J. Moon, Sun-Ho Lee, jong-hyuk Park, Deok-Gyu Lee, Imyeong Lee
{"title":"Admissible Bilinear Map Based Key Management Technology in Heterogeneous Mobile Networks","authors":"J. Moon, Sun-Ho Lee, jong-hyuk Park, Deok-Gyu Lee, Imyeong Lee","doi":"10.1109/SECTECH.2008.45","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.45","url":null,"abstract":"Fast transmission speeds and various wired network services have been combined with the convenience and mobility of wireless services. The combination of wired/wireless technologies is spreading rapidly since it enables the creation of new services and provides new features to both users and service providers. In such wired/wireless integrated services, network integration is very important because such systems are integrated by a linkage between heterogeneous networks and they involve an integration of transmission technologies across networks. In this situation, existing security and communication technologies are unsuitable since the network are integrated with heterogeneous networks. The network may also have several security flaws. In existing homogeneous networks, user authentication and key management between heterogeneous networks are required for these new technologies. The establishment of security technologies for heterogeneous devices is a very important task between homogeneous networks. In this paper, we propose a secure and efficient key management system for a heterogeneous network environment. Our system provides secure communications between heterogeneous network devices.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the Application of CRFs Based on Feature Sets in Network Intrusion Detection","authors":"Jianping Li, Huiqiang Wang, Jianguang Yu","doi":"10.1109/SECTECH.2008.26","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.26","url":null,"abstract":"This thesis puts forward a method of CRFs (Conditional Random Fields) based on feature sets in network intrusion detection. This method takes advantages of the CRFs models which can stitch to sequence data marking and add random attributes. It uses varied connection information and its relativity in network connection information data sequence as well as the feature sets relativity to attack detection and discovery of abnormal phenomenon. It uses KDD Cup 1999 data sets as experimental data and comes to a conclusion that our proposed method is practicable, reliable and efficient.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131390740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Visualization Approach for Efficient Network Scans Detection","authors":"Zhang Jiawan, Li Liang, Lu Liangfu, Zhou Ning","doi":"10.1109/SECTECH.2008.47","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.47","url":null,"abstract":"Network scans visualization provides very effective means for to detection large scale network scans. Many visualization methods have been developed to monitor network traffic, but all the techniques or tools still heavily rely on human detection. They seldom consider the importance of network event characteristics to the network data visualization, and cannot detect slow scans, hidden scans etc. In this paper a visual interactive network scans detection system called ScanViewer is designed to represent traffic activities that reside in network flows and their patterns. The ScanViewer combines the characteristics of network scan with novel visual structures, and utilizes a set of different visual concepts to map the collected datagram to the graphs that emphasize their patterns. Additionally, a new tool named localport is designed for to capture large-scale ports information. The experiments show that ScanViewer can not only detect network scans, port scans, distributed port scans, but also can detect the hidden scans etc.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122663716","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Simple and Robust Authenticated Multiple Key Agreement Scheme","authors":"Chinchen Chang, H. Tsai, Yen-Chang Chiu","doi":"10.1109/SECTECH.2008.11","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.11","url":null,"abstract":"Providing confidential communications and with integrity over an insecure network is an important issue. To achieve these goals, a common key, called session key, has to be established between communicating parties, and several key agreement schemes have been proposed. However, most of them were designed to establish one session key for each communication. To reduce the communication cost, establishing multiple session keys has been proposed in the past decade. Unfortunately, all of them are either insecure or have violated the original requirement, without using one-way hash functions. Herein, we propose a multiple key agreement scheme with a novel architecture, which is different from the previous variants, to enable communicating parties establish multiple session keys.