2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

筛选
英文 中文
Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu IPv4和IPv6在Windows Vista和Linux Ubuntu上的性能评估
S. Narayan, Peng Shang, Na Fan
{"title":"Performance Evaluation of IPv4 and IPv6 on Windows Vista and Linux Ubuntu","authors":"S. Narayan, Peng Shang, Na Fan","doi":"10.1109/NSWCTC.2009.368","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.368","url":null,"abstract":"A small network of computing devices that started as ARPANET project in early 1980s is now a worldwide network of devices for billions of users. This global network, the Internet, has become an integral part of worldwide economy and life of individuals. Internet Protocol (IP) v4 is the basic building block of the Internet and has served well, but it has limitations that hinder its growth. The solution is IPv6, which addresses inherent problems of the earlier version. However, due to the increased overhead in IPv6 and its interaction with the operating system that hosts this communication protocol, there may be network performance issues. In this paper, two operating systems namely, Windows Vista and Linux Ubuntu are configured with the two versions of IP and empirically evaluated for performance difference. Performance related metrics like throughput, delay, jitter and CPU usage are empirically measured on a test-bed implementation. The results show that network performance depends not only on IP version and traffic type, but also on the choice of the operating system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134048829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Initialization Method of Gene Library Based on Teiresias Algorithm 基于Teiresias算法的基因库初始化方法
D. You-xiang, Huang Min, Xu Jiuyun
{"title":"Initialization Method of Gene Library Based on Teiresias Algorithm","authors":"D. You-xiang, Huang Min, Xu Jiuyun","doi":"10.1109/NSWCTC.2009.119","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.119","url":null,"abstract":"this paper analyses the problems and disadvantages of generating detectors in the current intrusion detection system so as to propose a method that can be applied into Teiresias algorithm to initialize gene library, relating with the ways of generating detectors by using the gene library based on the artificial immune theory. By using Teiresias algorithm to preprocess the non-self data, we can get a more effective variable-length sequence pattern that can reflect the non-self characteristics. Using this pattern, which is relatively independent, complete and meaningful, to initialize the gene library can make the gene library more optimized, and this will greatly improve the efficiency and accuracy of intrusion detection system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131892677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks 基于信誉的集群自组网信任管理策略
Li Xu, Yihui Zhang
{"title":"A New Reputation-Based Trust Management Strategy for Clustered Ad Hoc Networks","authors":"Li Xu, Yihui Zhang","doi":"10.1109/NSWCTC.2009.265","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.265","url":null,"abstract":"To overcome the issue of limited information about unfamiliar nodes and to reduce the required memory space, a reputation-based trust management strategy for clustered ad hoc networks is proposed in this paper. Basically, our solution begin with gathering neighboring nodes as a cluster with a node selected as the cluster head who is responsible of issuing a trust certificate to every cluster member. Then we propose the method of combining trust ratings and modified Bayesian in the information exchange and reputation judgment. The network is not susceptible to damage from selfish or malicious nodes easily and efficiently. Finally, Analysis of the strategy and performance simulation is also presented.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134156264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
A Time-decay Based P2P Trust Model 基于时间衰减的P2P信任模型
Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang
{"title":"A Time-decay Based P2P Trust Model","authors":"Yong Zhang, Kewen Wang, Keqiu Li, W. Qu, Yang Xiang","doi":"10.1109/NSWCTC.2009.98","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.98","url":null,"abstract":"This paper proposes a time-decay based trust model in peer-to-peer networks. Through the transaction time is faded, the proposed model makes trust value changed dynamically with time decay, which achieves the goal that the more transaction close to, the more reliable it is. Finally this paper presents the experimental protocol and simulation. The experimental result shows that the proposed model is more approached fact value and it can resist vicious association attraction, dynamic strategy attraction, and it has a favorable performance.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133826758","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
