2021 International Conference on Networking and Network Applications (NaNA)最新文献

筛选
英文 中文
Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI 基于过时CSI的双跳隐蔽通信系统性能分析
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00042
Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen
{"title":"Performance Analysis for Dual-Hop Covert Communication System with Outdated CSI","authors":"Jiaqing Bai, Ji He, Xiaohong Jiang, Lijun Chen","doi":"10.1109/NaNA53684.2021.00042","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00042","url":null,"abstract":"Covert communication aims to hide the very existence of wireless transmissions which provides a strong security guarantee for wireless networks. This article considers a dual-hop covert communication system with outdated channel state information (CSI). The source transmits the message to the destination via a relay, while the relay wants to transmit its message to the destination and hide the communication process. Under this consideration, we conduct the covert performance analysis of the concerned system under the rate-control scheme. Specially, we derive the closed-forms of the minimum detection error probability (DEP) at the source and the effective covert rate (ECR) at the relay. Further, we study the ECR maximization problem under the DEP constraint. Finally, we provide extensive numerical results to illustrate the achievable covert performance with the outdated CSI. The results indicate that the larger the CSI feedback delay is, the more beneficial it is to the detective, but it is not conducive for the relay to conduct the covert communication.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125662756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection 一种用于增强图像安全检测的改进中值滤波取证方法
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00060
Kaijun Wu, Wanli Dong, Yunfei Cao, Xue Wang, Qi Zhao
{"title":"An Improved Method of Median Filtering Forensics for Enhanced Image Security Detection","authors":"Kaijun Wu, Wanli Dong, Yunfei Cao, Xue Wang, Qi Zhao","doi":"10.1109/NaNA53684.2021.00060","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00060","url":null,"abstract":"With the development of image processing technology, the forgers usually use median filtering to make their fakes appear more realistic because median filtering is a non-linear digital filtering technique which can preserve edges and smooth regions within an image. Therefore, the use of median forensics technology to identify the authenticity of images and ensure the security of image data has attracted everyone’s attention. However, how to effectively detect the median filter of high JPEG compressed small-size images is still a challenge in median filter forensics. In this paper, we proposed a framework based on deep residual learning to address this challenge. Specifically, a new convolutional neural network called MFFNet was constructed. In the first step, in order to extract the features left by the median filter, we innovatively designed a preprocessing layer containing various residuals to capture different median filter artifacts. Then, we elaborately designed a MFFNet to self-learn rich hierarchical features left in the highly JPEG compressed image for further classification. In order to prevent the over-fitting problem of the deep network, we adopted a series of enhancement schemes in the training stage to enrich the diversity of training data and obtain a more generateable and stable median filter detector. A large number of experimental results on the composite database show that the proposed framework significantly improves the detection performance compared to the latest methods for detecting highly small size image with JPEG compression.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126762655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance 模距离下平衡连通k中心问题的最近邻算法
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00073
Rui Li, Zilan Yang
{"title":"The Nearest Neighbor Algorithm for Balanced and Connected k-Center Problem under Modular Distance","authors":"Rui Li, Zilan Yang","doi":"10.1109/NaNA53684.2021.00073","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00073","url":null,"abstract":"The k-center problem is a famous NP complete problem in combinatorial optimization. Under the traditional distance, there is a 2-approximation algorithm for the center problem, and the partition from the center satisfies the internal connectivity. However, under the modular distance, the partition obtained by the traditional center algorithm may not satisfy the internal connectivity. Therefore, this paper proposes the problem of balanced and connected center under modular distance, and designs a nearest neighbor algorithm. Finally, an example is given to prove the correctness of the algorithm.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115411270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Symmetric Information Hiding Scheme Based on Cover Randomness 一种新的基于覆盖随机性的对称信息隐藏方案
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00058
Fang Ren, Mingyu Yu, Haiyan Xiu, W. Hou
