首页 > 最新文献

2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)最新文献

英文 中文
Performance of Combinational Cooperative Detection Method Under Realistic Conditions 组合协同检测方法在现实条件下的性能
Rameez Ahmed Samo, M. Başaran, Serhat Erküçük
Combinational cooperative detection (CCD) is a method where signal energies from multiple secondary users (SUs) are gathered in different combinations in order to reach a unique decision for each secondary user regarding the activity of the primary user. In earlier implementations of the CCD method, the locations of the SUs have been assumed to be fixed and selected near the border points of the communication area, and the detection performance has been studied for different parameters. In this paper, the performance of the CCD method has been studied under realistic conditions. Initially, the effect of random locations of SUs on the detection performance is considered and compared with the performance for fixed locations. Then, the effect of distance variations between the master and the user is investigated. Finally, the effect of different propagation environments on the detection performance is studied. The results presented are important to assess the performance of the CCD method under realistic conditions.
组合协同检测(CCD)是一种将多个辅助用户(su)的信号能量以不同的组合方式收集,从而针对主用户的活动为每个辅助用户做出唯一决策的方法。在CCD方法的早期实现中,假设单元的位置是固定的,并选择在通信区域的边界点附近,并研究了不同参数下的检测性能。本文对CCD方法在实际条件下的性能进行了研究。首先,考虑单元的随机位置对检测性能的影响,并与固定位置的性能进行比较。然后,研究了主人和用户之间距离变化的影响。最后,研究了不同传播环境对检测性能的影响。所得结果对评价CCD方法在实际条件下的性能具有重要意义。
{"title":"Performance of Combinational Cooperative Detection Method Under Realistic Conditions","authors":"Rameez Ahmed Samo, M. Başaran, Serhat Erküçük","doi":"10.1109/ICUMT51630.2020.9222447","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222447","url":null,"abstract":"Combinational cooperative detection (CCD) is a method where signal energies from multiple secondary users (SUs) are gathered in different combinations in order to reach a unique decision for each secondary user regarding the activity of the primary user. In earlier implementations of the CCD method, the locations of the SUs have been assumed to be fixed and selected near the border points of the communication area, and the detection performance has been studied for different parameters. In this paper, the performance of the CCD method has been studied under realistic conditions. Initially, the effect of random locations of SUs on the detection performance is considered and compared with the performance for fixed locations. Then, the effect of distance variations between the master and the user is investigated. Finally, the effect of different propagation environments on the detection performance is studied. The results presented are important to assess the performance of the CCD method under realistic conditions.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132731659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDN-assisted Unmanned Aerial System for Monitoring Sensor Data sdn辅助无人机监测传感器数据系统
V. Vishnevsky, V. Pham, R. Kirichek, V. Elagin, A. Vladyko, A. Shestakov
Nowadays, using Unmanned Aerial Vehicles (UAV) is applied to many applications such as rescue, streaming, monitoring. The UAVs’ ability can provide flexibility and efficiency in the monitoring operation. However, this poses different challenges, including topology management, resource allocation, and energy consumption for both UAVs and sensor nodes. To address these challenges, this paper discusses applying the approach of Software Defined Networking (SDN) to Unmanned Aerial System for monitoring sensor data, which provide abilities to manage UAV and sensor networks through a centralized SDN controller. The paper presents an architecture framework of SD-UAV and sensor networking. The comparison is performed between the networks with and without using the SDN approach. The results show the efficiency of using SDN to increases the bandwidth and decrease packet loss.
