期刊文献+
共找到1,119篇文章
< 1 2 56 >
每页显示 20 50 100
A Cross Language Code Security Audit Framework Based on Normalized Representation
1
作者 Yong Chen Chao Xu +1 位作者 Jing Selena He Sheng Xiao 《Journal of Quantum Computing》 2022年第2期75-84,共10页
With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an impor... With the rapid development of information technology,audit objects and audit itself are more and more inseparable from software.As an important means of software security audit,code security audit will become an important aspect of future audit that cannot be ignored.However,the existing code security audit ismainly based on source code,which is difficult to meet the audit needs of more and more programming languages and binary commercial software.Based on the idea of normalized transformation,this paper constructs a cross language code security audit framework(CLCSA).CLCSA first uses compile/decompile technology to convert different highlevel programming languages and binary codes into normalized representation,and then usesmachine learning technology to build a cross language code security audit model based on normalized representation to evaluate code security and find out possible code security vulnerabilities.Finally,for the discovered vulnerabilities,the heuristic search strategy will be used to find the best repair scheme from the existing normalized representation sample library for automatic repair,which can improve the effectiveness of code security audit.CLCSA realizes the normalized code security audit of different types and levels of code,which provides a strong support for improving the breadth and depth of code security audit. 展开更多
关键词 code security audit NORMaLIZaTION cross language security vulnerabilities
下载PDF
Enhancing Security in QR Code Technology Using AI: Exploration and Mitigation Strategies
2
作者 Saranya Vaithilingam Santhosh Aradhya Mohan Shankar 《International Journal of Intelligence Science》 2024年第2期49-57,共9页
The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potentia... The widespread adoption of QR codes has revolutionized various industries, streamlined transactions and improved inventory management. However, this increased reliance on QR code technology also exposes it to potential security risks that malicious actors can exploit. QR code Phishing, or “Quishing”, is a type of phishing attack that leverages QR codes to deceive individuals into visiting malicious websites or downloading harmful software. These attacks can be particularly effective due to the growing popularity and trust in QR codes. This paper examines the importance of enhancing the security of QR codes through the utilization of artificial intelligence (AI). The abstract investigates the integration of AI methods for identifying and mitigating security threats associated with QR code usage. By assessing the current state of QR code security and evaluating the effectiveness of AI-driven solutions, this research aims to propose comprehensive strategies for strengthening QR code technology’s resilience. The study contributes to discussions on secure data encoding and retrieval, providing valuable insights into the evolving synergy between QR codes and AI for the advancement of secure digital communication. 展开更多
关键词 artificial Intelligence Cyber security QR codes Quishing aI Framework Machine Learning aI-Enhanced security
下载PDF
LibPass:基于包结构和签名的第三方库检测方法
3
作者 徐建 袁倩婷 《软件学报》 EI CSCD 北大核心 2024年第6期2880-2902,共23页