{"title":"A New Symmetric Information Hiding Scheme Based on Cover Randomness","authors":"Fang Ren, Mingyu Yu, Haiyan Xiu, W. Hou","doi":"10.1109/NaNA53684.2021.00058","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00058","url":null,"abstract":"This paper proposes a new symmetric information hiding scheme, aiming to increase the degree of disguise and the security. This scheme utilizes the randomness of the image cover itself to generate the secret key which has high randomness, so as to improve the effect of disguise of stego-objects and the security of information hiding scheme. In addition, this paper also proposes a new randomness test method, which can give more accurate quantitative test results and is suitable for testing the randomness of the cover. Experimental studies show that the new information hiding method can improve the degree of disguise of the stego-object and the security of the steganographic algorithm, and enhance the robustness of the information hiding to some extent.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"527 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123091292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy protection scheme for edge computing based on function encryption 基于函数加密的边缘计算隐私保护方案
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00030
Yuanhang He, Lei Chen, Yi-Tao Ni, Yuyao Wang, Jiangtao Li, Yufeng Li
{"title":"Privacy protection scheme for edge computing based on function encryption","authors":"Yuanhang He, Lei Chen, Yi-Tao Ni, Yuyao Wang, Jiangtao Li, Yufeng Li","doi":"10.1109/NaNA53684.2021.00030","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00030","url":null,"abstract":"In the response to COVID-19, the big data can achieve a new data application mode with reduced manpower and material costs, which will help the government understand the supply and demand status of medical supplies and make precise decisions to ensure the supply of materials and prevent the spread of the epidemic. However, in the medical big data solution based on cloud computing, the user data storage and computing process are all carried out in the cloud, the risk of medical data is increasingly exposed, and the privacy protection of medical data is worrying. Edge computing makes data privacy protection more operational. Because the data collection and calculation are based on the local, and no longer need to be transmitted to the cloud, some important information, especially sensitive information, cannot be transmitted through the network, effectively solving the problem of user privacy leakage and data security. Function encryption provides data with a very flexible method that meets data confidentiality and effective access control. So based on function encryption, this paper proposes a privacy protection scheme under the edge computing paradigm, introduce the data interaction process for the scheme and demonstrates the privacy protection ability and computing efficiency of the scheme in the main scenario of smart medical care.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116357827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-Preserving and Efficient Range Counting in IoT Networks 物联网网络中的隐私保护和有效范围计数
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00091
Ruiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu
{"title":"Privacy-Preserving and Efficient Range Counting in IoT Networks","authors":"Ruiyang Qin, Bowen Deng, Lele Zheng, Xutong Mu","doi":"10.1109/NaNA53684.2021.00091","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00091","url":null,"abstract":"In recent years, Internet of Things (IoT) networks have been received much attention due to their intelligence and automation. Numerous devices are deployed in the networks, and many applications are willing to obtain the distribution of IoT devices in one range for data analysis. However, some distributions of IoT devices include sensitive information which may disclose the privacy of their owners. And most IoT devices cannot afford heavy computation because of their low computing power and limited storage capacity. In this paper, we propose a privacy-preserving and efficient scheme that satisfies local differential privacy and supports O(1) -time-complexity range counting query which can find the number of IoT devices in a range. It also allows IoT devices to join or exit dynamically. Finally, theoretical analysis proves that our scheme satisfies local differential privacy, and our experiments show that our range counting query scheme can get the microsecond level.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115806374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on A Vulnerability Detection Technology for Network Topology Security 一种网络拓扑安全漏洞检测技术研究
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00064
Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu
{"title":"Research on A Vulnerability Detection Technology for Network Topology Security","authors":"Jianxin Ji, Chunli Xia, Tong Zhang, Yichuan Wang, Sheng Liu","doi":"10.1109/NaNA53684.2021.00064","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00064","url":null,"abstract":"Vulnerability detection plays an important role in topology network security. Topology network application scope, users, and transmit the data type of the change, the increasing of the existing vulnerability detection in the process of diversification of data transmission, positioning fuzzy vulnerability detection, error messages are not clear, it is difficult to positioning and eliminate network fault in time. For this, put forward topology network multiplexer output port complex data mutation vulnerability detection. Based on topology network multiplexer output port complex data priority extraction, according to build complex data mutation scanning module and loopholes in the database are defined in the holes details to complete the multiplexer output port complex data mutation detection process. Simulation experiments show that the topology of the network multiplexer output port complex data mutation vulnerability detecting system that can effectively save the data in time. Make vulnerability detection accuracy greatly improved, provides the stability and security of the topology network security.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116263322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics 基于信道特性的改进体域网络匿名混合认证方案
