Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localizat...Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localization algorithm has to be dynamic, scalable and should not impose high computation or communication overhead. The localization systems are also prone to attacks. We target a localization scheme for mobile sensor networks called Monte-Carlo Localization, which study its behavior under the most dangerous attack on localization called Wormhole Attack, also known as Collusion Attack and propose a modified algorithm that can help the localization system retain its accuracy level even in the presence of attacks. Our algorithm has communication cost almost equal to that of original localization algorithm (in this case MCL) in the absence of attacks.展开更多
A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy A...A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator (LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection.展开更多
This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geom...This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks.展开更多
The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in...The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in LW network models with different LW sizes were investigated using the cascading failures load model. We found that the LW size has a significant impact on the network's robustness against deliberate attacks. It is much easier to trigger cascading failures in LW evolving networks with a larger LW size. Therefore, to avoid cascading failures in real networks with local preferential attachment such as the Internet, the World Trade Web and the multi-agent system, the LW size should be as small as possible.展开更多
ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS ...ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.展开更多
In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a gr...In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions.展开更多
This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based o...This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based on Sequence Local Alignment) and a multi-sequence alignment algorithm-TGMSA (Tri-stage Gradual Multi-Sequence Alignment). With the inspiration of sequence alignment used in Bioinformatics, GASBSLA replaces global alignment and constant weight penalty model by local alignment and affine penalty model to improve the generality of attack signatures. TGMSA presents a new pruning policy to make the algorithm more insensitive to noises in the generation of attack signatures. In this paper, GASBSLA and TGMSA are described in detail and validated by experiments.展开更多
Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecu...Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecure quantum channel. In this paper, we propose a method of phase attack on reference pulses of the LLO-CVQKD with time-multiplexing. Under this phase attack, the phase drifts of reference pulses are manipulated by eavesdroppers, and then the phase compensation error is increased. Consequently, the secret key rate is reduced due to the imperfect phase compensation for quantum signals. Based on the noise model of imperfect phase compensation, the practical security of LLO-CVQKD under phase attack is analyzed. The simulation results show that the practical security is reduced due to the phase attack, yet it is still tight when system parameters are estimated by training signals.展开更多
尽管深度神经网络在很多任务上取得了良好的结果,但是它们对于微小的对抗扰动却很容易出现预测错误.然而在人体姿态估计的对抗攻击任务中,通常需要添加较大的扰动噪声才能攻击成功,这使得其不可察性变差;减少扰动噪声又会削弱攻击效果....尽管深度神经网络在很多任务上取得了良好的结果,但是它们对于微小的对抗扰动却很容易出现预测错误.然而在人体姿态估计的对抗攻击任务中,通常需要添加较大的扰动噪声才能攻击成功,这使得其不可察性变差;减少扰动噪声又会削弱攻击效果.为了克服该矛盾,提出一种面向人体姿态估计的两阶段局部对抗攻击方法.所提方法首先通过预攻击估计出扰动关键区域,然后利用不可察性约束在关键区域内生成扰动.方法不仅可以对人体姿态进行有效攻击,而且还能确保最终扰动区域具有低可察性.采用COCO2017作为对抗扰动实验数据集并使用PCK(percentage of correct keypoints)作为评价指标,比较在人体姿态估计模型中IGSM和C&W方法的攻击效果,其PCK降低值分别提高了15.4%与2.8%.实验结果表明所提方法在保证攻击的低可察的同时,能够取得较好的攻击效果.展开更多
基金Acknov,.4edgements This work was supported in part by National Basic Research Program of China ("973 program") under contract No. 2007CB307101, and in part by National Natural Science Foundation of China under Grant No. 60833002, No. 60802016 and No.60972010.
文摘Localization is the basic requirement for network management in Wireless Sensor Networks as it helps nodes find their absolute position coordinates and in gathering information relevant to their locations. A localization algorithm has to be dynamic, scalable and should not impose high computation or communication overhead. The localization systems are also prone to attacks. We target a localization scheme for mobile sensor networks called Monte-Carlo Localization, which study its behavior under the most dangerous attack on localization called Wormhole Attack, also known as Collusion Attack and propose a modified algorithm that can help the localization system retain its accuracy level even in the presence of attacks. Our algorithm has communication cost almost equal to that of original localization algorithm (in this case MCL) in the absence of attacks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61379153,61401519,and 61572529)the Natural Science Foundation of Hunan Province,China(Grant No.2017JJ3415)+1 种基金the Science and Technology Project of Guangxi Zhuang Autonomous Region,China(Grant Nos.AC16380094and 1598008-29)the Natural Science Fund of Guangxi Zhuang Autonomous Region,China(Grant No.2015GXNSFAA139298)
文摘A modified continuous-variable quantum key distribution (CVQKD) protocol is proposed by originating the entangled source from a malicious third party Eve in the middle instead of generating it from the trustworthy Alice or Bob. This method is able to enhance the efficiency of the CVQKD scheme attacked by local oscillator (LO) intensity attack in terms of the generated secret key rate in quantum communication. The other indication of the improvement is that the maximum transmission distance and the maximum loss tolerance can be increased significantly, especially for CVQKD schemes based on homodyne detection.