如今,无人驾驶飞行器(UAV)被应用于救援、流媒体、监控等诸多领域。无人机的能力可以在监视操作中提供灵活性和效率。然而,这带来了不同的挑战,包括拓扑管理、资源分配和无人机和传感器节点的能源消耗。为了应对这些挑战,本文讨论了将软件定义网络(SDN)方法应用于无人机系统以监测传感器数据,该方法通过集中式SDN控制器提供管理无人机和传感器网络的能力。提出了一种sd -无人机与传感器网络的体系结构框架。在使用和不使用SDN方法的网络之间进行比较。结果表明,采用SDN可以有效地提高带宽,减少丢包。
{"title":"SDN-assisted Unmanned Aerial System for Monitoring Sensor Data","authors":"V. Vishnevsky, V. Pham, R. Kirichek, V. Elagin, A. Vladyko, A. Shestakov","doi":"10.1109/ICUMT51630.2020.9222450","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222450","url":null,"abstract":"Nowadays, using Unmanned Aerial Vehicles (UAV) is applied to many applications such as rescue, streaming, monitoring. The UAVs’ ability can provide flexibility and efficiency in the monitoring operation. However, this poses different challenges, including topology management, resource allocation, and energy consumption for both UAVs and sensor nodes. To address these challenges, this paper discusses applying the approach of Software Defined Networking (SDN) to Unmanned Aerial System for monitoring sensor data, which provide abilities to manage UAV and sensor networks through a centralized SDN controller. The paper presents an architecture framework of SD-UAV and sensor networking. The comparison is performed between the networks with and without using the SDN approach. The results show the efficiency of using SDN to increases the bandwidth and decrease packet loss.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132608437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio 基于软件定义无线电的IEEE 802.11物理层业务分析
Jirí Pokorný, R. Fujdiak, Martin Kovanda, Martin Strajt, Jiri Hosek
The security of wireless networks is a fairly discussed topic. There are many threads capable of attacking any personal, public, or company network. One way of protection is to analyze traffic on the desired wireless network and look for irregularities in the traffic. There are various approaches on how to capture and analyze wireless traffic. In this paper, we present three enablers on capturing wireless traffic, including Off-the-shelf wireless cards and software defined radios. The results provide the capabilities of used devices and possibilities on how to analyze the traffic. We also present our developed wireless traffic visualizer written in python that can be utilized to discover possible attacks on wireless networks visually.
无线网络的安全性是一个被广泛讨论的话题。有许多线程能够攻击任何个人、公共或公司网络。一种保护方法是分析所需无线网络上的流量,并查找流量中的异常情况。关于如何捕获和分析无线流量有各种方法。在本文中,我们提出了捕获无线流量的三个使能器,包括现成的无线卡和软件定义无线电。结果提供了所使用设备的功能以及如何分析流量的可能性。我们还介绍了我们开发的用python编写的无线流量可视化工具,可以用来可视化地发现对无线网络可能的攻击。
{"title":"Traffic Analysis of IEEE 802.11 on Physical Layer by using Software Defined Radio","authors":"Jirí Pokorný, R. Fujdiak, Martin Kovanda, Martin Strajt, Jiri Hosek","doi":"10.1109/ICUMT51630.2020.9222444","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222444","url":null,"abstract":"The security of wireless networks is a fairly discussed topic. There are many threads capable of attacking any personal, public, or company network. One way of protection is to analyze traffic on the desired wireless network and look for irregularities in the traffic. There are various approaches on how to capture and analyze wireless traffic. In this paper, we present three enablers on capturing wireless traffic, including Off-the-shelf wireless cards and software defined radios. The results provide the capabilities of used devices and possibilities on how to analyze the traffic. We also present our developed wireless traffic visualizer written in python that can be utilized to discover possible attacks on wireless networks visually.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133631117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep Recurrent Architecture based Scene Description Generator for Visually Impaired 基于深度循环架构的视障场景描述生成器
Aviral Chharia, Rahul Upadhyay
Vision is the most essential sense for human beings. But today, more than 2.2 billion people worldwide suffer from some form of vision impairment. This paper presents an end-to-end human-centric model for aiding the visually impaired by employing the deep recurrent architecture of the start-of-the-art image captioning models. A VGG-16 net convolutional neural network (CNN) is used to extract feature vectors from real-time video (image frames) and an long short-term memory (LSTM) network is employed to generate captions from these feature vectors. The model is tested on the Flickr 8K Dataset, one of the most popularly used image captioning dataset which contains over 8000 images. On real-time videos, the model generates rich descriptive captions which are converted to audio for a visually impaired person to listen. Comprehensively the model generates promising results which has great potential to enhance the lives of the visually impaired people by assisting them to get a better understanding of their surroundings.