第三方库检测是Android应用安全分析领域的上游任务,其检测精度对于恶意应用检测、重打包检测、隐私泄露等下游任务有显著影响.为了提升检测精度和效率,采用相似性比较的思想,提出一种基于包结构和签名的第三方库检测方法,命名为LibPass... 第三方库检测是Android应用安全分析领域的上游任务,其检测精度对于恶意应用检测、重打包检测、隐私泄露等下游任务有显著影响.为了提升检测精度和效率,采用相似性比较的思想,提出一种基于包结构和签名的第三方库检测方法,命名为LibPass.LibPass以流水线式模式组合主模块识别、第三方库候选识别和细粒度检测等3个组件.主模块识别方法区分主程序二进制代码与引入的第三方库二进制代码,旨在提升方法检测效率.在此基础上,提出由第三方库候选识别和细粒度检测构成的两阶段检测方法.前者利用包结构特征的稳定性来应对应用程序的混淆行为以提升混淆情形下的检测精度,并利用包结构签名完成快速比对以识别候选第三方库,达到显著降低成对比较次数、提升检测效率的目的;后者在前者涮选出的候选中,通过更细粒度但代价更高的相似性分析精确地识别第三方库及其对应的版本.为了验证方法的性能和效率,构建3个评估不同检测能力的基准数据集,在这些基准数据集上开展实验验证,从检测性能、检测效率和抗混淆性等方面对实验结果进行深入分析,结果表明LibPass具备较高的检测精度,检测效率,以及应对多种常用混淆操作的能力. 展开更多
关键词 第三方库 代码混淆 安全分析 签名
下载PDF
基于混沌系统和喷泉码的DNA加密编码方法 被引量:1
4
作者 袁涛 曲强 姜青山 《集成技术》 2024年第3期4-24,共21页
在这个海量数据时代,DNA是一种很好的新信息存储媒介。与传统的物理存储介质相比,它具有能耗低、存储密度高、存储寿命长等固有的优点。随着DNA存储技术的快速发展,如何保障新技术下的信息安全至关重要。为此,该文结合加密领域研究和DN... 在这个海量数据时代,DNA是一种很好的新信息存储媒介。与传统的物理存储介质相比,它具有能耗低、存储密度高、存储寿命长等固有的优点。随着DNA存储技术的快速发展,如何保障新技术下的信息安全至关重要。为此,该文结合加密领域研究和DNA编码领域研究,提出了一种基于混沌系统和喷泉码的DNA加密编码方法,利用混沌系统加密原理,在DNA喷泉码编码过程中进行加密,在保留DNA喷泉码特性的同时,保障了编码信息的安全性。该方法可用于任意类型数据,可实现高信息密度和任意约束条件的DNA编码。同时,通过仿真实验证明,该方法可以有效抵抗多种密码学攻击,并对DNA存储过程产生的数据错误有一定纠错能力。 展开更多
关键词 DNa存储 加密 喷泉码 信息安全
下载PDF
Proof of Activity Protocol for IoMT Data Security
5
作者 R.Rajadevi K.Venkatachalam +2 位作者 Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection security secure data management framework data management POa
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
6
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
Artificial Noise Aided Polar Codes for Physical LayerSecurity 被引量:1
7
作者 Huiqing Bai Liang Jin Ming Yi 《China Communications》 SCIE CSCD 2017年第12期15-24,共10页
The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve ... The secrecy rates of the existing practical secrecy coding methods are relative low to satisfy the security requirement of 5 G communications.We propose an artificial noise(AN) aided polar coding algorithm to improve the secrecy rate.Firstly,a secrecy coding model based on AN is presented,where the confidential bits of last transmission code block are adopted as AN to inject into the current codeword.In this way,the AN can only be eliminated from the jammed codeword by the legitimate users.Since the AN is shorter than the codeword,we then develop a suboptimal jamming positions selecting algorithm with the goal of maximizing the bit error rate of the eavesdropper.Theoretical and simulation results demonstrate that the proposed algorithm outperforms the random selection method and the method without AN. 展开更多
关键词 PHYSICaL LaYER security polarcodes artificial noise jamming POSITIONS se-lection
下载PDF
Code mechanical solidification and verification in MEMS security devices
8
作者 张卫平 陈文元 +2 位作者 赵小林 李胜勇 姜勇 《Journal of Shanghai University(English Edition)》 CAS 2006年第4期334-338,共5页
The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high c... The virtual machine of code mechanism (VMCM) as a new concept for code mechanical solidification and verification is proposed and can be applied in MEMS (micro-electromechanical systems) security device for high consequence systems. Based on a study of the running condition of physical code mechanism, VMCM's configuration, ternary encoding method, running action and logic are derived. The cases of multi-level code mechanism are designed and verified with the VMCM method, showing that the presented method is effective. 展开更多
关键词 MEMS (micro-electromechanical systems) security device code mechanical solidification and verification virtual machine of code mechanism (VMCM) ternary system.
