{"title":"DTLS for Lightweight Secure Data Streaming in the Internet of Things","authors":"Roy Fisher, G. Hancke","doi":"10.1109/3PGCIC.2014.113","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.113","url":null,"abstract":"The huge number of sensors envisioned to be deployed within Internet of Things applications will result in large amounts of likely confidential data that will be required to traverse the open Internet. This confidential data could range from the current security status of a smart house to the current health status of an elderly person connected to smart monitors. A secure and able connection will be required to connect either a cloud based or an in-house server to the embedded sensors. The ability to ensure that the data generated by the sensor networks is securely streamed to the central server will allow for real time access to the data. The use of the less favoured Datagram Transport Layer Security protocol is compared with the widely used Transport Layer Security protocol. The research shows that Datagram Transport Layer Security is a capable alternative to Transport Layer Security when it comes to streaming data across the Internet from connected Wireless Sensor Networks.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126242079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Research of Scale-Free Sensor Network Topology Evolution Based on the Energy Efficient","authors":"Yueshun He, Wei Zhang, N. Jiang, Xiaoyan Luo","doi":"10.1109/3PGCIC.2014.65","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.65","url":null,"abstract":"Topology control is one of core key factors which can influence performance of wireless-sensor networks (WSN). So how to design topology structure with high reliable and survivability is becoming the important subject on wireless-sensor networks. For the issue, a topology evolution strategy based on scale-free network with energy efficient is proposed. First by clustering algorithm cluster nodes are distributed evenly. Then those nodes start evolving in accordance with random walk processes on scale-free network. Since some key factors such as residual energy of node and node degree are taken into account in evolving procedure, network topology obtains quality features such as load and energy balance. So the network is quite practical. Finally the simulation shows that network topology from the evolution algorithm have good robustness regardless of deliberate and random attack. Consequently robustness feature of wireless-sensor network under severe environment is satisfied.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128150114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-party Quantum Secure Direct Communication","authors":"Xiaoqing Tan, Xiaoqian Zhang, Cui Liang","doi":"10.1109/3PGCIC.2014.71","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.71","url":null,"abstract":"A protocol for three-party quantum secure direct communication using entanglement states is proposed. In this protocol, three participants simultaneously exchange their messages. The protocol is shown to stand against the intercept-and-resend attack, the intercept-and-measure attack, the intercept-and-entangle auxiliary attack and the denial-of-service attack. It can be generalized to N-party case that is feasible.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126651536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Evaluation Method of Reliability of Internet of Things","authors":"Li Yong-Fei, Tian Li-Qin","doi":"10.1109/3PGCIC.2014.74","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.74","url":null,"abstract":"Comprehensive evaluation of the reliability of Internet of Things was achieved on the basis of evaluation data. First, a comprehensive evaluation model of reliability of Internet of Things was constructed according to its architecture, and evaluation data from various sources were normalized. Then based on system reliability theory and AHP method, a comprehensive reliability evaluation algorithm was designed. Finally, an example was given to demonstrate the evaluation process. In the evaluation method, reliability of Internet of Things was quantitatively and scientifically represented, system reliability theory was used as theoretical basis and AHP to determine the index weights.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128893524","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Novel Fingerprint-Based Biometric Encryption","authors":"Bin Liang, Zhendong Wu, Lin You","doi":"10.1109/3PGCIC.2014.48","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.48","url":null,"abstract":"Biometric identification suffers a lot of problems such as the storage of user's biometric template, the leakage of user's private and the resulting security problems. As a substitution, biometric encryption has become the focus of the present studies. Recently, numerous studies focus on biometric encryption based on Fuzzy Vault, Fuzzy Commitment and dynamic key generation. Both of them are unavailable in the network environment as they suffer neither stored templates nor unstable keys. In this paper, we propose a fingerprint encryption scheme based on threshold (t, n), unlike the reliance of templates in Fuzzy Vault based scheme or the \"encrypted\" templates in Fuzzy Commitment based scheme when regenerate the very key, which protects biometric key in a polynomial, and saves nothing about biometric characteristics just like dynamic biometric key generation scheme.