Software Engineering And Information Technology - Proceedings Of The 2015 International Conference (Seit2015)
eBook - ePub

Software Engineering And Information Technology - Proceedings Of The 2015 International Conference (Seit2015)

Proceedings of the 2015 International Conference on Software Engineering and Information Technology (SEIT2015)

  1. 368 pages
  2. English
  3. ePUB (mobile friendly)
  4. Available on iOS & Android
eBook - ePub

Software Engineering And Information Technology - Proceedings Of The 2015 International Conference (Seit2015)

Proceedings of the 2015 International Conference on Software Engineering and Information Technology (SEIT2015)

Book details
Book preview
Table of contents
Citations

About This Book

This book consists of sixty-seven selected papers presented at the 2015 International Conference on Software Engineering and Information Technology (SEIT2015), which was held in Guilin, Guangxi, China during June 26–28, 2015. The SEIT2015 has been an important event and has attracted many scientists, engineers and researchers from academia, government laboratories and industry internationally. The papers in this book were selected after rigorous review.

SEIT2015 focuses on six main areas, namely, Information Technology, Computer Intelligence and Computer Applications, Algorithm and Simulation, Signal and Image Processing, Electrical Engineering and Software Engineering. SEIT2015 aims to provide a platform for the global researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

This conference has been a valuable opportunity for researchers to share their knowledge and results in theory, methodology and applications of Software Engineering and Information Technology.

This book consists of sixty-seven selected papers presented at the 2015 International Conference on Software Engineering and Information Technology (SEIT2015), which was held in Guilin, Guangxi, China during June 26–28, 2015. The SEIT2015 has been an important event and has attracted many scientists, engineers and researchers from academia, government laboratories and industry internationally. The papers in this book were selected after rigorous review.

SEIT2015 focuses on six main areas, namely, Information Technology, Computer Intelligence and Computer Applications, Algorithm and Simulation, Signal and Image Processing, Electrical Engineering and Software Engineering. SEIT2015 aims to provide a platform for the global researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field.

This conference has been a valuable opportunity for researchers to share their knowledge and results in theory, methodology and applications of Software Engineering and Information Technology.

Readership: Researchers and graduate students interested in software engineering and information technology.
Key Features:

  • The proceedings collected together R&D results undertaken by researchers in six areas, namely, Information Technology, Computer Intelligence and Computer Applications, Algorithm and Simulation, Signal and Image Processing, Electrical Engineering and Software Engineering

Frequently asked questions

Simply head over to the account section in settings and click on ā€œCancel Subscriptionā€ - itā€™s as simple as that. After you cancel, your membership will stay active for the remainder of the time youā€™ve paid for. Learn more here.
At the moment all of our mobile-responsive ePub books are available to download via the app. Most of our PDFs are also available to download and we're working on making the final remaining ones downloadable now. Learn more here.
Both plans give you full access to the library and all of Perlegoā€™s features. The only differences are the price and subscription period: With the annual plan youā€™ll save around 30% compared to 12 months on the monthly plan.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, weā€™ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes, you can access Software Engineering And Information Technology - Proceedings Of The 2015 International Conference (Seit2015) by Xiaolong Li in PDF and/or ePUB format, as well as other popular books in Biological Sciences & Science General. We have over one million books available in our catalogue for you to explore.