视觉是人类最基本的感官。但今天,全世界有超过22亿人患有某种形式的视力障碍。本文提出了一个端到端的以人为中心的模型,通过采用最先进的图像字幕模型的深度循环架构来帮助视障人士。使用VGG-16网络卷积神经网络(CNN)从实时视频(图像帧)中提取特征向量,并使用长短期记忆(LSTM)网络从这些特征向量中生成字幕。该模型在Flickr 8K数据集上进行了测试,该数据集是最常用的图像字幕数据集之一,包含超过8000张图像。在实时视频上,该模型生成丰富的描述性字幕,并将其转换为音频,供视障人士收听。综合而言,该模型产生了令人满意的结果,通过帮助视障人士更好地了解他们周围的环境,这些结果有很大的潜力来改善视障人士的生活。
{"title":"Deep Recurrent Architecture based Scene Description Generator for Visually Impaired","authors":"Aviral Chharia, Rahul Upadhyay","doi":"10.1109/ICUMT51630.2020.9222441","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222441","url":null,"abstract":"Vision is the most essential sense for human beings. But today, more than 2.2 billion people worldwide suffer from some form of vision impairment. This paper presents an end-to-end human-centric model for aiding the visually impaired by employing the deep recurrent architecture of the start-of-the-art image captioning models. A VGG-16 net convolutional neural network (CNN) is used to extract feature vectors from real-time video (image frames) and an long short-term memory (LSTM) network is employed to generate captions from these feature vectors. The model is tested on the Flickr 8K Dataset, one of the most popularly used image captioning dataset which contains over 8000 images. On real-time videos, the model generates rich descriptive captions which are converted to audio for a visually impaired person to listen. Comprehensively the model generates promising results which has great potential to enhance the lives of the visually impaired people by assisting them to get a better understanding of their surroundings.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130969116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark 基于数字水印的实现在Unix操作系统中构建可信环境的方法
A. Krasov, S. Shterenberg
As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of "foreign" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.
作为一个问题,本文讨论了在类unix操作系统(Linux OS)软件产品模块中引入数字水印(DW)的可信计算环境(TCE)的构建。信息安全运营商面临的威胁之一是不法竞争对手非法使用程序或其组件作为“外国”程序的一部分。因此,我们正在讨论许可密钥和DW的联合使用,它们可以作为保护Linux操作系统的综合解决方案。以上证实了在基于数字水印实现的类unix中创建可信环境的方法的相关性。本文考虑了类unix系统中使用数字水印的参数、允许内存等问题。
{"title":"Methods for building a trusted environment in Unix operating systems based on the implementation of a digital watermark","authors":"A. Krasov, S. Shterenberg","doi":"10.1109/ICUMT51630.2020.9222413","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222413","url":null,"abstract":"As a problematic, this article discusses the construction of a trusted computing environment (TCE) based on the introduction of digital watermarks (DW) into the modules of the software product of a Unix-like operating / Linux system (Linux OS). One of the threats faced by an information security operator is the illegal use of a program or its components by unscrupulous competitors as part of \"foreign\" programs. Thus, we are talking about the joint use of the license key and the DW, which can act as a comprehensive solution for protecting the Linux OS. The above confirms the relevance of creating a methodology for building a trusted environment in Unix-like based on the implementation of a digital watermark. In this paper, the parameters of using the digital watermark, the admissible memory of Unix-like systems are considered.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"4623 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125435505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Computational Geometry Data Structures in Logistics and Navigation Tasks 计算几何数据结构在物流和导航任务
M. Seda, Pavel Seda
Computational geometry data structures have many applications, such as network optimisation, location tasks, but they can also be used in robot motion planning when a path of the shortest length must be found between the start and target positions that guarantee movements without the risk of collisions with obstacles. The paper deals with visibility graphs, strip and cell decompositions, Voronoi diagrams and compares their properties and efficiency in the investigated area. Since cell decomposition-based approaches give exponential complexity depending on the number of cells, and the knowledge base makes it possible to reduce it mostly only insignificantly, Voronoi diagrams with their polynomial complexity are more efficient for large instances. In addition, their generalized version allows them to generate smooth trajectories.
