251 research outputs found

    A computationally-efficient construction for the matrix-based key distribution in sensor network

    Full text link
    This paper introduces a variant for the symmetric matrix-based key distribution in sensor network introduced by Du et al. Our slight modification shows that the usage of specific structures for the public matrix instead of fully random matrix with elements in Zq\mathbb{Z}_q can reduce the computation overhead for generating the public key information and the key itself. An intensive analysis followed by modified scheme demonstrates the value of our contribution in relation with the current work and show the equivalence of the securityComment: 4 page

    Unveiling Zeus

    Full text link
    Malware family classification is an age old problem that many Anti-Virus (AV) companies have tackled. There are two common techniques used for classification, signature based and behavior based. Signature based classification uses a common sequence of bytes that appears in the binary code to identify and detect a family of malware. Behavior based classification uses artifacts created by malware during execution for identification. In this paper we report on a unique dataset we obtained from our operations and classified using several machine learning techniques using the behavior-based approach. Our main class of malware we are interested in classifying is the popular Zeus malware. For its classification we identify 65 features that are unique and robust for identifying malware families. We show that artifacts like file system, registry, and network features can be used to identify distinct malware families with high accuracy---in some cases as high as 95%.Comment: Accepted to SIMPLEX 2013 (a workshop held in conjunction with WWW 2013

    Downlink macro-diversity precoding-aided spatial modulation

    Full text link
    In this paper, a downlink macro-diversity precodingaided spatial modulation (MD-PSM) scheme is proposed, in which two base stations (BSs) communicate simultaneously with a single mobile station (MS). As such, the proposed scheme achieved twice the spectral efficiency of the conventional PSM scheme. To render the demodulation possible, the two signal constellation sets used at the two BSs should be disjoint. Also, since the two BSs use the same spatial dimension, i.e., indices of receive antennas, the Minkowski sum of the two constellation sets should include unrepeated symbols. This is achieved through rotating the constellation set used by the second BS, where the error rate is also minimized. After obtaining the optimal rotation angles for several scenarios, a reduced complexity maximum-likelihood receiver is introduced. For an equal number of transmit and receive antennas of 4 and at a target BER of 10^{-4}, the simulation results show that the proposed MD-PSM scheme outperforms the conventional PSM by about 17.3 dB and 12.4 dB, while achieving the same and double the spectral efficiency, respectively. Also, due to the distributed nature of MDPSM, it is shown that the diversity order of the novel MD-PSM scheme is twice that of the conventional PSM.Comment: 9 pages, 6 figures, 3 tables (Journal of Communications and Networks), accepted on 2017, September 1

    Mitigating the ICA Attack against Rotation Based Transformation for Privacy Preserving Clustering

    Full text link
    The rotation based transformation (RBT) for privacy preserving data mining (PPDM) is vulnerable to the independent component analysis (ICA) attack. This paper introduces a modified multiple rotation based transformation (MRBT) technique for special mining applications mitigating the ICA attack while maintaining the advantages of the RBT.Comment: 3 pages, 1 figure, appeared as a letter in ETRI journa

    Privacy Preserving Association Rule Mining Revisited

    Full text link
    The privacy preserving data mining (PPDM) has been one of the most interesting, yet challenging, research issues. In the PPDM, we seek to outsource our data for data mining tasks to a third party while maintaining its privacy. In this paper, we revise one of the recent PPDM schemes (i.e., FS) which is designed for privacy preserving association rule mining (PP-ARM). Our analysis shows some limitations of the FS scheme in term of its storage requirements guaranteeing a reasonable privacy standard and the high computation as well. On the other hand, we introduce a robust definition of privacy that considers the average case privacy and motivates the study of a weakness in the structure of FS (i.e., fake transactions filtering). In order to overcome this limit, we introduce a hybrid scheme that considers both privacy and resources guidelines. Experimental results show the efficiency of our proposed scheme over the previously introduced one and opens directions for further development.Comment: 15 pages, to appear in proceeding of WISA 200

