针对公共密钥密码系统识别模拟攻击的计算复杂度高,而功率时延模型(PDP)又受限于模型必须存在足够距离差的问题,提出一种基于差分标志字节(DFB)的无线通信安全策略,并给出了生成DFB的差分方程。该策略利用用户传输的数据信息,建立适当...针对公共密钥密码系统识别模拟攻击的计算复杂度高,而功率时延模型(PDP)又受限于模型必须存在足够距离差的问题,提出一种基于差分标志字节(DFB)的无线通信安全策略,并给出了生成DFB的差分方程。该策略利用用户传输的数据信息,建立适当的差分标致字节的生成方程,使得当前传输的数据帧的标志字节由已传帧的相关参数决定,最后接收端通过阈值判决验证接收数据帧的差分标致字节,识别模拟攻击。通过理论分析,差分标致字节可以防止攻击者利用已掌握的部分通信参数信息,对用户实施反复的模拟攻击。在时间上,攻击者有效攻击时间更短,攻击达成周期更长。在空间上,攻击者空间位置被限制在有限椭圆内。最后,结合一种具体、简易的DFB进行了仿真分析,结果表明,此种简易模型下,通信系统的信噪比(SNR)高于-4 d B时,系统能够通过设置合适的阈值,能够实现针对模拟攻击的识别与防护。展开更多
Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applicatio...Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.展开更多
Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changi...Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area.展开更多
In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-respo...In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.展开更多
There is an increasing demand on wireless communications in subway tunnels to provide video surveillance and sensory data for security,maintenance and train control,and to offer various communication or entertainment ...There is an increasing demand on wireless communications in subway tunnels to provide video surveillance and sensory data for security,maintenance and train control,and to offer various communication or entertainment services(e.g.,Internet,etc.) to passengers as well.The wireless channel in tunnels is quite unique due to the confined space and the waveguide effects.Therefore,modeling the radio channel characteristics in tunnels is critically important for communication systems design or optimization.This paper investigates the key radio channel characteristics of a subway tunnel at 2.4 GHz and 5 GHz,such as the path loss,root mean square(RMS) delay spread,channel stationarity,Doppler shift,and channel capacity.The field measurements show that channel characteristics in tunnels are highly location-dependent and there exist abundant components in Doppler shift domain.In the straight section of the subway tunnel,the measured path loss exponents are close to1.6,lower than that in free space.展开更多
A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist se...SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table.展开更多
文摘针对公共密钥密码系统识别模拟攻击的计算复杂度高,而功率时延模型(PDP)又受限于模型必须存在足够距离差的问题,提出一种基于差分标志字节(DFB)的无线通信安全策略,并给出了生成DFB的差分方程。该策略利用用户传输的数据信息,建立适当的差分标致字节的生成方程,使得当前传输的数据帧的标志字节由已传帧的相关参数决定,最后接收端通过阈值判决验证接收数据帧的差分标致字节,识别模拟攻击。通过理论分析,差分标致字节可以防止攻击者利用已掌握的部分通信参数信息,对用户实施反复的模拟攻击。在时间上,攻击者有效攻击时间更短,攻击达成周期更长。在空间上,攻击者空间位置被限制在有限椭圆内。最后,结合一种具体、简易的DFB进行了仿真分析,结果表明,此种简易模型下,通信系统的信噪比(SNR)高于-4 d B时,系统能够通过设置合适的阈值,能够实现针对模拟攻击的识别与防护。
基金the Iran Telecommunication Research Center (ITRC)
文摘Currently, there is a growing belief that putting an IEEE 802.11-like radio into road vehicles can help the drivers to travel more safely. Message dissemination protocols are primordial for safety vehicular applications. There are two types of safety messages which may be exchanged between vehicles: alarm and beacon. In this paper we investigate the feasibility of deploying safety applications based on beacon message dissemination through extensive simulation study and pay special attention to the safety requirements. Vehicles are supposed to issue these messages periodically to announce to other vehicles their current situation and use received messages for preventing possible unsafe situations. We evaluate the performance of a single-hop dissemination protocol while taking into account the quality of service (QoS) metrics like delivery rate and delay. We realize that reliability is the main concern in beacon message dissemination. Thus, a new metric named effective range is defined which gives us more accurate facility for evaluating QoS in safety applications specifically. Then, in order to improve the performance, the effects of three parameters including vehicle's transmission range, message transmission's interval time and message payload size are studied. Due to special characteristics of the safety applications, we model the relationship between communication-level QoS and application-level QoS and evaluate them for different classes of safety applications. As a conclusion, the current technology of IEEE 802.11 MAC layer has still some challenges for automatic safety applications but it can provide acceptable QoS to driver assistance safety applications.