计算几何数据结构有许多应用,如网络优化,定位任务,但它们也可以用于机器人运动规划,当必须在起始位置和目标位置之间找到最短长度的路径时,保证运动没有与障碍物碰撞的风险。本文讨论了可见性图、条形分解和细胞分解、Voronoi图,并比较了它们在研究区域的性质和效率。由于基于细胞分解的方法根据细胞的数量给出指数复杂度,而知识库使得它可以几乎不显著地降低复杂度,因此具有多项式复杂度的Voronoi图对于大型实例更有效。此外,它们的广义版本允许它们生成平滑轨迹。
{"title":"Computational Geometry Data Structures in Logistics and Navigation Tasks","authors":"M. Seda, Pavel Seda","doi":"10.1109/ICUMT51630.2020.9222453","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222453","url":null,"abstract":"Computational geometry data structures have many applications, such as network optimisation, location tasks, but they can also be used in robot motion planning when a path of the shortest length must be found between the start and target positions that guarantee movements without the risk of collisions with obstacles. The paper deals with visibility graphs, strip and cell decompositions, Voronoi diagrams and compares their properties and efficiency in the investigated area. Since cell decomposition-based approaches give exponential complexity depending on the number of cells, and the knowledge base makes it possible to reduce it mostly only insignificantly, Voronoi diagrams with their polynomial complexity are more efficient for large instances. In addition, their generalized version allows them to generate smooth trajectories.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126053798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum mechanics with non-negative distribution and measurements 非负分布和测量的量子力学
A. V. Zorin, N. Tretyakov
The issues of interaction between the measuring device and the micro system have not yet been completely resolved. Moreover, if at the dawn of quantum mechanics attention was paid to the influence of the device on the state of the system, then later (D.V. Blokhintsev) interest in the inverse problem (and, in essence, more traditional) - on the influence of the micro-object on the state of the macro-system increased. Measuring instruments consist of a number of interconnected links. The quantum theory of measurements asserts that the first cascades can be quantum, but the last should be classical (in the current terminology - an analyzer and a detector). This paper discusses the integration of such an approach to measuring instruments in the formalism of quantum mechanics. Test (auxiliary) functions in quantum mechanics with nonnegative distribution functions (quantum mechanics Kuryshkin-Wodkevich - QDF), in fact, can and should be associated with the measurement process and measuring instruments. Our thesis is that these functions should be related to the measuring instrument used and describe its interaction with the system. It turns out that exactly the non-Hermitian character of the Hamiltonians in QDF expresses this connection. Thus, the QDF, which has long been positioned as an alternative and exotic quantum theory, is increasingly taking shape as a quantum theory of measurements. Only a short time ago, in our works the meaning of this formalism as the theory of quantum measurements was clarified. The analogies of auxiliary functions in the QDF theory with wave functions in the examples of D. Blokhintsev measuring instruments mentioned in this paper, are promising areas of research which, in the framework of the study of quantum entanglement, can give a significant impetus to the development of quantum cryptography. This work, in this sense, should become a turning point in this reversal of the QDF to new applications.