    Fixed-complexity Sphere Encoder for Multi-user MIMO Systems

    Full text link
    In this paper, we propose a fixed-complexity sphere encoder (FSE) for multi-user MIMO (MU-MIMO) systems. The proposed FSE accomplishes a scalable tradeoff between performance and complexity. Also, because it has a parallel tree-search structure, the proposed encoder can be easily pipelined, leading to a tremendous reduction in the precoding latency. The complexity of the proposed encoder is also analyzed, and we propose two techniques that reduce it. Simulation and analytical results demonstrate that in a 4 by 4 MU-MIMO system, the proposed FSE requires only 11.5% of the computational complexity needed by the conventional QRD-M encoder (QRDM-E). Also, the encoding throughput of the proposed encoder is 7.5 times that of the QRDM-E with tolerable degradation in the BER performance, while achieving the optimum diversity order.Comment: 7 pages, 7 figures. Accepted by Journal of Communications and Network

    On Transmit Antenna Selection for Multiuser MIMO Systems with Dirty Paper Coding

    Full text link
    In this paper, we address the transmit antenna selection in multi-user MIMO systems with precoding. The optimum and reduced complexity sub-optimum antenna selection algorithms are introduced. QR-decomposition (QRD) based antenna selection is investigated and the reason behind its sub-optimality is analytically derived. We introduce the conventional QRD-based algorithm and propose an efficient QRD-based transmit antenna scheme (maxR) that is both implementation and performance efficient. Moreover, we derive explicit formulae for the computational complexities of the aforementioned algorithms. Simulation results and analysis demonstrate that the proposed maxR algorithm requires only 1% of the computational efforts required by the optimal algorithm for a degradation of 1dB and 0.1dB in the case of linear zero-forcing and Tomlinson-Harashima precoding schemes, respectively.Comment: 5 pages, 6 figures, 1 table, [The 20th Personal, Indoor and Mobile Radio Communications Symposium 2009 (PIMRC-09)

    Maximum-likelihood co-channel interference cancellation with power control for cellular OFDM networks

    Full text link
    In cellular Orthogonal Frequency Division Multiplexing (OFDM) networks, Co-Channel Interference (CCI) leads to severe degradation in the BER performance. To solve this problem, Maximum-Likelihood Estimation (MLE) CCI cancellation scheme has been proposed in the literature. MLE CCI cancellation scheme generates weighted replicas of the transmitted signals and selects replica with the smallest Euclidean distance from the received signal. When the received power of the desired and interference signals are nearly the same, the BER performance is degraded. In this paper, we propose an improved MLE CCI canceler with closed-loop Power Control (PC) scheme capable of detecting and combating against the equal received power situation at the Mobile Station (MS) receiver by using the newly introduced parameter Power Ratio (PR). At cell edge where Signal to Interferer Ratio (SIR) is considered to have average value between -5 and 10 dB, computer simulations show that the proposed closed-loop PC scheme has a gain of 7 dB at 28 km/h and about 2 dB at 120 km/h.Comment: 5 pages, 9 figures, International Symposium on Communications and Information Technologies 200

    Augmented Rotation-Based Transformation for Privacy-Preserving Data Clustering

    Full text link
    Multiple rotation-based transformation (MRBT) was introduced recently for mitigating the apriori-knowledge independent component analysis (AK-ICA) attack on rotation-based transformation (RBT), which is used for privacy-preserving data clustering. MRBT is shown to mitigate the AK-ICA attack but at the expense of data utility by not enabling conventional clustering. In this paper, we extend the MRBT scheme and introduce an augmented rotation-based transformation (ARBT) scheme that utilizes linearity of transformation and that both mitigates the AK-ICA attack and enables conventional clustering on data subsets transformed using the MRBT. In order to demonstrate the computational feasibility aspect of ARBT along with RBT and MRBT, we develop a toolkit and use it to empirically compare the different schemes of privacy-preserving data clustering based on data transformation in terms of their overhead and privacy.Comment: 11 pages, 11 figures, and 6 table

    On the achievable improvement by the linear minimum mean square error detector

    Full text link
    Linear minimum mean square error (MMSE) detector has been shown to alleviate the noise amplification problem, resulting in the conventional zero-forcing (ZF) detector. In this paper, we analyze the performance improvement by the MMSE detector in terms of the condition number of its filtering matrix, and in terms of the post-precessing signal to noise ratio (SNR) improvement. To this end, we derive explicit formulas for the condition numbers of the filtering matrices and the post-processing SNRs. Analytical and simulation results demonstrate that the improvement achieved by the MMSE detector over the ZF detector is not only dependent on the noise variance and the condition number of the channel matrix, but also on how close the smallest singular values are to the noise variance.Comment: 5 pages, 6 figures, 1 table, International Symposium on Communications and Information Technologies 200
    • …
    corecore