• 제목/요약/키워드: WuS scheme

검색결과 53건 처리시간 0.023초

The Top-K QoS-aware Paths Discovery for Source Routing in SDN

  • Chen, Xi;Wu, Junlei;Wu, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권6호
    • /
    • pp.2534-2553
    • /
    • 2018
  • Source routing is the routing scheme that arranges the whole path from source to target at the origin node that may suit the requirements from the upper layer applications' perspective. The centralized control in SDN (Software-Defined Networking) networks enables the awareness of the global topology at the controller. Therefore, augmented source routing schemes can be designed to achieve various purposes. This paper proposes a source routing scheme that conducts the top-K QoS-aware paths discovery in SDN. First, the novel non-invasive QoS over LLDP scheme is designed to collect QoS information based on LLDP in a piggyback fashion. Then, variations of the KSP (K Shortest Paths) algorithm are derived to find the unconstrained/constrained top-K ranked paths with regard to individual/overall path costs, reflecting the Quality of Service. The experiment results show that the proposed scheme can efficiently collect the QoS information and find the top-K paths. Also, the performance of our scheme is applicable in QoS-sensitive application scenarios compared with previous works.

자체인증 공개키를 사용하는 threshold 대리서명 기법의 안전성 분석 (Security analysis of a threshold proxy signature scheme using a self-certified public key)

  • 박제홍;강보경;한상근
    • 정보보호학회논문지
    • /
    • 제15권3호
    • /
    • pp.109-114
    • /
    • 2005
  • 최근 다중 사용자 환경에서 안전한 대리서명을 설계하고자 하는 연구가 진행되면서, threshold 서명 방식을 대리서명에 적용한 threshold 대리서명 기법들이 제안되고 있다. 최근 Hsu와 Wu는 이산대수 문제 기반의 자체인증 공개키(Self-certified public key)를 사용하는 threshold 대리서명 기법을 제안하였다. 본 논문에서는 이 대리서명 기법이 자체인증 공개키의 취약성에 의한 원서명자의 위조 공격 (Original signer's forgery attack)에 취약함을 보임으로써 부인 방지 (nonrepudiation) 성질을 가지지 못함을 확인한다.

WBAN 환경에서의 개선된 ID 기반 익명 인증 기법 (An Improved ID-based Anonymous Authentication Scheme for Wireless Body Area Networks)

  • 정민수;석재혁;이동훈
    • 한국정보통신학회논문지
    • /
    • 제21권2호
    • /
    • pp.322-332
    • /
    • 2017
  • WBAN(Wireless Body Area Networks)은 센서를 통해 사용자의 생체 정보를 수집하고 사용자가 요구하는 서비스를 제공해주는 환경을 말한다. 센서의 중요성이 점차 높아짐에 따라 WBAN 또한 주목받고 있다. WBAN은 대표적으로 의료 분야에서 사용되고 환자의 생명과 직결될 수 있다는 문제를 가지고 있기 때문에 안전성은 매우 중요하다. 또한 WBAN에서 사용되는 기기는 연산량에 제한이 있기 때문에 효율성도 매우 중요하게 고려되어야 한다. 이에 따라 WBAN 환경에서의 ID 기반 익명 인증에 관한 연구가 최근 활발하게 진행되고 있다. 본 논문에서는 최근 Wu et al.이 제안한 WBAN 환경에서의 ID 기반 익명 인증 기법이 위장 공격에 취약하다는 것을 보인다. 그리고 Wu et al. 기법 등 이전에 제안되었던 기법들에 대해서 밝혀진 공격에 안전한 새로운 ID 기반 익명 인증 기법을 제안한다. 본 논문에서 제안한 기법은 이전에 제안된 기법들과 비교해서 30.6%, 7.3%만큼 연산량이 개선되었다.

센서노드 선정기법 기반 수중 무선센서망 분산형 표적추적필터 (Sensor Nodes Selecting Schemes-based Distributed Target Tracking Filter for Underwater Wireless Sensor Networks)

  • 유창호;최재원
    • 제어로봇시스템학회논문지
    • /
    • 제19권8호
    • /
    • pp.694-701
    • /
    • 2013
  • This paper deals with the problem of accurately tracking a single target moving through UWSNs (Underwater Wireless Sensor Networks) by employing underwater acoustic sensors. This paper addresses the issues of estimating the states of the target, and improving energy efficiency by applying a Kalman filter in a distributed architecture. Each underwater wireless sensor nodes composing the UWSNs is battery-powered, so the energy conservation problem is a critical issue. This paper provides an algorithm which increases the energy efficiency of each sensor node through WuS (Waked-up/Sleeping) and VM (Valid Measurement) selecting schemes. Simulation results illustrate the performance of the distributed tracking filter.

An Efficient and Secure Authentication Scheme Preserving User Anonymity

  • Kim, Mi Jin;Lee, Kwang Woo;Kim, Seung Joo;Won, Dong Ho
    • 디지털산업정보학회논문지
    • /
    • 제6권3호
    • /
    • pp.69-77
    • /
    • 2010
  • Authentication and key establishment are fundamental procedures to establish secure communications over public insecure network. A password-based scheme is common method to provide authentication. In 2008, Khan proposed an efficient password-based authentication scheme using smart cards to solve the problems inherent in Wu-Chieu's authentication scheme. As for security, Khan claimed that his scheme is secure and provides mutual authentication between legal users and a remote server. In this paper, we demonstrate Khan's scheme to be vulnerable to various attacks, i. e., password guessing attack, insider attack, reflection attack and forgery attack. Our study shows that Khan's scheme does not provide mutual authentication and is insecure for practical applications. This paper proposes an improved scheme to overcome these problems and to preserve user anonymity that is an issue in e-commerce applications.