下载PDF
基于FPGA软件安全性的HDL编码规范分析与研究
9
作者 曹明 姜宗维 李敬磊 《现代信息科技》 2024年第5期85-88,共4页
随着FPGA的广泛应用,FPGA的运行代码的安全性也越来越重要。文章从HDL编码的角度,研究了影响FPGA软件功能安全性的几个重要因素,分析了信号跨时钟域处理、状态机设计、信号毛刺等因素在编码阶段对软件安全性的影响,并提出了对应的防范措... 随着FPGA的广泛应用,FPGA的运行代码的安全性也越来越重要。文章从HDL编码的角度,研究了影响FPGA软件功能安全性的几个重要因素,分析了信号跨时钟域处理、状态机设计、信号毛刺等因素在编码阶段对软件安全性的影响,并提出了对应的防范措施;形成了基于FPGA软件功能安全性的HDL编码和设计规范,为规避在编码阶段引入软件功能安全性问题提供了一定的依据和参考。 展开更多
关键词 FPGa HDL 安全性 编码规范
下载PDF
一种使用ChatGPT的源代码安全漏洞检测方法
10
作者 余里辉 胡少文 +1 位作者 黄浪鑫 罗澍寰 《计算机与现代化》 2024年第4期88-91,120,共5页
随着软件及信息系统的安全问题越来越突出,作为重要组成部分,源代码的安全是最底层的关键点,如何快速准确地对源代码进行安全漏洞检测显得尤为重要。本文提出一种基于ChatGPT的源代码安全漏洞检测方法,利用ChatGPT在自然语言处理领域的... 随着软件及信息系统的安全问题越来越突出,作为重要组成部分,源代码的安全是最底层的关键点,如何快速准确地对源代码进行安全漏洞检测显得尤为重要。本文提出一种基于ChatGPT的源代码安全漏洞检测方法,利用ChatGPT在自然语言处理领域的优势,将源代码转换为自然语言形式,然后利用ChatGPT对其进行处理,识别潜在的安全漏洞。该方法可以检测出多种类型的安全漏洞,如不安全的设计、SQL注入等。通过在公开数据集的源代码上进行安全漏洞检测的实验分析,验证了该方法的优越性和准确性。 展开更多
关键词 源代码安全 ChatGPT 漏洞检测 SQL注入
下载PDF
网络环境下基于Erasure Codes的高可靠性存储体系设计 被引量:1
11
作者 贾军博 谷建华 +1 位作者 朱靖飞 张集文 《计算机应用研究》 CSCD 北大核心 2009年第5期1835-1838,共4页
设计了一种基于Erasure Codes的网络环境下的分布式文件存储系统。初步的实验结果证明这种存储体系可以较好地解决人们当前所面临的文件存储的可靠性、安全性等问题。
关键词 分布式存储 数据可靠性 数据安全性 纠错码 加罗华域
下载PDF
Physical Layer Security with Its Applications in 5GNetworks: A Review 被引量:7
12
作者 Li Sun Qinghe Du 《China Communications》 SCIE CSCD 2017年第12期1-14,共14页
5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques whic... 5G network is expected to support massive user connections and exponentially increasing wireless services,which makes network security unprecedentedly important.Unlike traditional security-guaranteeing techniques which rely heavily on cryptographic approaches at upper layers of the protocol stack,physical-layer security(PLS) solutions fully take advantages of the characteristics of wireless channels to degrade the received signal qualities at the malicious users,and realize keyless secure transmission via signal design and signal processing techniques.PLS avoids the difficulties in the distribution and management of secret keys,and provides flexible security levels through adaptive transmission protocol design.Moreover,PLS techniques match the features of 5G networks well.Therefore,the application of PLS to 5G networks is a promising solution to address the security threats.This article presents a comprehensive review of the state-of-the-art PLS techniques,and discusses their applications in 5G networks.We first summarize the principle and advantages of PLS techniques,and point out the reasons why PLS is suitable for 5G networks.Then,we review the existing PLS methods in literature,and highlight severalPLS solutions that are expected to be applied in 5G networks.Finally,we conclude this article and figure out some further research directions. 展开更多
关键词 5G PHYSICaL layer security an-ti-eavesdropping signal design STaTISTICaL se-curity GUaRaNTEE FOUNTaIN CODING
下载PDF
Reversible Video Steganography Using Quick Response Codes and Modified ElGamal Cryptosystem 被引量:1
13
作者 Ramadhan J.Mstafa 《Computers, Materials & Continua》 SCIE EI 2022年第8期3349-3368,共20页
The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breache... The rapid transmission of multimedia information has been achieved mainly by recent advancements in the Internet’s speed and information technology.In spite of this,advancements in technology have resulted in breaches of privacy and data security.When it comes to protecting private information in today’s Internet era,digital steganography is vital.Many academics are interested in digital video because it has a great capability for concealing important data.There have been a vast number of video steganography solutions developed lately to guard against the theft of confidential data.The visual imperceptibility,robustness,and embedding capacity of these approaches are all challenges that must be addressed.In this paper,a novel solution to reversible video steganography based on Discrete Wavelet Transform(DWT)and Quick Response(QR)codes is proposed to address these concerns.In order to increase the security level of the suggested method,an enhanced ElGamal cryptosystem has also been proposed.Prior to the embedding stage,the suggested method uses the modified ElGamal algorithm to encrypt secret QR codes.Concurrently,it applies two-dimensional DWT on the Y-component of each video