Current IssuePrevious Issue   Next Issue

Volume 21 No. 3
01 June 2016

Yu Wang,Dingbang Xu,Fan Li

2016, 21(3): 243-259.   doi:10.1109/TST.2016.7488736
Abstract ( 152 HTML ( 2   PDF(2356KB) ( 235 )   Save

Location privacy has been a serious concern for mobile users who use location-based services provided by third-party providers via mobile networks. Recently, there have been tremendous efforts on developing new anonymity or obfuscation techniques to protect location privacy of mobile users. Though effective in certain scenarios, these existing techniques usually assume that a user has a constant privacy requirement along spatial and/or temporal dimensions, which may be not true in real...

Jingjing Wang,Yiliang Han,Xiaoyuan Yang

2016, 21(3): 260-269.   doi:10.1109/TST.2016.7488737
Abstract ( 166 HTML ( 1   PDF(783KB) ( 216 )   Save

Traditional k-anonymity schemes cannot protect a user’s privacy perfectly in big data and mobile network environments. In fact, existing k-anonymity schemes only protect location in datasets with small granularity. But in larger granularity datasets, a user’s geographical region-location is always exposed in realizations of k-anonymity because of interaction with neighboring nodes. And if a user could not find enough adjacent access points, most existing schemes would be ...

Bin Mu,Spiridon Bakiras

2016, 21(3): 270-280.   doi:10.1109/TST.2016.7488738
Abstract ( 175 HTML ( 0   PDF(846KB) ( 170 )   Save

Proximity detection is an emerging technology in Geo-Social Networks that notifies mobile users when they are in proximity. Nevertheless, users may be unwilling to participate in such applications if they are required to disclose their exact locations to a centralized server and/or their social friends. To this end, private proximity detection protocols allow any two parties to test for proximity while maintaining their locations secret. In particular, a private proximity detection que...

Jinfu Chen,Saihua Cai,Lili Zhu,Yuchi Guo,Rubing Huang,Xiaolei Zhao,Yunqi Sheng

2016, 21(3): 281-294.   doi:10.1109/TST.2016.7488739
Abstract ( 153 HTML ( 0   PDF(1778KB) ( 179 )   Save

Mass monitor logs are produced during the process of component security testing. In order to mine the explicit and implicit security exception information of the tested component, the log should be searched for keyword strings. However, existing string-searching algorithms are not very efficient or appropriate for the operation of searching monitor logs during component security testing. For mining abnormal information effectively in monitor logs, an improved string-searching algorithm is pro...

Longfei Liu,Xiaoyuan Yang,Xiaoni Du,Bin Wei

2016, 21(3): 295-301.   doi:10.1109/TST.2016.7488740
Abstract ( 158 HTML ( 0   PDF(273KB) ( 219 )   Save

Periodic sequences over finite fields, constructed by classical cyclotomic classes and generalized cyclotomic classes, have good pseudorandom properties. The linear complexity of a period sequence plays a fundamental role in the randomness of sequences. Let p, q, and r be distinct odd primes with gcd(p–1, q–1)=gcd(p–1, r–1)=gcd(q–1, r–1)=2. In this paper, a new class of generalized cyclotomic sequence with respect to pqr ov...

Houzhen Wang,Huanguo Zhang,Shaowu Mao,Wanqing Wu,Liqiang Zhang

2016, 21(3): 302-311.   doi:10.1109/TST.2016.7488741
Abstract ( 143 HTML ( 2   PDF(507KB) ( 196 )   Save

During the last two decades, there has been intensive and fast development in Multivariate Public Key Cryptography (MPKC), which is considered to be an important candidate for post-quantum cryptography. However, it is universally regarded as a difficult task, as in the Knapsack cryptosystems, to design a secure MPKC scheme (especially an encryption scheme) employing the existing trapdoor construction. In this paper, we propose a new key-exchange scheme and an MPKC scheme based on the Morphism...

Donglai Fu,Xinguang Peng

2016, 21(3): 312-321.   doi:10.1109/TST.2016.7488742
Abstract ( 175 HTML ( 1   PDF(578KB) ( 180 )   Save

It is essential to design a protocol to allow sensor nodes to attest to their trustworthiness for mission-critical applications based on Wireless Sensor Networks (WSNs). However, it is a challenge to evaluate the trustworthiness without appropriate hardware support. Hence, we present a hardware-based remote attestation protocol to tackle the problem within WSNs. In our design, each sensor node is equipped with a Trusted Platform Module (TPM) which plays the role of a trusted anchor. We start ...

Xiaoming Ye,Xingshu Chen,Haizhou Wang,Xuemei Zeng,Guolin Shao,Xueyuan Yin,Chun Xu

2016, 21(3): 322-332.   doi:10.1109/TST.2016.7488743
Abstract ( 164 HTML ( 0   PDF(1494KB) ( 244 )   Save

This paper proposes an anomalous behavior detection model based on cloud computing. Virtual Machines (VMs) are one of the key components of cloud Infrastructure as a Service (IaaS). The security of such VMs is critical to IaaS security. Many studies have been done on cloud computing security issues, but research into VM security issues, especially regarding VM network traffic anomalous behavior detection, remains inadequate. More and more studies show that communication among internal nodes e...

Qi Yuan,Chunguang Ma,Xiaorui Zhong,Gang Du,Jiansheng Yao

2016, 21(3): 333-343.   doi:10.1109/TST.2016.7488744
Abstract ( 151 HTML ( 1   PDF(525KB) ( 153 )   Save

This work develops an equilibrium model for finding the optimal distribution strategy to maximize performance of key predistribution protocols in terms of cost, resilience, connectivity, and lifetime. As an essential attribute of wireless sensor networks, heterogeneity and its impacts on random key predistribution protocols are first discussed. Using supernetworks theory, the optimal node deployment model is proposed and illustrated. In order to find the equilibrium performance of our model, ...

Jinhui Liu,Aiwan Fan,Jianwei Jia,Huanguo Zhang,Houzhen Wang,Shaowu Mao

2016, 21(3): 344-351.   doi:10.1109/TST.2016.7488745
Abstract ( 154 HTML ( 0   PDF(440KB) ( 221 )   Save

Advances in quantum computers threaten to break public-key cryptosystems (e.g., RSA, ECC, and EIGamal), based on the hardness of factoring or taking a discrete logarithm. However, no quantum algorithms have yet been found for solving certain mathematical problems in non-commutative algebraic structures. Recently, two novel public-key encryption schemes, BKT-B cryptosystem and BKT-FO cryptosystem, based on factorization problems have been proposed at Security and Communication Networks ...

Rui Ma,Daguang Wang,Changzhen Hu,Wendong Ji,Jingfeng Xue

2016, 21(3): 352-360.   doi:10.1109/TST.2016.7488746
Abstract ( 170 HTML ( 0   PDF(623KB) ( 351 )   Save

To improve the efficiency and coverage of stateful network protocol fuzzing, this paper proposes a new method, using a rule-based state machine and a stateful rule tree to guide the generation of fuzz testing data. The method first builds a rule-based state machine model as a formal description of the states of a network protocol. This removes safety paths, to cut down the scale of the state space. Then it uses a stateful rule tree to describe the relationship between states and messages, and...