An Improved Authentication and Key Agreement scheme for Session Initial Protocol

  • Wu, Libing;Fan, Jing;Xie, Yong;Wang, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권8호
    • /
    • pp.4025-4042
    • /
    • 2017
  • Session initiation protocol (SIP) is a kind of powerful and common protocols applied for the voice over internet protocol. The security and efficiency are two urgent requirements and admired properties of SIP. Recently, Hamed et al. proposed an efficient authentication and key agreement scheme for SIP. However, we demonstrate that Hamed et al.'s scheme is vulnerable to de-synchronization attack and cannot provide anonymity for users. Furthermore, we propose an improved and efficient authentication and key agreement scheme by using elliptic curve cryptosystem. Besides, we prove that the proposed scheme is provably secure by using secure formal proof based on Burrows-Abadi-Needham logic. The comparison with the relevant schemes shows that our proposed scheme has lower computation costs and can provide stronger security.

Estimation of Physical Layer Scrambling Code Sequence of DVB-S2

  • Wu, Hao;Xie, Hui;Huang, Zhi-Tao;Zhou, Yi-Yu
    • ETRI Journal
    • /
    • 제36권2호
    • /
    • pp.329-332
    • /
    • 2014
  • In this letter, the problem of estimating the physical layer (PL) scrambling code sequence of DVB-S2 is studied. We present the first ever scheme to estimate the scrambling sequence. The scheme is based on hypothesis testing. By analyzing the PL scrambling process, we construct a new sequence equivalent to the scrambling sequence. We then use hypothesis testing to estimate the new sequence. The threshold for the hypothesis testing is also discussed. The experiment results show that the performance of our estimation scheme can work even under high BER.

A User Anonymous Mutual Authentication Protocol

  • Kumari, Saru;Li, Xiong;Wu, Fan;Das, Ashok Kumar;Odelu, Vanga;Khan, Muhammad Khurram
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권9호
    • /
    • pp.4508-4528
    • /
    • 2016
  • Widespread use of wireless networks has drawn attention to ascertain confidential communication and proper authentication of an entity before granting access to services over insecure channels. Recently, Truong et al. proposed a modified dynamic ID-based authentication scheme which they claimed to resist smart-card-theft attack. Nevertheless, we find that their scheme is prone to smart-card-theft attack contrary to the author's claim. Besides, anyone can impersonate the user as well as service provider server and can breach the confidentiality of communication by merely eavesdropping the login request and server's reply message from the network. We also notice that the scheme does not impart user anonymity and forward secrecy. Therefore, we present another authentication scheme keeping apart the threats encountered in the design of Truong et al.'s scheme. We also prove the security of the proposed scheme with the help of widespread BAN (Burrows, Abadi and Needham) Logic.

Network-Coding-Based Coded Cooperation

  • Wu, Suwen;Zhu, Jinkang;Qiu, Ling;Zhao, Ming
    • Journal of Communications and Networks
    • /
    • 제12권4호
    • /
    • pp.366-374
    • /
    • 2010
  • Coded cooperation is a promising user cooperation scheme. In this paper, we first propose a novel network-coding-based coded cooperation scheme. When a user decodes its partner's information correctly in the first frame, it transmits the combination of the partner's parity bits and its own parity bits through network coding in the second frame. This is distinct from the classical scheme, where the user only transmits the partner's parity bits during cooperation. We analyze the outage probability of the proposed scheme, and show that it achieves a full diversity order. Numerical evaluations reveal that the proposed scheme outperforms the classical scheme when the inter-user channel is poor, yet is worse when the inter-user channel is strong. Also, the results show that the proposed scheme always outperforms that of no cooperation in various channel conditions while the performance of classical scheme is worse than that of no cooperation with the poor inter-user channels. This means that the performance of the proposed scheme is more stable than the classical scheme and the proposed scheme is more tolerant to the poor inter-user channels. To combine the advantages of the proposed scheme and the classical scheme under different inter-user channel conditions, we propose an adaptive solution. This adaptive scheme enhances the system performance considerably in all channel conditions in spite of the inter-user channel quality, at the expense of only one acknowledgement or non-acknowledgement bit.

Adaptive Priority-Based Downlink Scheduling for WiMAX Networks

  • Wu, Shih-Jung;Huang, Shih-Yi;Huang, Kuo-Feng
    • Journal of Communications and Networks
    • /
    • 제14권6호
    • /
    • pp.692-702
    • /
    • 2012
  • Supporting quality of service (QoS) guarantees for diverse multimedia services are the primary concerns for WiMAX (IEEE 802.16) networks. A scheduling scheme that satisfies QoS requirements has become more important for wireless communications. We propose a downlink scheduling scheme called adaptive priority-based downlink scheduling (APDS) for providing QoS guarantees in IEEE 802.16 networks. APDS comprises two major components: Priority assignment and resource allocation. Different service-type connections primarily depend on their QoS requirements to adjust priority assignments and dispatch bandwidth resources dynamically. We consider both starvation avoidance and resource management. Simulation results show that our APDS methodology outperforms the representative scheduling approaches in QoS satisfaction and maintains fairness in starvation prevention.