基金Supported by the National Natural Science Foun-dation of China (60373062 ,60573045)
文摘This paper proposes a novel robust image watermarking scheme for digital images using local invariant features and Independent Component Analysis (ICA). Most present watermarking algorithms are unable to resist geometric distortions that desynchronize the location. The method we propose here is robust to geometric attacks. In order to resist geometric distortions, we use a local invariant feature of the image called the scale invariant feature transform, which is invariant to translation and scaling distortions. The watermark is inserted into the circular patches generated by scale-invariant key point extractor. Rotation invariance is achieved using the translation property of the polar-mapped circular patches. Our method belongs to the blind watermark category, because we use Independent Component Analysis for detection that does not need the original image during detection. Experimental results show that our method is robust against geometric distortion attacks as well as signal-processing attacks.
基金the National Basic Research Program (973) of China (No. 2004CB217902)the National Natural Science Foundation of China (Nos. 60421002 and 60804045)the Postdoctoral Science Foundation of China (No. 20070421163)
文摘The local-world (LW) evolving network model shows a transition for the degree distribution between the exponential and power-law distributions, depending on the LW size. Cascading failures under intentional attacks in LW network models with different LW sizes were investigated using the cascading failures load model. We found that the LW size has a significant impact on the network's robustness against deliberate attacks. It is much easier to trigger cascading failures in LW evolving networks with a larger LW size. Therefore, to avoid cascading failures in real networks with local preferential attachment such as the Internet, the World Trade Web and the multi-agent system, the LW size should be as small as possible.
文摘ARP-based Distributed Denial of Service (DDoS) attacks due to ARP-storms can happen in local area networks where many computer systems are infected by worms such as Code Red or by DDoS agents. In ARP attack, the DDoS agents constantly send a barrage of ARP requests to the gateway, or to a victim computer within the same sub-network, and tie up the resource of attacked gateway or host. In this paper, we set to measure the impact of ARP-attack on resource exhaustion of computers in a local area network. Based on attack experiments, we measure the exhaustion of processing and memory resources of a victim computer and also other computers, which are located on the same network as the victim computer. Interestingly enough, it is observed that an ARP-attack not only exhausts resource of the victim computer but also significantly exhausts processing resource of other non-victim computers, which happen to be located on the same local area network as the victim computer.
文摘In wireless sensor networks (WSNs), as the shared nature of the wireless medium, jam- ming attacks can be easily launched and result in a great damage to the network. How to deal with jamming attacks has become a great concern recently. Finding the location of a jammer is important to take security actions against the jammer, and thus to restore the network communication. After a comprehensive study on the jammer localization problem, a lightweight easy-operated algorithm called triple circles localization (TCL) is proposed. The evaluation results have demonstrated that, compared with other approaches, TCL achieves the best jammer localization accuracy under variable conditions.
文摘This paper presents a new algorithm for generation of attack signatures based on sequence alignment. The algorithm is composed of two parts: a local alignment algorithm-GASBSLA (Generation of Attack Signatures Based on Sequence Local Alignment) and a multi-sequence alignment algorithm-TGMSA (Tri-stage Gradual Multi-Sequence Alignment). With the inspiration of sequence alignment used in Bioinformatics, GASBSLA replaces global alignment and constant weight penalty model by local alignment and affine penalty model to improve the generality of attack signatures. TGMSA presents a new pruning policy to make the algorithm more insensitive to noises in the generation of attack signatures. In this paper, GASBSLA and TGMSA are described in detail and validated by experiments.
文摘Continuous-variable quantum key distribution (CVQKD) with the local local oscillator (LLO) is confronted with new security problems due to the reference pulses transmitted together with quantum signals over the insecure quantum channel. In this paper, we propose a method of phase attack on reference pulses of the LLO-CVQKD with time-multiplexing. Under this phase attack, the phase drifts of reference pulses are manipulated by eavesdroppers, and then the phase compensation error is increased. Consequently, the secret key rate is reduced due to the imperfect phase compensation for quantum signals. Based on the noise model of imperfect phase compensation, the practical security of LLO-CVQKD under phase attack is analyzed. The simulation results show that the practical security is reduced due to the phase attack, yet it is still tight when system parameters are estimated by training signals.
文摘尽管深度神经网络在很多任务上取得了良好的结果,但是它们对于微小的对抗扰动却很容易出现预测错误.然而在人体姿态估计的对抗攻击任务中,通常需要添加较大的扰动噪声才能攻击成功,这使得其不可察性变差;减少扰动噪声又会削弱攻击效果.为了克服该矛盾,提出一种面向人体姿态估计的两阶段局部对抗攻击方法.所提方法首先通过预攻击估计出扰动关键区域,然后利用不可察性约束在关键区域内生成扰动.方法不仅可以对人体姿态进行有效攻击,而且还能确保最终扰动区域具有低可察性.采用COCO2017作为对抗扰动实验数据集并使用PCK(percentage of correct keypoints)作为评价指标,比较在人体姿态估计模型中IGSM和C&W方法的攻击效果,其PCK降低值分别提高了15.4%与2.8%.实验结果表明所提方法在保证攻击的低可察的同时,能够取得较好的攻击效果.