Table Of ContentNetwork Security aNd commuNicatioN eNgiNeeriNg
9781138028210_Chp_FM.indd 1 03/06/15 10:14 PM
Proceedings of the 2014 international conference on network security and
communication engineering (nsce 2014), 25–26 decemBer 2014, hong kong
Network Security and
communication engineering
Editor
kennis chan
Advanced Science and Industry Research Center
9781138028210_Chp_FM.indd 3 03/06/15 10:14 PM
CRC Press/Balkema is an imprint of the Taylor & Francis Group, an informa business
© 2015 taylor & Francis group, London, uk
typeset by diacritech, chennai, india
Printed and bound in great Britain by antony rowe (a cPi-group company), chippenham, wiltshire
all rights reserved. No part of this publication or the information contained herein may be reproduced, stored
in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, by photocopying,
recording or otherwise, without written prior permission from the publisher.
although all care is taken to ensure integrity and the quality of this publication and the information herein,
no responsibility is assumed by the publishers nor the author for any damage to the property or persons as a
result of operation or use of this publication and/or the information contained herein.
Published by: crc Press/Balkema
P.o. Box 11320, 2301 eH Leiden, the Netherlands
e-mail: Pub.NL@taylorandfrancis.com
www.crcpress.com – www.taylorandfrancis.com
iSBN: 978-1-138-02821-0 (Hardback)
iSBN: 978-1-315-68355-3 (eBook)
9781138028210_Chp_FM.indd 4 03/06/15 10:14 PM
Network Security and Communication Engineering – Chan (Ed.)
© 2015 Taylor & Francis Group, London, ISBN: 978-1-138-02821-0
table of contents
Preface xiii
organizing committee xv
Network and system security
a privacy amplification protocol against active attacks in information theoretically
secret key agreement 3
Q.H. Wang, X.J. Wang, Q.Y. Lv & X.Y. Ye
Zero knowledge proof protocol from multivariate Public key cryptosystems 7
S.P. Wang, B. Yue & Y.L. Zhang
Protect the semantic network identity: attribute-based searchable encryption over
routing in named data network 11
X.H. Jiang & Q.M. Huang
choosing a method for generating one-time passwords and an information transport
technology in the authentication system for acS 15
A.Y. Iskhakov, R.V. Meshcheryakov & I.A. Hodashinsky
research and design of network security coordinated recovery system 19
J. Xia, L.T. Jiao, S.S. Zhao & L.T. Li
mandatory access control scheme based on security label for state power control system 25
K.L. Gao, Z.M. Guo, Z.H. Wang & X.P. Li
the complete cyclic structure of the rSa cryptosystem 31
H. Suzuki, H. Yasuoka & K. Matsushita
a weighted Secret Sharing Scheme based on the crt and rSa 39
X.D. Dong & X.P. Jing
Study on the method of intrusion detection cluster combined Fcm with BP optimized
by ga 45
G.Y. Chen, X.Q. Pan, Y.C. Cao, R.X. Li & N. Sun
an automatic network protocol reverse engineering method for vulnerability discovery 49
X.H. Wu, H.T. Ma & D.F. Gu
the new method of security development for web services based on moving target
defense (mtd) technologies 55
M. Styugin
cVde based industrial system dynamic vulnerability assessment 59
X.Q. Zhang & M.J. Chen
an improved cloud-based privacy preserving approach for secure PHr access 65
D. Sangeetha & V. Vaidehi
measurement of operational risk based on α-stable distribution 69
W.Q. Wang, Y.N. Sheng & X.D. Liu
the expected value management mechanism based on certificate system 75
X.K. Zheng, H. Zhang, S. Peng & L. Song
v
9781138028210_Chp_FM.indd 5 03/06/15 10:14 PM
Security defense model of modbus tcP communication based on Zone/Border rules 79
W.L. Shang, L. Li, M. Wan & P. Zeng
Permissions abuse detection for android platform based on droidbox 87
