International Journal of Computational Intelligence Systems

ISSN: 1875-6883
Volume 5, Issue 5, September 2012
Ling-xi Peng, Dong-qing Xie, Ying Gao, Wen-bin Chen, Fu-fang Li, Wu Wen, Jue Wu
Pages: 808 - 815
An immune-inspired adaptive automated intrusion response system model, named as , is proposed. The descriptions of self, non-self, immunocyte, memory detector, mature detector and immature detector of the network transactions, and the realtime network danger evaluation equations are given. Then, the...
Liu Ya-li, Qin Xiao-lin, Li Bo-han, Liu Liang
Pages: 824 - 833
Designing secure and robust grouping-proof protocols based on RFID characteristics becomes a hotspot in the research of security in Internet of Things (IOT). The proposed grouping-proof protocols recently have security and/or privacy omission and these schemes afford order-dependence by relaying message...
Min Lei, Hai-peng Peng, Chun-yu Yang, Li-xiang Li
Pages: 834 - 840
Chaotic synchronization, as a key technique of chaotic secure communication, has received much attention in recent years. This paper proposes a nonlinear synchronization scheme for the time-delay chaotic system in the presence of noise. In this scheme, an integrator is introduced to suppress the influence...
Hai-yang Hu, Zhong-jin Li, Li-guo Huang, Hua Hu
Pages: 841 - 850
A Peer-to-Peer (P2P) system relies on the cooperation of the peers and the contributions of their resources. To motivate autonomous peers share their resources, the system needs to support effective resource allocation strategies with respect to peers’ task priorities, and their personal information...
Jian-feng Lu, Jian-min Han, Wei Chen, Jin-Wei Hu
Pages: 860 - 867
This paper introduces the notion of safety and availability checking for user authorization query processing, and develop a recursive algorithm use the ideas from backtracking-based search techniques to search for the optimal solution. For the availability checking, we introduce the notion of max activatable...
Ming Wan, Ying Liu, Jian-qiang Tang, Hong-ke Zhang, Si-yu Lin
Pages: 868 - 877
As a basic prerequisite for worm detection based on computational intelligence in networks with locator/identifier separation, it is well worth considering the influence on worm propagation due to the incoming locator/identifier separation. In this paper, according to the characteristics of locator/identifier...
Liang-yu Luan, Ying-fang Fu, Peng Xiao, Ling-xi Peng
Pages: 878 - 886
Wormhole attacks, as a devastating type of threats in wireless mesh networks, have received much attention in recent years. This paper proposes a type of wormhole attack model and its corresponding detection scheme. In this scheme, the combination of a number of techniques, such as distributed voting,...
Wei Li, Da-wu Gu, Xiao-ling Xia, Chen Zhao, Zhi-qiang Liu, Ya Liu, Qing-ju Wang
Pages: 896 - 904
The LED is a new lightweight cipher, which was published in CHES 2011. This cipher could be applied in the Wireless Sensor Network to provide security. On the basis of the single byte-oriented fault model, we propose a differential fault analysis on the LED cipher. The attack could recover its 64-bit...
Songzhu Mei, Zhiying Wang, Yong Cheng, Jiangchun Ren, Jiangjiang Wu, Jie Zhou
Pages: 924 - 932
Cloud computing bring a tremendous complexity to information security. Remote attestation can be used to establish trust relationship in cloud. TBVMM is designed to extend the existing chain of trust into the software layers to support dynamic remote attestation for cloud computing. TBVMM uses Bayesian...
Shunan Ma, Jingsha He, Xunbo Shuai
Pages: 942 - 952
Access control is an important element in network security. Meanwhile, trust provides a new direction for access control in open network environments. Based on the dynamic nature of trust, we study the temporal and spatial characteristics in the security of society and propose the concept of scenario...
Yajuan Xie, Shanzhen Yi, Zhongqian Tang, Dengpan Ye
Pages: 975 - 984
Information fusion has been a hot topic currently, how to make information fusion for intelligent decision is a challenge. Although the applications of random set theory attract many researchers, the probability function distribution is still imprecise. In this paper, we give a new definition of probability...