaluate the security and availability of wireless networks. Traditional manual check of survivability is a tedious, erroneous and time-consuming procedure. To our best knowledge, there are still no any automatic survivability evaluation techniques or related theories being reported. Therefore some efficient evaluation techniques and tools are seriously demanded to ensure wireless network's survivability. In this paper, an automatic survivability evaluation framework based on model checking is proposed. The proposed framework features that the evaluation procedure is automated, the computation of performance indexes is unified, and toward improving survivability the feedback of check is timely and helpful. Finally, some challenges are briefly discussed.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124969235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient Scheduling Algorithm for Adjustable Time Slots in Time-Triggered Ethernet","authors":"Meichen Liu, Hongxi Yin, He Li, Xiuyang Ji","doi":"10.1109/ICCSN.2019.8905355","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905355","url":null,"abstract":"When a network scale for the traditional Ethernet is continuously expanded, an increase of the number of network hops will result in an augment of waiting delay uncertainty for a service transmission, which makes the network inefficiency and difficult to guarantee service quality. The time-triggered Ethernet adopts the global time synchronization and time triggering mechanism to ensure the service quality of high-priority services such as spaceflight tracking telemetry and control, network security, and vital signs monitoring, which possesses broad applications in aerospace, medical aid, and vehicle network. Currently, the time-triggered Ethernet triggers a time-triggered stream by employing an offline generated scheduling schedule, and is difficult to adapt to dynamic changes of a network, which leads to the network rigidity and inefficiency. Therefore, this paper proposes an algorithm for generating time-triggered schedules that can adjust time slots, flexibly. The time-triggered Ethernet prototype system is designed by utilizing the TrueTime, and the process of generating the scheduling table to trigger the time-triggered stream is simulated. Compared with the existing traditional algorithm, our algorithm can adjust the time slots according to the ratio of time-triggered streams to traditional traffic in the network, which can improve the time utilization rate by 30%.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131594950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhufeng Suo, Ding Ding, Yixin Fu, Lei Zhang, Xi Fang, Xianwei Gao
{"title":"Preamble Based Frequency Domain Channel Estimation Method for Polarization-Division-Multiplexed CO-OFDM/OQAM System","authors":"Zhufeng Suo, Ding Ding, Yixin Fu, Lei Zhang, Xi Fang, Xianwei Gao","doi":"10.1109/ICCSN.2019.8905300","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905300","url":null,"abstract":"In this paper, we analyzed the frequency-domain optical fiber channel transmission model for PDM CO-OFDM/OQAM systems with the IMI effect induced CD, PMD and nonlinear. The full loaded (FL) and the half loaded (HL) frequency-domain methods were compared to discuss the IMI effect in linear and nonlinear channels. The robustness against CD, PMD and nonlinear phase noise were also compared for both of the FL and the HL methods. The theoretical analysis is validated by numerical Monte Carlo simulations of PDM CO-OFDM/OQAM systems.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121264012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Intrusion Prediction Algorithm Based on Association Attack Diagram ASAD","authors":"Xiao-ling He","doi":"10.1109/ICCSN.2019.8905351","DOIUrl":"https://doi.org/10.1109/ICCSN.2019.8905351","url":null,"abstract":"In view of the problem that the attack diagram model can't accurately reflect the impact of attack evidence on the intrusion intent prediction, an intrusion prediction algorithm, INPA based on association attack diagram, ASAD is proposed. This paper defines the parameters of resource node D, attack evidence M, single-step attack T, etc., and constructs the associated attack diagram model to describe the whole process of the intruder reaching the target node from the initial node, and then, Bayesian inference design and Associated quantization algorithm, Correlate are used to calculate the probability of single-step attack. Finally, combined with the And-Or relationship between the directed edges of ASAD, the expression formula of the reach probability of each node is derived, and INPA is designed to realize the function of dynamic prediction the potential intrusion in the network.","PeriodicalId":330766,"journal":{"name":"2019 IEEE 11th International Conference on Communication Software and Networks (ICCSN)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114220871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}