S.Q. Wang, H.T. Ma & X.H. Wu
droidmonitor: a high-level programming model for dynamic aPi monitoring on android 93
D. Liang, R. Chen & H.Y. Sun
application of a security protocol to wireless multiple access systems 97
A. Kim
improved energy detector against malicious Primary user emulation attack in cognitive
radio network 101
J.X. Yang, Y.B. Chen, G.Y. Yang, M.X. Zhao & X.J. Dong
implementing variable length Pseudo random Number generator (PrNg) with fixed
high frequency (1.44 gHz) via Vertix-7 FPga family 105
Q.A. Al-Haija, N.A. Jebril & A. Al-Shua’ibi
the software trusted measurement with expected value 109
Z.H. Wang, L.B. Wu, Z.M. Guo & X.P. Li
the security protection system design for the state grid with trusted computing technology 115
B.L. Yang, H. Zhang & B.H. Zhao
Grid and cloud computing
cloud storage security 123
T. Galibus & H.E.R.M. Vissia
an elasticity evaluation model for cloud storage system 127
X.N. Zhao, Z.H. Li & X. Zhang
exploring a framework of a cloud-assisted peer-to-peer live streaming 133
L.Z. Cui, G.H. Li, L.L. Sun & N. Lu
Privacy-preserving data sharing with anonymity in the cloud 137
Z.M. Zhu, R. Jiang & H.F. Kong
an e-learning system based on cloud computing 141
S.S. Cheng, Z.G. Xiong & X.M. Zhang
digital forensic investigation of dropbox cloud storage service 147
A.C. Ko & W.T. Zaw
cloud based material management system for small-medium size printing companies
in china 151
P. Fang & Y.B. Zhang
mobile cloud platform for big data analytic 155
N.W. Win & T. Thein
Latency-aware interrupt rate control for network i/o virtualization 159
Z.Y. Qian
research of a high power factor mobile phone charger based on L6561 and tinySwitch 163
D.J. Chen
research on text classification based on inverted-index in cloud computing data center 167
G.Y. Yang, L. Chen & B. Meng
rehabilitation for hearing-impaired children pronunciation system based on cloud
application architectures 173
L.J. Shi, J. Zhao & H.W. Qin
vi
9781138028210_Chp_FM.indd 6 03/06/15 10:14 PM
Networking algorithms and performance evaluation
Self-learning method for industrial firewall rules based on hash algorithm 179
Y.Q. Lei, W.L. Shang, M. Wan & P. Zeng
intrusion detectors design with self-configuring multi-objective genetic algorithm 185
E.A. Sopov & I.A. Panfilov
a novel em algorithm for stable optimum 189
Y. Xiao, G.R. Xuan, Z.Q. Yang & Y.Q. Shi
Survey and analysis of digital watermarking algorithms on HeVc video coding standard 193
A.A. Elrowayati & M.F.L. Abdullah
an improved Srdi imaging algorithm 197
B.P. Wang, X.T. Wang, Y. Fang, Y.L. Lan & H. Wang
register one-to-one mapping strategy in dynamic Binary translation 201
Y.N. Cui, J.M. Pang, Z. Shan & F. Yue
Fuzzy classification and implementation methods for text advertisements in weibo 205
X.H. Xu & X.Y. Yang
optimization of depth-first search for smart grid 211
X.Z. Hou, H.L. Sun, S.Q. Liu, Y.G. Li, C.X. Yang & J.T. Cai
operational risk measurement based on Pot-copula 215
Enhemende
Power allocation based on average Ber for two-relay three-hop cooperative
communications 219
X.F. Lan, J. Zhang & Y.X. Ma
the comprehensive carrying capacity assessment of lands in Jing-Jin-Ji region based
on projection pursuit approach 223
X.D. Liu, S. Chen, C. Liu, & X. Gao
a Study about LS-SVm’s application in rFid-based indoor positioning 227
J. Xue, L.T. Li, J.W. Xu & L.T. Jiao
Paragraph reconstruction for postscript documents with complex layout 233
M.N. Zhang, M.Y. Li, W. Wang & Z. Yu
High performance load balancer for restful web service 237
X.D. Wu, J.CH. Zhong & X.Y. Li
a two-level mixed service polling model with batch arrival 241
Z. Guan, Y.Q. Wang & W.H. Qian
Separation and reception of sub-chip multipath components 247
