Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Preface
Organization
Contents
Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves
1 Introduction
2 Background
2.1 Commitment Schemes
2.2 Twisted Edwards Curves
3 Implementation Details
3.1 Prime-Field Arithmetic
3.2 Point Arithmetic
3.3 Computation of Pedersen Commitments
3.4 Supported TE Curves
4 Benchmarking Results
4.1 Field Operations
4.2 Commitments
5 Applications
6 Concluding Remarks
A Algorithms for Point Arithmetic
References
Enhanced Sinkhole System: Collecting System Details to Support Investigations
1 Introduction
2 Related Work
3 DNS Sinkholing
3.1 Concept
3.2 Implementation
3.3 Malicious Domains
3.4 Sinkhole System
4 Enhanced Sinkhole System
4.1 Approach
4.2 Characteristics
5 Evaluation
5.1 Lab Environment
5.2 Proof of Concept System
5.3 Malware Execution
6 Conclusion and Future Work
References
An Autonomous System Based Security Mechanism for Network Coding Applications in Content-Centric Networking
1 Introduction
2 CCN Fundamentals
2.1 Content Retrieval in CCN
2.2 Security Practice in Original CCN
2.3 Security Related Work
3 Network Coding in CCN
3.1 General NC Mechanism Without Security Measures
4 Security Mechanism Based on Autonomous Systems
4.1 Implications for Producers
4.2 Implications for Routers Within an AS
4.3 Implications for Border Routers
4.4 Implications for Consumers
5 Performance and Implementation Issues
6 Conclusion and Future Work
References
An Ultra-Lightweight Authentication Scheme for Heterogeneous Wireless Sensor Networks in the Context of Internet of Things
1 Introduction
2 Related Work
3 The Proposed Scheme
3.1 Network Architecture
3.2 Notations
3.3 Functioning
4 Security Analysis of the Proposed Scheme
5 Performance Analysis of the Proposed Scheme
6 Conclusion
References
Authentication Based Elliptic Curves Digital Signature for ZigBee Networks
Abstract
1 Introduction
2 ZigBee Standards
2.1 ZigBee Key Management
3 ECDSA Algorithm
4 Related Works
5 Authentication Based Elliptic Curves Digital Signature for ZigBee Networks
5.1 Access Control
5.2 Group Key Calculation
5.3 End to End Authentication
5.4 Adding New Nodes to the Network
6 Security Analysis
6.1 Access Control
6.2 Protection Against Man-in-the-Middle Attack
6.3 Resistance to Eavesdropping
7 Performances Analysis
7.1 Energy Consumption
7.2 Delay of Authentication Between Two Devices
7.3 Resources Consumption
8 Conclusion
References
Formal Modeling and Performance Evaluation of Network’s Server Under SYN/TCP Attack
Abstract
1 Introduction
2 Related Works
3 Petri Nets
3.1 Description of Petri Net
3.2 Enabling Rule
3.3 Deterministic and Stochastic Petri Nets (DSPN)
4 Description of SYN/TCP Attack Model
4.1 DSPN Model of SYN/TCP Attack
5 Evaluation of Connection Loss Probability Ploss
5.1 Qualitative Analysis
5.2 Numerical Examples for Evaluation of Loss Connection Probability
5.3 Evaluation of Some Other Performance Parameters
6 Conclusion
References
Empirical Evaluation of a Distributed Deployment Strategy for Virtual Networks
1 Introduction
2 The Virtual Network Embedding Problem
3 Related Work
3.1 Centralized Approaches
3.2 Distributed Approaches
4 The DPVNE Algorithm
5 Method
6 Evaluation
6.1 Setup
6.2 Results
7 Conclusion
References
Identifying Service Contexts for QoS Support in IoT Service Oriented Software Defined Networks
Abstract
1 Introduction
2 Related Works
3 Acquiring Service Context Through Traffic Classification
3.1 Target Services
3.2 Data Acquisition and Pre-processing
3.3 Identifying Flows Based on Legacy Method
3.4 Identification Based on Statistical Properties Flows
3.5 MPL, MIAT and Standard Deviation Interpacket Arrival Time (SDIAT)
4 Conclusion
Acknowledgement
References
A Fast Bit-Level MPLS-Based Source Routing Scheme in Software Defined Networks: SD-{W,L}AN
1 Introduction
2 Related Work