测量装置与微系统之间的相互作用问题尚未完全解决。此外,如果在量子力学的初期,人们关注的是设备对系统状态的影响,那么后来(D.V. Blokhintsev)对反问题(本质上更传统)的兴趣——对微观物体对宏观系统状态的影响的兴趣增加了。测量仪器由许多相互连接的环节组成。量子测量理论断言,第一个级联可以是量子级联,但最后一个级联应该是经典级联(在当前的术语中-一个分析器和一个检测器)。本文讨论了这种测量方法在量子力学形式体系中的集成。测试(辅助)函数在量子力学中具有非负分布函数(量子力学Kuryshkin-Wodkevich - QDF),实际上可以而且应该与测量过程和测量仪器相关联。我们的论点是,这些功能应该与所使用的测量仪器有关,并描述其与系统的相互作用。事实证明,正是QDF中哈密顿量的非厄米特征表达了这种联系。因此,长期以来被定位为另类和奇异量子理论的QDF,越来越多地成为测量的量子理论。就在不久以前,在我们的著作中,我们阐明了作为量子测量理论的这种形式主义的意义。在本文中提到的D. Blokhintsev测量仪器的例子中,QDF理论中的辅助函数与波函数的类比是有前途的研究领域,在量子纠缠研究的框架下,可以对量子密码学的发展产生重大的推动作用。从这个意义上说,这项工作应该成为QDF向新应用逆转的转折点。
{"title":"Quantum mechanics with non-negative distribution and measurements","authors":"A. V. Zorin, N. Tretyakov","doi":"10.1109/ICUMT51630.2020.9222429","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222429","url":null,"abstract":"The issues of interaction between the measuring device and the micro system have not yet been completely resolved. Moreover, if at the dawn of quantum mechanics attention was paid to the influence of the device on the state of the system, then later (D.V. Blokhintsev) interest in the inverse problem (and, in essence, more traditional) - on the influence of the micro-object on the state of the macro-system increased. Measuring instruments consist of a number of interconnected links. The quantum theory of measurements asserts that the first cascades can be quantum, but the last should be classical (in the current terminology - an analyzer and a detector). This paper discusses the integration of such an approach to measuring instruments in the formalism of quantum mechanics. Test (auxiliary) functions in quantum mechanics with nonnegative distribution functions (quantum mechanics Kuryshkin-Wodkevich - QDF), in fact, can and should be associated with the measurement process and measuring instruments. Our thesis is that these functions should be related to the measuring instrument used and describe its interaction with the system. It turns out that exactly the non-Hermitian character of the Hamiltonians in QDF expresses this connection. Thus, the QDF, which has long been positioned as an alternative and exotic quantum theory, is increasingly taking shape as a quantum theory of measurements. Only a short time ago, in our works the meaning of this formalism as the theory of quantum measurements was clarified. The analogies of auxiliary functions in the QDF theory with wave functions in the examples of D. Blokhintsev measuring instruments mentioned in this paper, are promising areas of research which, in the framework of the study of quantum entanglement, can give a significant impetus to the development of quantum cryptography. This work, in this sense, should become a turning point in this reversal of the QDF to new applications.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130918670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ARDefense: DDoS detection and prevention using NFV and SDN ARDefense:基于NFV和SDN的DDoS检测和防御
A. Singh, R. Jaiswal, A. Khakimov, A. Muthanna
Network Function Virtualization or NFV gives numerous advantages over the conventional networking techniques by incorporating distinctive features of a network over the virtual machine (VM). It decreases capital and operational costs to give more noteworthy adaptability and flexibility. But all of these advantages come at the expense of the intrinsic system vulnerabilities because of specific sorts of cyber attacks like the Distributed Denial of Service (DDoS) attack. With the increased number of layers in NFV, it becomes easier for an attacker to execute DDoS attack. This study indicates a new model for mitigating the effects of DDoS attacks on NFV. The model has been designed specifically for the individual users especially gamers and online streamers who become victim of DDoS attack on adaily basis. However, the method can be used for a online service like a website in general as well after making certain changes which have been discussed in detail. ARDefense usually performs server migration and IP spoofing when it detects a DDoS attack on the application layer. Effectiveness of ARDefense was tested by measuring load migration and IP spoofing processing time.