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127076542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Enhanced Secure Mechanism of Low Level Reader Protocol (LLRP) V1.1","authors":"B. Zhao, Ziyue Wang, Baojiang Cui, Xiaobing Liang","doi":"10.1109/3PGCIC.2014.97","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.97","url":null,"abstract":"LLRP is an interface protocol between RFID Readers and Client. Nowadays, due to the growing number of its adoption and lack of security-related research, this paper proposes an enhanced secure mechanism of Low Level Reader Protocol (LLRP) V1.1 to protect RFID systems from various attacks. This paper first makes an introduction to LLRP and the latest related research, discusses the security vulnerabilities and proposes suggested security services based on the security features of LLRP. It then details the design and implementation of the secured LLRP interaction process as well as its performance evaluation. In the end, this paper simply analyzes the ability of the enhanced secure mechanism of defending against several major security threats. The future work could include further improving the secure mechanism to defend against more attacks and researching for better lightweight encryption and authentication scheme.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131175468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linguistic Approach to Modeling of Coronary Arteries in Semantic Techniques of Image Retrieval","authors":"M. Trzupek, M. Ogiela","doi":"10.1109/3PGCIC.2014.80","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.80","url":null,"abstract":"In recent years, medical images have become a constant part of our life. It is hard to imagine making a medical diagnosis without basic medical imaging apparatuses (CT, MRI, USG, etc.). In order to fully utilize its potential, the image data must be stored in the proper way, particularly so that it is easily accessible. The latter is particularly important in a medical diagnostics - it is desired that a physician should have quick access to the comparative image data. In this context the authors present the possibility of using linguistic approach to modeling of coronary arteries in semantic techniques of image retrieval. The proposed methodology takes into account, among others, the basic topologies of arteries (balanced artery distribution, right dominant or left dominant) as well as individual sections or ramifications of these arteries. For the purpose of analysis and indexing these visualizations appropriate graph and sequential grammars are proposed.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaobing Liang, Yingjie Lv, B. Zhao, Y. Liu, Zhiqiang Sun, Wei Cen
{"title":"A RFID Mutual Authentication Security Protocol Design and Analysis","authors":"Xiaobing Liang, Yingjie Lv, B. Zhao, Y. Liu, Zhiqiang Sun, Wei Cen","doi":"10.1109/3PGCIC.2014.146","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.146","url":null,"abstract":"For RFID mutual authentication security protocols which need back-end server have poor mobile performance, it cannot be applied to environments which have poor wireless network. The RFID mutual authentication security protocol based on key dispersion algorithm is designed in this paper, which proposes a new method for managing and distributing keys for a large number of tags. This protocol which does not need the back-end database can be achieved security mutual authentication between the reader and the tag, the reader only need to store a pair of root keys, the key dispersal algorithms can disperse the corresponding mutual authentication keys with the tag identification number. Compared with the other of the same type RFID mutual authentication security protocols, results indicate that the proposed protocol in this paper has higher efficiency and security.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130756814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimizational Method of HBase Multi-dimensional Data Query Based on Hilbert Space-Filling Curve","authors":"Qingcheng Li, Y. Lu, Xiaoli Gong, Jin Zhang","doi":"10.1109/3PGCIC.2014.96","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.96","url":null,"abstract":"HBase distributed database technology has been widely used in missive data processing. The problem of the efficiency of multi-dimensional data query which is caused by its single primary key indexing becomes more apparent. This paper proposed and implemented a multi-dimensional query method based on Hilbert space-filling curve. Using the Hilbert space filling curve to make the multi-dimensional data space to be one-dimensional lossless compression, on the basis of mapping the query conditions to the multi-dimensional space, and then using the subspace match to generate Hilbert segment, thereby convert into a single dimension query. Finally, the experiments prove that this method can query the keyword of multi-dimensional space more efficiently with the massive data and has a good load balancing performance. And this method can be more effective to avoid the issue of the server cluster hotspot.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130099134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability Analysis of Business Continuity Based on SPN in Information System Security Management","authors":"Pan Ping, Mao Xinyue, Yang Ping, Zhou Huiling","doi":"10.1109/3PGCIC.2014.68","DOIUrl":"https://doi.org/10.1109/3PGCIC.2014.68","url":null,"abstract":"Business continuity analysis is basic of guaranteeing the system effectiveness and reliability. Normally, It emphasizes formal language description, while non-dynamic formal analysis method. This paper analyzes the composing factor of business continuity in information system safety management, with the key elements to prove the business continuity services, it is based on the SPN theory and uses its dynamic reach ability properties. The analysis provides a new method for scientific management services.","PeriodicalId":395610,"journal":{"name":"2014 Ninth International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","volume":"148 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116117193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}