基金Project supported by the Shanghai Minicipal Natural Science Foundation(Grant No09ZR1414900)the National High Technology Development 863 Program of China(Grant No2006AA01Z436,No2007AA01Z452,No2009AA01Z118)
文摘Wireless mesh network is a new emerging field with its potential applications in extremely unpredictable and dynamic environments.However,it is particularly vulnerable due to its features of open medium,dynamic changing topology, cooperative routing algorithms.The article surveys the state of the art in security for wireless mesh networks.Firstly,we analyze various possible threats to security in wireless mesh networks.Secondly,we introduce some representative solutions to these threats,including solutions to the problems of key management,secure network routing,and intrusion detection.We also provide a comparison and discussion of their respective merits and drawbacks,and propose some improvements for these drawbacks.Finally,we also discuss the remaining challenges in the area.
基金Project (No. 60372076) supported by the National Natural ScienceFoundation of China
文摘In this paper, the authors present a novel mutual authentication and key agreement protocol based on the Number Theory Research Unit (NTRU) public key cryptography. The symmetric encryption, hash and “challenge-response” techniques were adopted to build their protocol. To implement the mutual authentication and session key agreement, the proposed protocol contains two stages: namely initial procedure and real execution stage. Since the lightweight NTRU public key cryptography is employed, their protocol can not only overcome the security flaws of secret-key based authentication protocols such as those used in Global System for Mobile Communications (GSM) and Universal Mobile Telecommunications System (UMTS), but also provide greater security and lower computational complexity in comparison with currently well-known public key based wireless authentication schemes such as Beller-Yacobi and M.Aydos protocols.
基金supported in part by the NSFC project under grant No.61132003the Fundamental Research Funds for the Central Universities(2013JBZ002)the Ph.D.Program Foundation of Ministry of Education of China under grant No.20120009130002
文摘There is an increasing demand on wireless communications in subway tunnels to provide video surveillance and sensory data for security,maintenance and train control,and to offer various communication or entertainment services(e.g.,Internet,etc.) to passengers as well.The wireless channel in tunnels is quite unique due to the confined space and the waveguide effects.Therefore,modeling the radio channel characteristics in tunnels is critically important for communication systems design or optimization.This paper investigates the key radio channel characteristics of a subway tunnel at 2.4 GHz and 5 GHz,such as the path loss,root mean square(RMS) delay spread,channel stationarity,Doppler shift,and channel capacity.The field measurements show that channel characteristics in tunnels are highly location-dependent and there exist abundant components in Doppler shift domain.In the straight section of the subway tunnel,the measured path loss exponents are close to1.6,lower than that in free space.
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
文摘SG (smart grids) is an intelligent power grid in which the diverse nodes should communicate different types of information which have different communication requirements with CS (control stations). There exist several RATs (radio access technologies), with diversification in quality of service character which respect to the SG nodes communication requirements. On the other side, spectrum is becoming a rare source and its demands request is increasing exponentially. Therefore, resource allocation to support different types of SG nodes should be elaborated so that the resource efficiency is maximized while the SG communication requirements are respected. Using a CF (cost function) based on the SG node requirements and RATs characteristics to find the desirability value of every RATs for a certain node type accomplish this goal in combination with prioritizing the different SG nodes types based on SG goals by creating a priority table for RATs and different SG node types. The main node communication requirements are formulized to be used in the CF in this paper. The numerical results show that the proposed method defines the desirability value of each RAT for a certain SG node type that helps to make a priority table by using the SG node prioritization table.