A Range Query Model Based on DHT in P2P System P2P系统中基于DHT的范围查询模型
Wang Dan, Li Maozeng
{"title":"A Range Query Model Based on DHT in P2P System","authors":"Wang Dan, Li Maozeng","doi":"10.1109/NSWCTC.2009.55","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.55","url":null,"abstract":"A Peer-to-Peer (P2P) system has emerged as one of the most successful ways to share resources in distributed environment, and DHT(Distributed Hash Table) is used as an effective approach to locate shared resources in a P2P system. This paper describes an extended DHT model by combining DHT with B+ tree. The sharing resources are represented by their attributes. Each query request is associated with ranges in one or more attributes, and B+ tree is introduced to organize the values of each attribute. In order to implement and verify our model, Chord is chosen as the underlying DHT system. In addition to equality queries, this model also makes it possible to execute range queries over a DHT. The relevant technologies mapping from B+ trees to Chord system are described. The node adding and leaving process and range query process are illustrated.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"35 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114024287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
SPTM: A Security Protocol for Protecting the P2P Trust Information Management 一种保护P2P信任信息管理的安全协议
Jianli Hu, Quanyuan Wu, Bin Zhou
{"title":"SPTM: A Security Protocol for Protecting the P2P Trust Information Management","authors":"Jianli Hu, Quanyuan Wu, Bin Zhou","doi":"10.1109/NSWCTC.2009.156","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.156","url":null,"abstract":"The open, sharing and anonymous nature of peer-to-peer (P2P) network has offered opportunities and threats for the development of distributed computing technology. One feasible way to minimize threats is to establish the reputation-based trust management system (TMS). Most of previous work concentrates on how to rate peers’ behaviors with the trust mechanism and how to establish the reputation-based trust management mechanism, but takes no consideration of the security problems in trust information management. As for this issue, this paper proposes a security protocol for protecting the P2P trust information management (SPTM). Theoretical analysis and simulation experiments show that, SPTM can effectively suppress the sybil attackers and trust information tamper peers in transmissions with little time overhead. Moreover, it can be easily integrated into various reputation-based TMSs.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115589013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Topology Optimization for Target Localization in Wireless Sensor Networks 无线传感器网络中目标定位的拓扑优化
Chao Yang, Lijun Chen, Daoxu Chen, Li Xie
{"title":"Topology Optimization for Target Localization in Wireless Sensor Networks","authors":"Chao Yang, Lijun Chen, Daoxu Chen, Li Xie","doi":"10.1109/NSWCTC.2009.28","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.28","url":null,"abstract":"Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology 基于无线传感器网络技术的石油钻井监测系统的研究与开发
Qinghua Xu, Jinyu Jiang, Xianbiao Wang
{"title":"Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology","authors":"Qinghua Xu, Jinyu Jiang, Xianbiao Wang","doi":"10.1109/NSWCTC.2009.270","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.270","url":null,"abstract":"Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Research of Hybrid Network Communication System in NC System 数控系统中混合网络通信系统的研究
Kun-qi Wang, Pengju Wang, Ya-nan Wang
{"title":"The Research of Hybrid Network Communication System in NC System","authors":"Kun-qi Wang, Pengju Wang, Ya-nan Wang","doi":"10.1109/NSWCTC.2009.345","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.345","url":null,"abstract":"Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semantic Access Control for Web Services Web服务的语义访问控制
Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang
{"title":"Semantic Access Control for Web Services","authors":"Miao Liu, Dongqing Xie, Peng Li, Xunlai Zhang, Chunming Tang","doi":"10.1109/NSWCTC.2009.389","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.389","url":null,"abstract":"The paper designs the WSACPL policy ontology to express access control policies for web services. The ontology also includes a mechanism to resolve conflicts among WSACPL policies. In the end, the paper gives an implementation called WACS. The WACS combines WSACPL policy ontology with domain ontology and service ontology to realize semantic access control for web services.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"652 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117109154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信