frame resulting in Approximation(LL),Horizontal(LH),Vertical(HL),and Diagonal(HH)sub-bands.Then,the encrypted Low(L),Medium(M),Quantile(Q),and High(H)QR codes are embedded into the HL sub-band,HHsub-band,U-component,and V-component of video frames,respectively,using the Least Significant Bit(LSB)technique.As a consequence of extensive testing of the approach,it was shown to be very secure and highly invisible,as well as highly resistant to attacks from Salt&Pepper,Gaussian,Poisson,and Speckle noises,which has an average Structural Similarity Index(SSIM)of more than 0.91.Aside from visual imperceptibility,the suggested method exceeds current methods in terms of Peak Signal-to-Noise Ratio(PSNR)average of 52.143 dB,and embedding capacity 1 bpp. 展开更多
关键词 Reversible video steganography QR code security ElGamal cryptosystem DWT
下载PDF
Secure Transmission in Downlink Non-Orthogonal Multiple Access Based on Polar Codes 被引量:1
14
作者 Ce Sun Zesong Fei +3 位作者 Bin Li Xinyi Wang Nan Li Lijie Hu 《China Communications》 SCIE CSCD 2021年第9期221-235,共15页
Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(... Non-orthogonal multiple access(NOMA)is deemed to have a superior spectral efficiency and polar codes have became the channel coding scheme for control channel of enhanced mobile broadband(eMBB)in the fifth generation(5G)communication systems.In this paper,NOMA combined with polar codes is used to achieve secure transmission.Both degraded wiretap channel and non-degraded wiretap channel are considered,where an eavesdropper intercepts the communication between base station(BS)and users.For the degraded wiretap channel scenario,a secure polar encoding scheme is proposed in NOMA systems with power allocation to achieve the maximum secrecy capacity.With regard to the nondegraded wiretap channel,a polar encoding scheme with multiple-input-single-output(MISO)system is proposed,where artificial noise is generated at BS to confuse the eavesdropper’s channel via transmit beamforming.The security and the secure rate are employed respectively in order to measure the secrecy performance.We prove that the proposed schemes for each scenario can achieve the secure rate and can transmit the signal securely and reliably.The simulation results show that the eavesdropper hardly decoding the secure signal when the legitimate receiver can decode the signal with very low block error rate(BLER). 展开更多
关键词 physical layer security polar codes non-orthogonal multiple access artificial noise
下载PDF
基于Adam梯度数学模型的计算机网络安全检测研究
15
作者 王焕庭 《太原师范学院学报(自然科学版)》 2023年第3期39-44,共6页
为解决因攻击性信息频繁入侵而造成的计算机网络非安全运行的问题,给互联网数据提供更加安全的传输环境,设计了一种基于Adam梯度数学模型的计算机网络安全检测技术.根据Adam算法相关参数设置情况,对梯度目标进行融合处理,从而确定应用... 为解决因攻击性信息频繁入侵而造成的计算机网络非安全运行的问题,给互联网数据提供更加安全的传输环境,设计了一种基于Adam梯度数学模型的计算机网络安全检测技术.根据Adam算法相关参数设置情况,对梯度目标进行融合处理,从而确定应用行为序列表达式,实现对计算机网络安全事件等级的评估.在此基础上,建立集中式B/S架构体系,通过获取One-Hot编码的方式,得到数据归一化处理结果,完成基于Adam梯度数学模型的计算机网络安全检测方法的设计.对比实验结果表明,Adam梯度数学模型的应用,可以有效控制攻击性信息的入侵能力,从而解决计算机网络非安全运行的问题,符合保障网络数据传输环境安全性的实际应用需求. 展开更多
关键词 adam梯度数学模型 计算机网络安全 梯度目标 应用行为序列 集中式架构 One-Hot编码 攻击性信息
下载PDF
Mechanism and Defense on Malicious Code
16
作者 WEN Wei-ping 1,2,3, QING Si-han 1,2,31. Institute of Software, the Chinese Academy of Sciences, Beijing 100080, China 2.Engineering Research Center for Information Security Technology, the Chinese Academy of Sciences, Beijing 100080, China 3.Graduate School of the Chinese Academy of Sciences, Beijing 100080, China 《Wuhan University Journal of Natural Sciences》 EI CAS 2005年第1期83-88,共6页
With the explosive growth of network applications, the threat of the malicious code against network security becomes increasingly serious. In this paper we explore the mechanism of the malicious code by giving an atta... With the explosive growth of network applications, the threat of the malicious code against network security becomes increasingly serious. In this paper we explore the mechanism of the malicious code by giving an attack model of the malicious code, and discuss the critical techniques of implementation and prevention against the malicious code. The remaining problems and emerging trends in this area are also addressed in the paper. 展开更多
关键词 malicious code attacking model MECHaNISM DEFENSE system security network security
下载PDF
Authentication masking code against DoS of T-MAC protocol 被引量:2