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00022
M. Umar, Xuening Liao, Jiawang Chen
{"title":"Improved Anonymous Hybrid Authentication Scheme for Body Area Network Utilizing Channel Characteristics","authors":"M. Umar, Xuening Liao, Jiawang Chen","doi":"10.1109/NaNA53684.2021.00022","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00022","url":null,"abstract":"Although wireless body network (WBAN) plays a vital role in revolutionizing healthcare delivery, it has also brought security concerns due to the sensitive nature of the patients’ biomedical data being measured by the sensors in the network. Thus, authentication is essential for the safety of the patients in WBAN. Recently, Koya and Deepthi proposed an anonymous hybrid authentication scheme using a physiological signal to fix the security limitations of the existing anonymous authentication approaches in WBAN. However, their scheme lacks forward secrecy and requires that additional sensing hardware be attached to each sensor in WBAN, which is not only cost-prohibitive, but can lead to compatibility issues with legacy systems. To overcome these limitations, we propose an improved anonymous hybrid authentication scheme using physical layer (PHY) channel characteristics. The key idea in the proposed scheme is to replace the physiological signal used in the Koya and Deepthi scheme with a received signal strength (RSS) information already available in the wearable devices in WBAN as an identity identifier. We conduct security analysis to show the security strength of our approach and performance analysis to prove its computational efficiency. Moreover, we conduct experiments on human volunteers in indoor and outdoor locations to show the robustness of the proposed approach. The results demonstrate that our scheme can provide anonymous authentication and identify 90% of attack attempts in WBAN with less computation cost and without any additional sensing hardware.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123470310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes 双陷阱门哈希函数和多陷阱门哈希函数方案的密码分析
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00055
Xu An Wang, Yunxuan Su, Jindan Zhang
{"title":"Cryptanalysis of Double-trapdoor Hash Function and Multi-Trapdoor Hash Function Schemes","authors":"Xu An Wang, Yunxuan Su, Jindan Zhang","doi":"10.1109/NaNA53684.2021.00055","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00055","url":null,"abstract":"Cloud-based storage systems are the norm in our interconnected society, although there remain a number of research and operational challenges relating to the security of such systems. One ongoing research challenge is the design of efficient and secure query authentication mechanism for cloud-based storage systems, in the sense that data users can verify the authenticity and integrity of the retrieved data from the cloud servers. In 2017, Chandrasekhar and Singhal proposed a query authentication protocol for cloud-based storage systems, designed with efficiency and scalability in mind [IEEE Transactions on Services Computing, 10(4):520-533]. In this comment, we demonstrate that their protocol is not secure as claimed, due to weaknesses in two core building blocks of the protocol, namely: the double-trapdoor variant and the multi-trapdoor variant of the trapdoor hash function. By revealing this weakness, we hope future protocol designers can avoid similar mistake in their work.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116770142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol 俄罗斯方块:多路径截止时间感知传输协议的近最优调度
2021 International Conference on Networking and Network Applications (NaNA) Pub Date : 2021-10-01 DOI: 10.1109/NaNA53684.2021.00014
Yanwen Liu, Wei Su, Lizhuang Tan
{"title":"Tetris: Near-optimal Scheduling for Multi-path Deadline-aware Transport Protocol","authors":"Yanwen Liu, Wei Su, Lizhuang Tan","doi":"10.1109/NaNA53684.2021.00014","DOIUrl":"https://doi.org/10.1109/NaNA53684.2021.00014","url":null,"abstract":"Deadline-aware Transport Protocol (DTP) is a new QUIC-based transmission protocol that provides deliver-before-deadline service. Single-path DTP is not conducive to flow fairness and does not make full use of bandwidth. Compared with single-path DTP, the decision space and the solving difficulty of multipath DTP (MPDTP) scheduling are larger. In this paper, we propose a near-optimal scheduling algorithm Tetris for MPDTP. Tetris is a block scheduler based on stream characteristics at the transmission layer. We have verified its feasibility on the simulator under the deployed heterogeneous path of different network environment. The results show that our scheduling algorithm allows data blocks to be delivered before the delivery time as much as possible. The transmission completion time has been increased by 19.53% on average, and the transmission delay of all blocks have been reduced by 11.27%.","PeriodicalId":414672,"journal":{"name":"2021 International Conference on Networking and Network Applications (NaNA)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127626886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信