X.G. Zhang, Y.J. Sun, Y. Guo & L.L. Li
a multi-mode jammer frequency synthesizer designed based on the ddS & PLL
hybrid method 251
Y.K. Li & Y.C. Wang
the symbolic method for time series based on mean and slope 255
Y. Wang & Y. Su
coefficient of variations on SdP matrix – a new feature for discriminating between
explosion and earthquake 261
H.M. Huang, Y. Tian, X.H. Shi & C.J. Zhao
improved SurF algorithm based on proportional distance and angle for static sign
language recognition 265
Y. Wang, M.Z. Yang & Y. Luo
vii
9781138028210_Chp_FM.indd 7 03/06/15 10:14 PM
a hybrid cPu-mic parallel gaussian elimination algorithm for solving gröbner bases in
binary field 271
M. Zhu, B. Tang, J. Zhao, H. Xia & J.C. Li
carrier frequency offset estimation of utilizing Subcarrier residual Power for oFdm systems
over time-varying multipath fading channel 277
F.C. Wu, T.C. Chen, W.J. Li & T.T. Lin
the feature extraction of the text based on the deep learning 281
X. Chen, S.F. Li & Y.F. Wang
the study on urban residential land allocation optimization model 287
W. Zhou & L.T. Jiao
random walks for link prediction in networks with nodes attributes 291
Y.X. Chen & L. Chen
Similarity propagation based link predictionin bipartite networks 295
F.Y. Yao & L. Chen
Multimedia, signal and image processing
electricity information collection system design based on wimaX over 230 mHz dedicated
frequency band 301
Z.T. Lai
Video semantic classification based on eLm and multi-features fusion 305
P. Li & H. Wang
a study of the teaching methodology of digital signal processing 309
Z.H. Dong, Y. Li, D.Z. Mu & Y.J. Tang
detecting image authenticity based on Lambert illumination model and shadows 313
S.J. Fang & H.Y. Ge
Visualized system of location-based sandstone landforms 317
J. Ma & Z.Q. Yu
an imaging retrieval method based on block color texture and relevance feedback 323
B.P. Wang, Y.L. Lan, X.T. Wang & H. Wang
e-Learningization of computer science: From bytes to typeset 329
B. Barrett
a measurement study of google Hangouts video calls 333
Y.L. Wang, X. Zhang & W.D. He
using Soa and web 2.0 in web service applications 339
M.C. Huang
current–mode signal processing based ota design for multimedia data transmission 343
J.-U. Kim, S.-D. Yeo, D.-H. Kim, G.-M. Lee & S.-K. Kim
optimal switching intermittency correlations of information complexes dNa for fractal
networks Shannon entropy inside living cells 347
N.E. Galich
a unified decoding method of system combination based on forest 351
Y.P. Liu & C.G. Ma
adaptive anti-interference encoding strategy based on imS 357
M. Zhou & C.Y. Zhou
the design of 474~858 mHz signal strip line directional coupler 361
Q.Y. Ma & Y.L. Guan
viii
9781138028210_Chp_FM.indd 8 03/06/15 10:14 PM
impact of partially coherent X-ray source on clinical phase contrast imaging 365
X.L. Zhang, J. Yang, T. Xia & S. Liu
azimuth multi-angle spaceborne Sar imaging mode for moving target indication 371
Y.M. Wang, J. Chen & W. Yang
travel mode shares comparative analysis and policy suggestion 375
Y.B. Zhang, H.P. Lu & Y. Li
ontology modeling for knowledge management in printing company 379
L. Wei, Y.B. Zhang, W.M. Zhang, X.H. Wang & M.J. Xu
Speaker adaptive real-time korean single vowel recognition for an animation producing 383
H.K. Yun, S.M. Hwang & B.H. Song
Data mining
database-based online call graph tool applications 391
W.Z. Sun, D. Jia, Y. Xiang & R.D. Cao
research on the correlation of Shanghai composite index and the S&P500 index based on
m-copula-egarcH 395
C. Liu, X. Gao, H. Pan, J.H. Li, & X.D. Liu
Big data for the Norwegian maritime industry 399
H. Wang, A. Karlsen & P. Engelseth
a business metadata modeling approach for data integration based on SdmX 403