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792458","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Financial Efficiency of Electric Power Listed Company Based on EVA Model","authors":"B. Duan, Li Tian, Haolin Hong","doi":"10.1109/SECTECH.2008.37","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.37","url":null,"abstract":"EVA is the performance measurement indicator as the center of creating the shareholder value. With calculation of annual fund utilization efficiency of the electric power listed company by EVA model, it is approved that the blindness of electric power enterprises in choosing equity financing has reduced fund utilization efficiency. Considering the high rate of return on assets as well as the fact that the debt cost is lower than stock equity cost, debt financing model is more applicable than equity financing for electric power listed companies.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124811120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum Secure Direct Intercommunication with Superdense Coding","authors":"Ying Guo, M. Lee","doi":"10.1109/SECTECH.2008.54","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.54","url":null,"abstract":"A quantum secure direct intercommunication scheme is proposed to exchange directly the communicators' secret messages by making use of swapping entanglement of Bell states. It has great capacity to distribute the secret messages since these messages have been imposed on high-dimensional Bell states via the local unitary operations with superdense coding. The security is ensured by the secure transmission of the travel sequences and the application of entanglement swapping.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Times-Based Usage Control Model and Its Implication","authors":"Jianjie Fang, Junhua Zou","doi":"10.1109/SECTECH.2008.23","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.23","url":null,"abstract":"Some modern information systems require temporal and privilege consuming usage of digital objects, but usage control model (UCON) can¿t resolve it most conveniently. So in order to meet these requirements, the author introduces a new access control model - times-based usage control (TUCON). First, the paper introduces the TUCON model and then gives the working flow of the TUCON. Finally the implementation of TUCON is explored.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117284054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Communication Security in GSM Networks","authors":"Petr Bouška, M. Drahanský","doi":"10.1109/SECTECH.2008.51","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.51","url":null,"abstract":"This paper deals with a theme of securing communication in GSM networks. At the beginning there are defined some important terms, followed by an overview of GSM security, including encryption/decryption and some limitations. At the end there are described some solutions of end-to-end voice call encryption.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133001068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Extended Abstract: Access Graph Based Risk Analysis for Network Information System","authors":"Xiaochun Xiao, Tiange Zhang, Gendu Zhang","doi":"10.1109/SECTECH.2008.18","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.18","url":null,"abstract":"Currently, the risk analysis for network Information system has experienced a stage from rule-based questionnaire investigation to model-based assessment. Many graph-based models have been proposed and applied to risk analysis. Attack Graph is widely used one. But attack graphs grow exponentially with the size of the network. In this paper, we propose a comprehensive framework for network vulnerabilities modeling and risk analysis based on the access graph. As a complement to the attack graph approach, the access graph is host-centric approach, which grows polynomially with the number of hosts and so has the benefit of being computationally feasible on large networks. Compared with related works, our approach improves in both performance and computational cost.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131567262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Beom-Jin Kang, Dae-Heon Park, Kyung-Ryoung Cho, Changsun Shin, Sung-Eon Cho, Jangwoo Park
{"title":"A Study on the Greenhouse Auto Control System Based on Wireless Sensor Network","authors":"Beom-Jin Kang, Dae-Heon Park, Kyung-Ryoung Cho, Changsun Shin, Sung-Eon Cho, Jangwoo Park","doi":"10.1109/SECTECH.2008.60","DOIUrl":"https://doi.org/10.1109/SECTECH.2008.60","url":null,"abstract":"This paper proposes the greenhouse auto control system controlling greenhouse auto control and collecting environment information in the greenhouse to use temperature, humidity, leaf temperature and leaf wetness. The existing system colleted data depending on only temperature, humidity and was able to check only in the greenhouse. To make up for the weakness of the existing system, this system collects information of internal environment and plants and stores it in database, and then we designed the system to be possible check green house information and control automatically in a remote place by using Web. This system consisted of temperature, humidity sensor wireless sensor node based on zigbee, actuator node database. Also, we checked condition of greenhouse by installing greenhouse and automatically controlled it to prove movement of the greenhouse auto control system.","PeriodicalId":377461,"journal":{"name":"2008 International Conference on Security Technology","volume":"391 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113993951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}