网络功能虚拟化或NFV通过在虚拟机(VM)上集成网络的独特特性,提供了许多优于传统网络技术的优势。它降低了资本和运营成本,提供了更多值得注意的适应性和灵活性。但是,所有这些优势都是以牺牲固有的系统漏洞为代价的,因为诸如分布式拒绝服务(DDoS)攻击之类的特定类型的网络攻击。随着NFV层数的增加,攻击者更容易实施DDoS攻击。本研究提出了一种减轻DDoS攻击对NFV影响的新模型。该模型是专门为个人用户设计的,特别是游戏玩家和在线流媒体,他们每天都成为DDoS攻击的受害者。然而,该方法可以用于像网站这样的在线服务,也可以在进行了详细讨论的某些更改后使用。当检测到应用层的DDoS攻击时,通常会进行服务器迁移和IP欺骗。通过测量负载迁移和IP欺骗处理时间来测试ARDefense的有效性。
{"title":"ARDefense: DDoS detection and prevention using NFV and SDN","authors":"A. Singh, R. Jaiswal, A. Khakimov, A. Muthanna","doi":"10.1109/ICUMT51630.2020.9222443","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222443","url":null,"abstract":"Network Function Virtualization or NFV gives numerous advantages over the conventional networking techniques by incorporating distinctive features of a network over the virtual machine (VM). It decreases capital and operational costs to give more noteworthy adaptability and flexibility. But all of these advantages come at the expense of the intrinsic system vulnerabilities because of specific sorts of cyber attacks like the Distributed Denial of Service (DDoS) attack. With the increased number of layers in NFV, it becomes easier for an attacker to execute DDoS attack. This study indicates a new model for mitigating the effects of DDoS attacks on NFV. The model has been designed specifically for the individual users especially gamers and online streamers who become victim of DDoS attack on adaily basis. However, the method can be used for a online service like a website in general as well after making certain changes which have been discussed in detail. ARDefense usually performs server migration and IP spoofing when it detects a DDoS attack on the application layer. Effectiveness of ARDefense was tested by measuring load migration and IP spoofing processing time.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Computer Simulation and Analysis of A Doubly Fed Induction Generator with A One Side Directly Connected to The Grid 单侧直连双馈感应发电机的计算机仿真与分析
Nguyen Huu Nam, Tran Xuan Trung
Doubly fed induction generator (DFIG) is one of the most complex electrical structures for a power generating system (such as wind turbine and small hydro power). This paper proposes theory calculations, computer simulation and analysis structure of a DFIG with only one side connected to the grid. The stator of wound rotor induction generator (WRIG) is connected directly to the grid, and the rotor is controlled by a converter connected to an ideal battery. The theory calculation results provide the fundamental information for the initial stages of engineering design both in term of separate components (electrical machine, electronic converter) as well as the whole entire generating system. These properties and calculations determine the composition, technical implementation of the components in the system and the interaction between them. The theory and computer simulation results of a 160 kW WRIG system is also presented to prove the feasibility of the proposed system and method.