3 Proposed Mechanism
3.1 Problem Formulation
3.2 Proposed Scheme
3.3 Routing Path Clustering
3.4 Encoding Routing Information Procedure
3.5 Decoding Routing Information Procedure
3.6 Multicast Scenario
4 Experiment and Results
4.1 Results Analysis
5 Conclusion and Future Work
References
Requirements and Complexity Analysis of Cross-Layer Design Optimization for Adaptive Inter-vehicle DSRC
Abstract
1 Introduction
2 Empirical Study of V2V DSRC Performance
2.1 DSRC Channel Conditions in Various Traffic Scenarios
2.2 Performance of DSRC in Different Channel Congestion Conditions
3 Existing Approaches to DSRC Congestion Control
3.1 Channel Congestion Control
3.2 Awareness Control
4 Cross-Layer Design for DSRC
4.1 Requirements of C-ITS Safety Applications
4.2 Cross-Layer Design Approach
5 Evaluation of CLD-DSRC Complexity
5.1 Evaluation Metrics
5.2 Time-Space Complexity
5.3 Stack-Database Crossing and Data Path Delay
6 Discussion and Conclusions
References
Technique Stages for Efficient Wideband Spectrum Sensing Based on Compressive Sensing
Abstract
1 Introduction
2 Reference Framework
3 Proposed Methodological Approach
3.1 Pre-processing and Digitizing the RF Signal
3.2 Extraction of Characteristics
3.3 Classification and Identification
4 Methodology Validation
5 Wideband Spectrum Sensing Algorithm
6 Performance Evaluation
7 Conclusions
References
Predicting Response Time-Related Quality-of-Service Outages of PaaS Cloud Applications by Machine Learning
1 Introduction
2 Related Work
3 Design of the Prediction Approach
4 Proof-of-Concept Implementation
5 Evaluation and Results
6 Conclusion
References
Intelligent Road Design Using Artificial Intelligence Techniques
1 Introduction
2 Hypothesis
3 Methodology
4 Design
5 Discussion of Results
6 Conclusions
References
Mobility Prediction in Vehicular Networks: An Approach Through Hybrid Neural Networks Under Uncertainty
1 Introduction
2 Related Work
3 Mathematical Formulation of Proposed Model
3.1 Structure of the Auxiliary Function in a Vehicular Network
4 Proposed High Level Description of the Hybrid Neural Network
4.1 Results and Analysis
5 Conclusion
References
Building of an Information Retrieval System Based on Genetic Algorithms
1 Introduction
2 Genetic Algorithm in Information Retrieval System
2.1 Information Retrieval System
2.2 Genetic Algorithm
2.3 Genetic Algorithms in Query Optimization
3 Genetic Algorithm Based Query Optimization Method
3.1 Document Vectorization and Relevance Feedback
3.2 Chromosomes and Population
3.3 Fitness Function
3.4 Genetic Operators
3.5 Next Generation
3.6 Termination Criteria and Solution
4 Experimental Results
4.1 Test Collections
4.2 Experiments Preparation
4.3 Selection of Relevance Feedback
4.4 Selection of Queries
5 Explanation of Our Experiments
5.1 Control Parameters
5.2 Evaluation and Experimental Plan
5.3 Experimental Results and Comparison
6 Conclusion and Perspectives
References
A GRC-Centric Approach for Enhancing Management Process of IoT-Based Health Institution
Abstract
1 Introduction
2 Domain Model for Health Institution Application Based on IoT
3 A GRC and IOT Technologies Centric Architecture (tGRC)
3.1 Internet of Things
3.2 Governance, Risk Management and Compliance
3.3 The Proposed Information System Architecture Based on IoT Technologies
4 The tGRC Module
4.1 Formalization of the tGRC Concepts (First Tentative)
5 Some Implementation Aspects
6 Related Works
7 Conclusion
References
Energy Consumption Estimation for Energy-Aware, Adaptive Sensing Applications
1 Introduction
2 Related Work
3 Energy Aware Sensing Applications
3.1 Sensor Node Logic
3.2 Energy-Aware Planning
4 Simple Sampling Approach
5 Measuring Power Consumption of Phases
6 Runtime Logic for Energy Estimation
7 Evaluation and Discussion
8 Conclusion
References
Author Index
← Prev
Back
Next →
← Prev
Back
Next →