Current Issue : July - September Volume : 2014 Issue Number : 3 Articles : 4 Articles
Wireless sensor networks (WSNs) are gaining more and more interest in the research community due to their unique\ncharacteristics. Besides energy consumption considerations, security has emerged as an equally important aspect in\ntheir network design. This is because WSNs are vulnerable to various types of attacks and to node compromises, and\nas such, they require security mechanisms to defend against them. An intrusion detection system (IDS) is one such\nsolution to the problem. While several signature-based and anomaly-based detection algorithms have been\nproposed to date for WSNs, none of them is specifically designed for the ultra-wideband (UWB) radio technology.\nUWB is a key solution for wireless connectivity among inexpensive devices characterized by ultra-low power\nconsumption and high precision ranging. Based on these principles, in this paper, we propose a novel anomaly-based\ndetection and location-attribution algorithm for cluster-based UWB WSNs. The proposed algorithm, abbreviated as\nADLU, has dedicated procedures for secure cluster formation, periodic re-clustering, and efficient cluster member\nmonitoring. The performance of ADLU in identifying and localizing intrusions using a rule-based anomaly detection\nscheme is studied via simulations....
Recently, several ownership protection schemes which combine encryption and secret sharing technology have been\nproposed. To reveal the original message, however, they exploited XOR operation which is similar to a one-time pad.\nIt is fairly losing the reconstruction simplicity due to the human visual system (HVS). It should be noted that it is\ncompletely different from the original concept of visual cryptography proposed by Naor and Shamir. To decrypt the\nsecret message, Naor and Shamir�s concept stacked k transparencies together. The operation solely does a visual OR\nof the shares rather than XOR, the way HVS does. In this paper, we, consequently, adopt Naor and Shamir�s concept to\napply correct theory of visual cryptography. Furthermore, audio copyright protection schemes which exploit chaotic\nmodulation or watermark integration into frequency components have been widely proposed. Nevertheless, security\nissue against intentional distortions has not been addressed yet. In this paper, we aim to construct a resilient audio\nownership protection scheme to enhance the security by integrating the discrete wavelet transform and discrete\ncosine transform, visual cryptography, and digital timestamps. In the proposed scheme, the watermark does not\nrequire to be embedded within the original audio but is used to generate a secret image and a public image. The\nwatermark is then acquired by performing OR between the secret and public image. We can alleviate the trade-off\nexpenses between the capacity of data payload and two other important properties such as imperceptibility and\nrobustness without modifying the original audio signals. The experiments against a variety of audio signals processing\nprovided by StirMark confirm superior robustness of the proposed scheme. We also demonstrate the intentional\ndistortion by modifying the original content via experiments, it reveals comparable reliability. The proposed scheme\ncan be widely applied to the area of audio ownership protection....
IP networks are constantly targeted by new techniques of denial of service attacks (SYN flooding, port scan, UDP\nflooding, etc), causing service disruption and considerable financial damage. The on-line detection of DoS attacks in\nthe current high-bit rate IP traffic is a big challenge. We propose in this paper an on-line algorithm for port scan\ndetection. It is composed of two complementary parts: First, a probabilistic counting part, where the number of\ndistinct destination ports is estimated by adapting a method called ââ?¬Ë?sliding HyperLogLogââ?¬â?¢ to the context of port scan\nin IP traffic. Second, a decisional mechanism is performed on the estimated number of destination ports in order to\ndetect in real time any behavior that could be related to a malicious traffic. This latter part is mainly based on the\nexponentially weighted moving average algorithm (EWMA) that we adapted to the context of on-line analysis by\nadding a learning step (supposed without attacks) and improving its update mechanism. The obtained port scan\ndetecting method is tested against real IP traffic containing some attacks. It detects all the port scan attacks within a\nvery short time response (of about 30 s) and without any false positive. The algorithm uses a very small total memory\nof less than 22 kb and has a very good accuracy on the estimation of the number of destination ports (a relative error\nof about 3.25%), which is in agreement with the theoretical bounds provided by the sliding HyperLogLog algorithm....
Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the\npayload while minimizing a suitably defined distortion function. The design of the distortion is essentially the only task\nleft to the steganographer since efficient practical codes exist that embed near the payload-distortion bound. The\npractitioner�s goal is to design the distortion to obtain a scheme with a high empirical statistical detectability. In this\npaper, we propose a universal distortion design called universal wavelet relative distortion (UNIWARD) that can be\napplied for embedding in an arbitrary domain. The embedding distortion is computed as a sum of relative changes of\ncoefficients in a directional filter bank decomposition of the cover image. The directionality forces the embedding\nchanges to such parts of the cover object that are difficult to model in multiple directions, such as textures or noisy\nregions, while avoiding smooth regions or clean edges. We demonstrate experimentally using rich models as well as\ntargeted attacks that steganographic methods built using UNIWARD match or outperform the current state of the art\nin the spatial domain, JPEG domain, and side-informed JPEG domain....
Loading....