Current Issue : October - December Volume : 2015 Issue Number : 4 Articles : 4 Articles
Currently, there are several ongoing efforts for the definition of new regulation policies, paradigms, and technologies\naiming a more efficient usage of the radio spectrum. In this context, cognitive radio (CR) emerges as one of the most\npromising players by enabling the dynamic access to vacant frequency bands on a non-interference basis. However,\nthe intrinsic characteristic of CR opens new ways for attackers, namely in the context of the effective detection of\nincumbent or primary users (PUs), the most fundamental and challenging requirement for the successful operation of\nCR networks. In this article, we provide a global and integrated vision of the main threats affecting CR environments in\nthe context of the detection of primary users, with a particular focus on spectrum sensing data falsification and primary\nuser emulation attacks. We also address solutions and research challenges still required to address such threats. Our\ndiscussion aims at being complete and self-contained, while also targeting readers with no specific background on this\nimportant topic of CR environments. It is, as far as our knowledge goes, the first work providing a global and clear\nvision of security threats and countermeasures in the context of primary user detection in CR....
With the rapid development of the internet and information technology, the increasingly diversified portable mobile terminals,\nonline shops, and social media have facilitated information exchange, social communication, and financial payment for people\nmore andmore than ever before. In themeantime, information security and privacy protection have beenmeeting with new severe\nchallenges. Although we have taken a variety of information security measures in both management and technology, the actual\neffectiveness depends firstly on people�s awareness of information security and the cognition of potential risks. In order to explore\nthe new technology for the objective assessment of people�s awareness and cognition on information security, this paper takes the\nonline financial payment as example and conducts an experimental study based on the analysis of electrophysiological signals.\nResults indicate that left hemisphere and beta rhythms of electroencephalogram (EEG) signal are sensitive to the cognitive degree\nof risks in the awareness of information security, which may be probably considered as the sign to assess people�s cognition of\npotential risks in online financial payment....
In this paper, we show that it is possible and,\nindeed, feasible to use secure multiparty computation (SMC)\nfor calculating the probability of a collision between two\nsatellites. For this purpose, we first describe basic floating\npoint arithmetic operators (addition and multiplication) for\nmultiparty computations. The operators are implemented on\nthe Share mind SM Cengine.We discuss the implementation\ndetails, provide methods for evaluating example elementary\nfunctions (inverse, square root, exponentiation of e, error\nfunction). Using these primitives, we implement a satellite\nconjunction analysis algorithm and give benchmark results\nfor the primitives as well as the conjunction analysis itself....
As the cloud computing paradigm evolves, new\ntypes of cloud-based services have become available, including\nsecurity services. Some of the most important and most\ncommonly adopted security services are firewall services.\nThese cannot be easily deployed in a cloud, however, because\nof a lack of mechanisms preserving firewall policy confidentiality.\nEven if they were provided, the customer traffic\nflowing through the Cloud Service Provider infrastructure\nwould still be exposed to eavesdropping and information\ngaining by performing analysis. To bypass these issues, the\nfollowing article introduces a novel framework, known as\nthe Ladon Hybrid Cloud, for preserving cloud-based firewall\npolicy confidentiality. It is shown that in this framework,\na high level of privacy is provided thanks to leveraging an\nanonymized firewall approach and a hybrid cloud model. A\nnumber of optimization techniques, which help to further\nimprove the Ladon Hybrid Cloud privacy level, are also introduced.\nFinally, analysis performed on the framework shows\nthat it is possible to find a trade-off between the Ladon Hybrid\nCloud privacy level, its congestion probability, and efficiency.\nThis argument has been demonstrated through the results of\nconducted experiments....
Loading....