H. Ge & R.N. Rao
SQL injection attacks manual steps and defense 409
Y.L. Wang & B. Zhang
real estate appraisal model based on ann and its application 413
W.Q. Wang, W.H. Dong & X.D. Liu
manufacturing information model for design for manufacturing 417
H.J. Liu, Q.M. Fan & B. Chen
design of momordica grosvenor e-commerce platform 421
Y. Liu, Y. Deng, Z.Z. Jiang & J.L. Jiang
the impact of oil price shocks on Vietnam’s stock market 425
D.T. Le & Q. Zhang
Formal verification of concurrency errors in JavaScript web applications 431
N. Bhooanusas & D. Pradubsuwun
the impact of import on economic growth: evidence from china 437
X.D. Liu & J. Zhang
a log ontology learning approach to discover non-taxonomic relationships
between events 441
D.Z. Wang, M. Sun & B. Chen
a formal study of event ontology assertion elements 445
P.F. Xia, Z.T. Liu & F.J. Liu
New similarity measure for intuitionistic Fuzzy Sets 451
J.H. Park, Y.C. Kwun & J.H. Koo
experiments and numerical analysis of flow rate in unstably stratified field 455
M. Fumizawa, Y. Saito & N. Uchiyama
configurable formula calculation tool design based on tagged data structure 459
G.Q. Wang, S.Y. Long, P. Shao, W.Z. Zhang & Y.T. Zhao
ix
9781138028210_Chp_FM.indd 9 03/06/15 10:14 PM
Study on the efficiency of data sharing among windows multi-process 463
Z. Wu & Q.Z. Jia
distribution of wages and industrial agglomeration: evidence from china 467
Y.M. Song
mining user behavior patterns in massive open online courses 475
X.Y. Wu & P. Wang
the impact of XBrL classification criteria on accounting conservatism—an example of the
wholesale and retail trade 479
R.Y. Hu & F.Y. Hu
Quantitative factor analysis in evaluating the satisfaction degree of teaching effects 485
Z.Y. Tang & Q.F. Yang
Wireless communications and sensor networks
controlling algorithm for energy consumption of radio bandwidth to manage coverage
area problem 491
K.A. Marsal & I. Abdullah
a workflow hierarchical system modeling approach for dust concentration network sensor 495
X.Z. Cheng, P. Wang, X.Z. Bai, Y.J. Yu, J.H. Liu & L.W. Cui
Network communication based on 6LowPaN and ZigBee 499
F. Di, B.Q. Luo & Z.X. Sun
Feature reconstruction based on compressed information in cognitive radio networks 505
S.Y. Liu, Y. Zhao, Z. Sun, S.S. Wang & X.T. Chen
electric field intensity calculation method of vertical antenna using wireless ad hoc network 509
X.Z. Hou, H.L. Sun, Y.G. Li, C.X. Yang, L. Tang & J.D. Zhou
time-interleaved analog-to-digital converter used for high-speed communication 515
Y.H. Gao, D.B. Fu, G.B. Chen & Z.P. Zhang
chaotic communication with new boss map for the ultra-high reliability in wireless
communications 521
J.H. Lee, C.Y. An, B.J. Kim & H.G. Ryu
a routing protocol for two-level clustering in wireless Sensor Networks 525
A. Ali Omar, C.G. Yu, W. Sagong, H. Park, C.G. Kim & M. Wu
a compact 13-port circularly polarized antennas for mimo communication systems 529
D.J. Lee, S.J. Lee, S.T. Khang & J.W. Yu
webrtc based remote rehabilitation guidance system 533
Q.H. Shi, J. Zheng, W. Wang, Y. Wu & Z.J. Yan
Fast sparse compressive sensing based on the wavelet package hierarchical trees 537
J.X. Chen, T.M. Wang, W.L. Niu & L.J. Du
Laser refractive surgery: New materials and methods and optimal market strategies 541
V. Kalashnikov, J. de Jesus Rocha Salazar, M.D. Mariya Kalashnikova & M.D. Oksana Beda
application of integrated network storage architecture in digital campus construction 545
H.Y. Ge & J.T. Zhang
analysis and research on information management of Sme based on BPr method 549
Z.X. Lu, Y. Han & R.M. Wang
FPga-based kalman filtering for motor control 553
A.M. Romanov & B.V. Slaschov
x
9781138028210_Chp_FM.indd 10 03/06/15 10:14 PM