17
作者 SON Young-ho HONG Jin-keun BAE Keun-sung 《Journal of Central South University》 SCIE EI CAS 2013年第7期1889-1895,共7页
Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient... Security vulnerability of denial of service (DoS) in time out-medium access control (T-MAC) protocol was discussed and analysis of power consumption at each stage of T-MAC protocol was carried out. For power efficient authentication scheme which can provide reliability, efficiency, and security for a general T-MAC communication, a novel synchronization and authentication scheme using authentication masking code was proposed. Authentication data were repeated and masked by PN sequence. The simulation results show that the proposed approach can provide synchronization and authentication simultaneously for nodes in wireless sensor network (WSN). 63 bits AMC code gives above 99.97% synchronization detection and 93.98% authentication data detection probability in BER 0.031 7. 展开更多
关键词 MaC协议 身份验证 C代码 DOS 掩蔽 无线传感器网络 节能认证 介质访问控制
下载PDF
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programming
18
作者 Hao He Weidong Yi +1 位作者 Ming Li Yongrui Chen 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期109-118,共10页
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of... The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates. 展开更多
关键词 wireless sensor network(WSN) over-the-air PROGRaMMING rateless codeS homomorphic HaSHING security
下载PDF
Development of Hybrid ARQ Protocol for the Quantum Communication System on Stabilizer Codes
19
作者 Jiaxin Li Zhongwen Guo Hongyang Ma 《China Communications》 SCIE CSCD 2021年第2期40-48,共9页
In this paper,we develop a novel hybrid automatic-repeat-request(ARQ)protocol for the quantum communication system using quantum stabilizer codes.The quantum information is encoded by stabilizer codes to against the c... In this paper,we develop a novel hybrid automatic-repeat-request(ARQ)protocol for the quantum communication system using quantum stabilizer codes.The quantum information is encoded by stabilizer codes to against the channel noise.The twophoton entangled state is prepared for codeword secure transmission.Hybrid ARQ protocol rules the recognition and retransmission of error codewords.In this protocol,the property of quantum entangled state ensures the security of information,the theory of hybrid ARQ system improves the reliability of transmission,the theory of quantum stabilizer codes corrects the flipping errors of codewords.Finally,we verify the security and throughput efficiency of this protocol. 展开更多
关键词 quantum communication system hybrid aRQ quantum stabilizer codes reliability security
下载PDF
Five Basic Types of Insider DoS Attacks of Code Dissemination in Wireless Sensor Networks
20
作者 Yu ZHANG Xing She ZHOU +2 位作者 Yi Ming JI Yee Wei LAW Marimuthu PALANISWAMI 《International Journal of Communications, Network and System Sciences》 2009年第1期64-72,共9页
Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemina... Code dissemination is one of the important services of wireless sensor networks (WSNs). Securing the process of code dissemination is essential in some certain WSNs applications, state-of-the-art secure code dissemination protocols for WSNs aim for the efficient source authentication and integrity verification of code image, however, due to the resource constrains of WSNs and the epidemic behavior of the code dissemination system, existing secure code dissemination protocols are vulnerable to Denial of Service (DoS) attacks when sensor nodes can be compromised (insider DoS attacks). In this paper, we identify five different basic types of DoS attacks exploiting the epidemic propagation strategies used by Deluge. They are (1) Higher-version Advertisement attack, (2) False Request attack, (3) Larger-numbered Page attack, (4) Lower-version Adv attack, and (5) Same-version Adv attack. Simulation shows these susceptibilities caused by above insider DoS attacks. Some simple models are also proposed which promote understanding the problem of insider DoS attacks and attempt to quantify the severity of these attacks in the course of code dissemination in WSNs. 展开更多
关键词 Sensor Networks code DISSEMINaTION Deluge security DOS aTTaCKS
下载PDF
上一页 1 2 56 下一页 到第
使用帮助 返回顶部