IJWMT Vol. 1, No. 5, Oct. 2011
Cover page and Table of Contents: PDF (size: 117KB)
REGULAR PAPERS
The frameproof codes are used in copyright protecting. Motivated by the method of constructing frameproof codes coined by D.Tonien etal, in this paper, we introduced a new combinatorial designs which in fact generalized the difference function family introduced by D.Tonien. The new designs can be constructed from difference matrix efficiently. By using the new designs we construct more larger number of frameproof codes
[...] Read more.Robust image hashing methods require the robustness to content preserving processing and geometric transform. Zernike moment is a local image feature descriptor whose magnitude components are rotationally invariant and most suitable for image hashing application. In this paper, we proposed Geometric invariant robust image hashing via zernike momment. Normalized zernike moments of an image are used as the intermediate hash. Rotation invariance is achieved by taking the magnitude of the zernike moments. Image normalization method is used for scale and translation invariance. A randomization diffusion processing enhance hashing security. The test results show that our method is robust with respect to the geometrical distortions and content preserving processing.
[...] Read more.Three-party authenticated key exchange protocol is an important cryptographic technique in the secure communication areas, by which any two clients can verify the ability to use a server to establish communication. Recently, researchers have begun proposing new key exchange protocols that would not require the use of server public keys, but a human-memorable password. In this paper, we propose a new three-party password authenticated key exchange protocol with key confirmation. The security of our proposed protocol relies on the hardness of the bilinear Diffie-Hellman problem and Diffie-Hellman problem in the random oracle model, and the proposed protocol achieves the security attributes: dictionary attack resilience, known session key security, perfect forward secrecy, no key compromise impersonation, no unknown key share and no key control.
[...] Read more.An improved dynamic probabilistic packet marking algorithm named IDPPM is presented, which not only can reduce the marking overhead of routers near the attackers, but also can locate attack source rapidly and accurately. The challenge of weakest node and weakest link is solved with the price of a little more numbers of packets to reconstruct the attack path. Theoretical analysis and NS2 simulation demonstrate the effectiveness of the algorithm.
[...] Read more.In order to reduce feedback while maintaining user performance in multiuser orthogonal frequency division multiplexing (OFDM) relay system, feedback mechanism based on user traffic rate is proposed. From the aspects of feedback outage probability, user weighted channel gain related to user traffic rate is compared with the system threshold. The higher user traffic rate is, the bigger the user traffic weight becomes. So the high traffic rate user has greater probability to be fed back, which can support different traffic rate. Simulation results show that the proposed feedback mechanism can bring more feedback sub-carriers to the user with high traffic rate.
[...] Read more.In order to guarantee the QoS requirement of secondary users and not to affect the outage probability of primary user in cognitive relay networks, we propose two optimal power allocation models: (1) maximizing the transmission rate of secondary users; (2) minimizing the total power consumption. Theory analysis shows that two optimal power allocation models conflict between spectrum efficiency and power consumption. Furthermore, an optimal power allocation model which joints the transmission rate and the total power consumption in cognitive relay networks is proposed. By using the Lagrangian method, the optimization algorithm for this model is designed. The proposed algorithm can achieve the trade-off between the transmission rate and the total power consumption by varying the weight. Simulation results show that the proposed algorithm can effectively adjust the transmission rate and the total power consumption of secondary users.
[...] Read more.Merging MPLS into multicast routing protocol in Mobile Ad hoc network is an elegant method to enhance the network performance and an efficient solution for multicast scalability and control overhead problems. Based on the Wireless MPLS technology, the mechanism and evaluation of a new multicast protocol, the Label Switching Multicast Routing Protocol (LSMRP) is presented in this paper.
[...] Read more.The research of homoclinic orbits for Hamiltonian system is a classical problem, it has valuable applications in celestial mechanics, plasma physis, and biological engineering. For example, homoclinic orbits rupture can yield chaos lead to more complex dynamics behaviour. This paper studies the existence of homoclinic solutions for a class of second order Hamiltonian system, we will prove this system exists at least one nontrivial homoclinic solution.
[...] Read more.Industrial control ethernet networks are more impotant in connecting with equipments each other of enterprise comprehensive automation and integrating information. With the explosive growth of network techniques, the traditional control networks can no longer satisfy the security demands on network connectivity, data storage and information exchanges.New types of networks emerged in recent years in order to provide solutions for the increasing requirements on networked services. We propose a trust evaluation model for industrial control ethernet network . Our study shows the importance and necessity of applying theoretical analyses to understand the complex characteristics of trusted industrial control ethernet networks.
[...] Read more.
We propose a cross-layer design combining adaptive modulation and coding (AMC) at the physical layer with a hybrid automatic repeat request (HARQ) protocol at the data link layer in multi-relay networks with imperfect channel state information (CSI). Based on a simple and distributed relay selection strategy, we derive the closed-form expressions for performance metrics such as average packet loss rate (PER) and spectral efficiency; and further formulate an optimization model to maximize the spectral efficiency under the target PER constraint. The numerical results show that the average PER is lower and the spectral efficiency is higher with the number of the relay increasing.
[...] Read more.