International Journal of Computational Intelligence Systems

Volume 5, Issue 5, September 2012

2. An Immune-inspired Adaptive Automated Intrusion Response System Model

Ling-xi Peng, Dong-qing Xie, Ying Gao, Wen-bin Chen, Fu-fang Li, Wu Wen, Jue Wu
Pages: 808 - 815
An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the...

3. A Novel Location-aided Routing Algorithm for Mobile Ad Hoc Network with a Small Expenditure on Route-Discovery

Hong Peng, Shi-yuan Fu, Li-min Meng, Xia Liu
Pages: 816 - 823
The location-aided routing algorithm adopts the flooding mechanism to transmit route control packet in mobile Ad Hoc networks. Such mechanism not only affects nodes which do not join the final route, but also needs a large number of unnecessary deliveries of control packets. To address this issue, we...

4. A Forward-secure Grouping-proof Protocol for Multiple RFID Tags

Liu Ya-li, Qin Xiao-lin, Li Bo-han, Liu Liang
Pages: 824 - 833
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message...

5. Synchronization of Time-Delay Chaotic System in Presence of Noise

Min Lei, Hai-peng Peng, Chun-yu Yang, Li-xiang Li
Pages: 834 - 840
Chaotic synchronization, as a key technique of chaotic secure communication, has received much attention in recent years. This paper proposes a nonlinear synchronization scheme for the time-delay chaotic system in the presence of noise. In this scheme, an integrator is introduced to suppress the influence...

6. Statistical Mechanisms for Detecting Malicious Behaviors in Resource Allocation from Non-cooperative P2P Environments

Hai-yang Hu, Zhong-jin Li, Li-guo Huang, Hua Hu
Pages: 841 - 850
A Peer-to-Peer (P2P) system relies on the cooperation of the peers and the contributions of their resources. To motivate autonomous peers share their resources, the system needs to support effective resource allocation strategies with respect to peers’ task priorities, and their personal information...

7. A Credibility-based Congestion Control Scheme and its Performance Evaluation

Jin-xin Zhang, Man-gui Liang, Shu-juan Wang
Pages: 851 - 859
A congestion control scheme based on credibility is proposed. In this scheme, the whole network is divided into several independent domains, and each domain contains a congestion control server (CCS) and several control modules (CM). The CCS is used to collect credit information and make punishment decisions...

8. Safety and Availability Checking for User Authorization Queries in RBAC

Jian-feng Lu, Jian-min Han, Wei Chen, Jin-Wei Hu
Pages: 860 - 867
This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable...

9. Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation

Ming Wan, Ying Liu, Jian-qiang Tang, Hong-ke Zhang, Si-yu Lin
Pages: 868 - 877
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier...

10. Watch-Nodes-Based Wormhole Attacks Detection in Wireless Mesh Networks

Liang-yu Luan, Ying-fang Fu, Peng Xiao, Ling-xi Peng
Pages: 878 - 886
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting,...

11. A Secure Network Coding-based Data Gathering Model and Its Protocol in Wireless Sensor Networks

Qian Xiao, Kang-feng Zheng, Shou-shan Luo, Xu Cui
Pages: 887 - 895
To provide security for data gathering based on network coding in wireless sensor networks (WSNs), a secure network coding-based data gathering model is proposed, and a data-privacy preserving and pollution preventing (DPP&PP) protocol using network coding is designed. DPP&PP makes use of a new...

12. Single Byte Differential Fault Analysis on the LED Lightweight Cipher in the Wireless Sensor Network

Wei Li, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, Qing-ju Wang
Pages: 896 - 904
The LED is a new lightweight cipher, which was published in CHES 2011. This cipher could be applied in the Wireless Sensor Network to provide security. On the basis of the single byte-oriented fault model, we propose a differential fault analysis on the LED cipher. The attack could recover its 64-bit...

13. A Complex Estimation Function based on Community Reputation for On-line Transaction Systems

Yu Yang, Shang-bao Gong, Yu-cui Guo, Min Lei, Yan Yang
Pages: 905 - 912
A reputation management system is crucial in online transaction systems, in which a reputation function is its central component. We propose a generalized set-theoretic reputation function in this paper, which can be configured to meet various assessment requirements of a wide range of reputation scenarios...

15. Secure Sensor Localization in Wireless Sensor Networks based on Neural Network

Ting Zhang, Jingsha He, Yang Zhang
Pages: 914 - 923
Localization of sensor nodes in wireless sensor networks (WSNs) is very important since it associates spatial context with the data collected by sensor nodes and used in applications. Rapid development of wireless sensor technologies and wide applications of wireless sensor networks have also made security...

16. Trusted Bytecode Virtual Machine Module: A Novel Method for Dynamic Remote Attestation in Cloud Computing

Songzhu Mei, Zhiying Wang, Yong Cheng, Jiangchun Ren, Jiangjiang Wu, Jie Zhou
Pages: 924 - 932
Cloud computing bring a tremendous complexity to information security. Remote attestation can be used to establish trust relationship in cloud. TBVMM is designed to extend the existing chain of trust into the software layers to support dynamic remote attestation for cloud computing. TBVMM uses Bayesian...

17. An Improved Population Migration Algorithm for Solving Multi-Objective Optimization Problems

Qian Zhao, Xueying Liu, Shujun Wei
Pages: 933 - 941
The population migration algorithm is a very effective evolutionary algorithm for solving single-objective optimization problems, but very few applications are available for solving multi-objective optimization problems (MOPs). The current study proposes an improved population migration algorithm for...

18. An Access Control Method based on Scenario Trust

Shunan Ma, Jingsha He, Xunbo Shuai
Pages: 942 - 952
Access control is an important element in network security. Meanwhile, trust provides a new direction for access control in open network environments. Based on the dynamic nature of trust, we study the temporal and spatial characteristics in the security of society and propose the concept of scenario...

19. Scalable Content Authentication in H.264/SVC Videos Using Perceptual Hashing based on Dempster-Shafer theory

Ye Dengpan, Wei Zhuo, Ding Xuhua, RobertH. Deng
Pages: 953 - 963
The content authenticity of the multimedia delivery is important issue with rapid development and widely used of multimedia technology. Till now many authentication solutions had been proposed, such as cryptology and watermarking based methods. However, in latest heterogeneous network the video stream...

20. Model Update Particle Filter for Multiple Objects Detection and Tracking

Yunji Zhao, Hailong Pei
Pages: 964 - 974
Multiple objects tracking is a challenging task. This article presents an algorithm which can detect and track multiple objects, and update target model automatically. The contributions of this paper as follow: Firstly,we also use color histogram(CH) and histogram of orientated gradients(HOG) to represent...

21. Uncertainty Multi-source Information Fusion for Intelligent Flood Risk Analysis Based on Random Set Theory

Yajuan Xie, Shanzhen Yi, Zhongqian Tang, Dengpan Ye
Pages: 975 - 984
Information fusion has been a hot topic currently, how to make information fusion for intelligent decision is a challenge. Although the applications of random set theory attract many researchers, the probability function distribution is still imprecise. In this paper, we give a new definition of probability...