双馈感应发电机(DFIG)是风力发电和小水电等发电系统中最复杂的电气结构之一。本文提出了单侧并网DFIG的理论计算、计算机仿真和分析结构。绕线转子感应发电机(WRIG)的定子直接与电网相连,转子由与理想电池相连的变流器控制。理论计算结果为工程设计初期的各部件(电机、电子变换器)和整个发电系统的设计提供了基础资料。这些属性和计算决定了系统中组件的组成、技术实现以及它们之间的相互作用。最后给出了160kw WRIG系统的理论和计算机仿真结果,验证了所提系统和方法的可行性。
{"title":"Computer Simulation and Analysis of A Doubly Fed Induction Generator with A One Side Directly Connected to The Grid","authors":"Nguyen Huu Nam, Tran Xuan Trung","doi":"10.1109/ICUMT51630.2020.9222434","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222434","url":null,"abstract":"Doubly fed induction generator (DFIG) is one of the most complex electrical structures for a power generating system (such as wind turbine and small hydro power). This paper proposes theory calculations, computer simulation and analysis structure of a DFIG with only one side connected to the grid. The stator of wound rotor induction generator (WRIG) is connected directly to the grid, and the rotor is controlled by a converter connected to an ideal battery. The theory calculation results provide the fundamental information for the initial stages of engineering design both in term of separate components (electrical machine, electronic converter) as well as the whole entire generating system. These properties and calculations determine the composition, technical implementation of the components in the system and the interaction between them. The theory and computer simulation results of a 160 kW WRIG system is also presented to prove the feasibility of the proposed system and method.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128221756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a Pseudo-Random Sequence Generation Function Based on the Cryptographic Algorithm "Kuznechik" 基于“Kuznechik”密码算法的伪随机序列生成函数的开发
V. Grozov, A. Guirik, M. Budko, M. Budko
The paper deals with the main component of a deterministic random sequence generator – a generation function based on the algorithm "Kuznechik" (Russian encryption standard GOST R 34.12-2015). A procedure of round keys generation that uses the features of the algorithm has been developed. It allows to use the algorithm in a mode that combines the advantages of well-known OFB and CTR encryption modes. In addition, some enhancements of the algorithm that improve the generator security while maintaining its performance are implemented. The quality of the generator was evaluated by means of statistical tests (NIST SP 800-22), Pear-son's criterion, and min-entropy (NIST 800-90B tests). According to the analyzed characteristics, the enhanced generator and its ordinary version based on "Kuznechik" algorithm are comparable, but the proposed generation function has a higher security level.
本文研究了确定性随机序列生成器的主要组成部分——基于“Kuznechik”算法(俄罗斯加密标准GOST R 34.12-2015)的生成函数。利用该算法的特点,开发了一个生成轮密钥的程序。它允许在结合了众所周知的OFB和CTR加密模式的优点的模式下使用算法。此外,还对算法进行了一些改进,在保证发电机性能的同时提高了发电机的安全性。通过统计检验(NIST SP 800-22)、皮尔森准则和最小熵检验(NIST 800-90B)对发电机的质量进行评价。根据分析的特征,增强的生成器与基于“Kuznechik”算法的普通生成器具有可比性,但所提出的生成函数具有更高的安全级别。
{"title":"Development of a Pseudo-Random Sequence Generation Function Based on the Cryptographic Algorithm \"Kuznechik\"","authors":"V. Grozov, A. Guirik, M. Budko, M. Budko","doi":"10.1109/ICUMT51630.2020.9222457","DOIUrl":"https://doi.org/10.1109/ICUMT51630.2020.9222457","url":null,"abstract":"The paper deals with the main component of a deterministic random sequence generator – a generation function based on the algorithm \"Kuznechik\" (Russian encryption standard GOST R 34.12-2015). A procedure of round keys generation that uses the features of the algorithm has been developed. It allows to use the algorithm in a mode that combines the advantages of well-known OFB and CTR encryption modes. In addition, some enhancements of the algorithm that improve the generator security while maintaining its performance are implemented. The quality of the generator was evaluated by means of statistical tests (NIST SP 800-22), Pear-son's criterion, and min-entropy (NIST 800-90B tests). According to the analyzed characteristics, the enhanced generator and its ordinary version based on \"Kuznechik\" algorithm are comparable, but the proposed generation function has a higher security level.","PeriodicalId":170847,"journal":{"name":"2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129916341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2020 12th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1