Archive

Year

Volume(Issue)

Issues

Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Scientific Information Database (SID) - Trusted Source for Research and Academic Resources
Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4 (12)
  • Pages: 

    1-9
Measures: 
  • Citations: 

    0
  • Views: 

    1053
  • Downloads: 

    0
Abstract: 

Protecting valuable data along the Cyber Security is the one of the strategic issues of cyber defense. The secret sharing scheme is an attractive branch of advanced cryptography that has extremely important role in cyber defense and for the preservation of documents and confidential information against threats such as robbery and unauthorized accesses. In the secret sharing schemes, for increasing security shareholders present a shadow image instead of the genuine share while they are recovering secret images. Thus each shareholder is able to share several images with others by having only one portion of image.In this paper, we define and design a new generating function that by replacing with the Hou Zheng Feng and et.al's generating function, can improved it. Since the new generating function is one-way and hard problem, hence increased the security of improved scheme. Also, with implementation and performing the new scheme again, our revised scheme will be more efficient respect to previous scheme according to the analysis and speed of computations.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1053

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHOKHMZAN Z. | MOUSAVI M.R.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4 (12)
  • Pages: 

    11-22
Measures: 
  • Citations: 

    0
  • Views: 

    1132
  • Downloads: 

    0
Abstract: 

Among the variety of GPS signal interference, spoofing is considered as the most dangerous intentional interference. If spoofing signal would have existed in the received signal GPS, wrong information reaches the receiver which causes problems in time and location computation of the receiver. Defense against spoofing includes the spoofing detection and reduction. In this paper, we use the properties of correlation function for spoofing detection. In order to mitigate spoofing, we apply the method of Least Mean Squares (LMS) based on sign-data algorithm. This approach reduces effect of the spoofing interference in the received signal GPS and defends against interference of kind of delay spoofing. The proposed approach have been implemented on real dataset and in the acquisition stage from GPS receiver processing. The results show that the adaptive method based on sign-data algorithm decrease effectiveness of spoofing on average 89 percent. In addition to spoofing reduction, the Position Dilution of Precision (PDOP) parameter improves at all of results. PDOP parameter indicates the spatial position of identified satellites.The PDOP value mitigated from 47 to 2.66 on average.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1132

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

DANAEE M.R.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4 (12)
  • Pages: 

    23-41
Measures: 
  • Citations: 

    0
  • Views: 

    1037
  • Downloads: 

    0
Abstract: 

The PHD filter recursion is introduced to enable the implementation of expensive computational algorithms of multitarget Bayesian filtering. The goal of this recursion is to update and propagate the posterior intensity of a Random Finite Set during time steps. To that end, Cardinalized PHD is introduced as an extension of PHD filter to overcome the PHD’s weakness in estimating the number of targets. In the CPHD filter, the posterior intensity function and the cardinality distribution are updating at the same time. In this paper, we use auxiliary particle filter to implement the CPHD filter. The benefit of the proposed algorithm is to sample at the higher dimensional space compared to the dimensional of the target space in order to generate approximating samples of the CPHD filter and this will improve the estimation accuracy.To that end, we first reformulize the CPHD recursion in a way which is suitable for auxiliary particle filter. Then, to sample in a higher dimensional space, we first use an auxiliary variable which is the index of previously generated samples and then we apply another auxiliary variable which is the index of current measurements to improve the estimation of the number and position of multiple targets. Comparison between mean and variance of estimated cardinality and error of multitarget position estimation obtained from simulation results indicate the superiority of our proposed algorithm compared to the current implementation method of the CPHD filter by using SIR particle filter.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 1037

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4 (12)
  • Pages: 

    43-59
Measures: 
  • Citations: 

    0
  • Views: 

    2608
  • Downloads: 

    0
Abstract: 

Botnets are the latest types of internet-scale malware in recent years that has been the greatest threats to the web servers. Bot is an infected computer by a malware that are controlled remotely by one or more human factors without the user’s knowledge. This controller agent called “bot master” and sometimes the infected system is called “victim”. Peer to peer botnet is one type of botnets that use peer to peer protocols and detection of this type of botnet is more difficult than other types. Our suggested approach is a new method to detect such botnets. This approach uses network flow analysis and clustering method in data mining to detect peer to peer botnets. This approach is flow-based and compares the similarity between flows and K-Means clustering algorithm and eventually determines that the new traffic is an attack or not. This approach has good performance in detection of botnets in flash crowd traffic and this characteristic is distinction of the suggested algorithm and similar algorithms. Finally, the suggested approach has been tested with different traffic.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2608

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4 (12)
  • Pages: 

    61-70
Measures: 
  • Citations: 

    0
  • Views: 

    778
  • Downloads: 

    0
Abstract: 

With the growing development of wireless communications systems, the use of systems with high data rates has arrested attention that can be noted to OFDM systems among these systems. The important features of this system are efficient usage of bandwidth and resistance to errors caused by the multipath propagation environment. OFDM systems have a high sensitivity to frequency offset. Due to the importance of signal eavesdropping in the cyber defence, in order to compensate frequency offset, it is necessary to use blind frequency estimation methods based on the inherent structure of the system and without the use of pilot symbols. Accordingly, in this paper, a blind frequency offset estimation algorithm based on cyclic prefix (CP) by using adaptive algorithms is presented that is closed to the optimum frequency offset during a step by step algorithm. In the proposed method, the Normalized Least Mean Square (NLMS) and Recursive least squares (RLS) adaptive algorithms are used to provide a method for estimating the frequency offset. The main feature of the new presented method is the ability to estimating the frequency offset in the presence of the time offset and in multipath channel with frequency-selective fading. According to the simulations results that are performed in the frequency-selective fading channel, MSE criterion in the NLMS proposed method about 3 dB and in the RLS proposed method approximately 7 dB has improved compared to other methods.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 778

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

MOHAMMADI A. | MODIRI N.

Issue Info: 
  • Year: 

    2016
  • Volume: 

    3
  • Issue: 

    4 (12)
  • Pages: 

    71-80
Measures: 
  • Citations: 

    0
  • Views: 

    2286
  • Downloads: 

    0
Abstract: 

Tradeoffs between security and performance are the most important issue in wireless networks. An authentication protocol is a type of cryptographic protocol with the purpose of authenticating entities. Latest standards for re-authentication protocols have published by Internet Engineering Task Force (IETF). In this research, after reviewing some protocols in this scope, a security protocol is proposed. The proposed protocol is based on IETF standards. Fundament of RFC 6696 is exploited to develop the proposed protocol. It offers serious advantages over the existing IEEE 802.1X standard protocols, including: symmetric cryptosystem, challenge–response and hash chaining.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 2286

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button