Information

Publisher
WSPC
Year
2015
ISBN
9789814740111

Chapter 1

Information Technology

An Access Control Protocol for Wireless Sensor Networks

X. Zheng*
College of Information Science and Technology, Gannan Medical University, Ganzhou Jiangxi
L.Z. Chen
College of Information Science and Technology, Gannan Medical University, Ganzhou Jiangxi
Z.B. Xie
College of Information Science and Technology, Gannan Medical University, Ganzhou Jiangxi
*Email: [email protected]
ABSTRACT: Nodes in a sensor networks may be lost because of power exhaustion or malicious attacks. Therefore itā€™s necessary for new nodesā€™ deployment. Using Bloom Filter, we propose an access control protocol including the mutual authentication procedure and common key generation. Itā€™s efficient for the nodesā€™ addition, deletion and authentication. At last, the paper makes an analysis of the performance and safety about the proposed protocol.
KEYWORDS: Sensor network; Mutual authentication; Access control; Bloom Filter.
1.INTRODUCTION
Currently, wireless sensor networks are threatened by internal malicious nodes which inject illegal information, manipulate data, replicate nodes and forge nodes. Therefore, puts forward a kind of security, high efficiency, low energy consumption of the authentication protocol is a hot research in wireless sensor networks. Due to the nodesā€™ characteristics of limited storage capacity, computing power and limited battery power, itā€™s needed to consider the situation of the old nodesā€™ energy depletion and the new nodes addition in the safe authentication, etc.
In 2007, Yun Zhou et al. proposed an access control protocol based on ECC public key algorithm. During the authentication, by comparing the new nodesā€™ boot time of joining the network, and then verify the signature to realize a new nodeā€™ authentication, and can complete the establishment of shared keys between neighboring nodes at the same time. However, malicious nodes can use the short interval of new node starts time to implement a malicious attack. On the other hand, public key digital signature algorithm consumes a lot of energy. In this paper, using ideas from the article [3] by Bloom Filter and Counting Bloom Filter, Use symmetric encryption algorithm to achieve mutual authentication, and use Diffie-Hellman algorithm to establish a shared key between nodes. Without using the start time of the new node, this agreement also can complete the mutual authentication. During the authentication process, nodes only need to store the filter data generated by the base and use the Bloom Filter to verify each other's public key, without transmission of digital certificates and thus improves the authentication efficiency, reduces the communication cost.
2.PROPAEDEUTICS
2.1.Concepts of bloom filter
Bloom filter [4] is a kind of random data structure of high spatial efficiency, it can be used to judge whether an element is belong to a collection. When the initial state, Bloom Filter is an array containing M digits, and each set to 0. Suppose there is a such set S = {s1, s2, Ā·Ā·Ā·, sn}, and
figure
is k mutually independent hash function, in which hi : S ā†¦ {0, Ā·Ā·Ā·, m āˆ’ 1}. In order to decide whether ā€œsā€ is an elements of set ā€œSā€ for each calculation, and calculate hi using hi(sj). If all the position of hi(sj) is 1 (1ā‰¤iā‰¤k), then sj āˆˆ S, otherwise sj āˆ‰ S sj āˆ‰ S. But sometimes it will mistakenly consider the elements belonging to this which accurately do not (false positive). The error rate can be estimated, now we assume that the kn < m and each hash function is completely random. When all the elements which are in this collection S = {s1, s2, Ā·Ā·Ā·, sn} are mapping to the m digits array by k hash functions, the probability that one digit of this array is a zero is
figure
, so the error rate
figure
.
2.2.To minimize the error rate [4,5]
Since the Bloom Filter need multiple hash function which can map set to the array, so how many hash function should choose to reduce the error rate when it query elements? There are two mutually exclusive reason: If the number of hash function is a lot, the ratio of getting the result of 0 is grate for an element do not belong to the set; But on the other hand, if the number of hash function is a few, then there will be more 0 in the array. Note that, if
figure
, then f = ek ln(1āˆ’eāˆ’kn/m). We define g = k ln(1 āˆ’ eāˆ’kn/m), as long as the g get the minimum, f will get the minimum. Due to
figure
, when
figure
, g will get the minimum, in the same times of
figure
. At this time,
figure
.
3.THE ACCESS CONTROL PROTOCOL
The access control protocol contains three phases: system initialization, mutual authentication and key negotiation process and the addition and revocation of node. Based on the elliptic curve digital signature have the advantages of key short, fast processing speed, and low bandwidth requirements, in the key negotiation process we choose Diffie-Hellman algorithm.
Set F q is a finite field, q is a prime number. The base to choose the appropriate elliptic curve constructed the point set E(F q), G is the element with n steps of E(Fq), FR is one of the elements of F q. Select safe hash function h(Ā·), and get the system parameters D = (q, E(Fq), FR, G, n, h).
3.1.System initialization
Proposed there are r nodes in a fixed region adjacent, denoted as {N1, N2, ā€¦, Nr}. Set a (pki, ski) s the public key and private key for node Ni. Install a Bloom Filter and a Counting Bloom Filter in the base station, which assign different key pair (pki, ski) for each node Ni [i āˆˆ r] and use a one-way hash function to calculate ski z times (z is the maximum number of nodes of the fixed network), generates a hash chain of length z + 1: h0(ski), h(ski), h2(ski), Ā·Ā·Ā·, hi (ski), Ā·Ā·Ā· hz(ski), exist hm(ski) = h(hmāˆ’1(ski)). Then construct the set: ...

Table of contents

  1. Cover Page
  2. Title
  3. Copyright
  4. Contents
  5. Editorial
  6. Chapter 1 Information Technology
  7. Chapter 2 Computing Intelligence and Computer Applications
  8. Chapter 3 Algorithm and Simulation
  9. Chapter 4 Signal and Image Processing
  10. Chapter 5 Electrical Engineering
  11. Chapter 6 Software Engineering
  12. Author Index