با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Computation partitioning for mobile cloud computing in a big data environment
پارتیشن بندی محاسبات برای محاسبات ابری سیار در یک محیط داده های بزرگ-2017 The growth of mobile cloud computing (MCC) is
challenged by the need to adapt to the resources and environment
that are available to mobile clients while addressing the dynamic
changes in network bandwidth. Big data can be handled via MCC.
In this paper, we propose a model of computation partitioning for
stateful data in the dynamic environment that will improve
performance. First, we constructed a model of stateful data
streaming and investigated the method of computation
partitioning in a dynamic environment. We developed a definition
of direction and calculation of the segmentation scheme, including
single frame data flow, task scheduling and executing efficiency.
We also defined the problem for a multi-frame data flow
calculation segmentation decision that is optimized for dynamic
conditions and provided an analysis. Second, we proposed a
computation partitioning method for single frame data flow. We
determined the data parameters of the application model, the
computation partitioning scheme, and the task and work order
data stream model. We followed the scheduling method to provide
the optimal calculation for data frame execution time after
computation partitioning and the best computation partitioning
method. Third, we explored a calculation segmentation method
for single frame data flow based on multi-frame data using
multi-frame data optimization adjustment and prediction of
future changes in network bandwidth. We were able to
demonstrate that the calculation method for multi-frame data in a
changing network bandwidth environment is more efficient than
the calculation method with the limitation of calculations for
single frame data. Finally, our research verified the effectiveness
of single frame data in the application of the data stream and
analyzed the performance of the method to optimize the
adjustment of multi-frame data. We used a mobile cloud
computing platform prototype system for face recognition to
verify the effectiveness of the method.
Index Terms: Big data | computation partitioning | data stream | dynamic environment | mobile cloud computing | stateful |
مقاله انگلیسی |
2 |
Challenges of and solution to the control load of stateful firewall in software defined networks
چالش ها و راه حل هایی برای کنترل بار فایروال دولتی در شبکه های تعریف شده توسط نرم افزار-2017 Computer Standards & Interfaces 54 (2017) 293–304 Contents lists available at ScienceDirect Computer Standards & Interfaces journal homepage: www.elsevier.com/locate/csi A R T I C L E I N F O Keywords: Software defined networking SDN security stateful firewall DoS attack A B S T R A C T Whereas SDN (Software Defined Networks) provides the opportunity for the flexibility of network configuration, the introduction of controller systems raisesnew issues about developing firewall system design, such as controller attack, rule setup, and communication overhead for control messages. Especially, the delay and overload for dynamic control of stateful firewall are serious bottlenecks. This paper examines the current challenges and their origins, and presents a comprehensive solution to the key operational steps: topology-based selective filtering rules for setup and maintenance stage, three-layer rule structure for in-switch flow tables, and controller attack protection based on adaptive host connection tracking with multiple hashing queues named Flow Tracker algorithm. The experiment results using multiple OVS switches and virtual hosts in GENI test bed demonstrate FlowTracker succeeds in monitoring all network connections and completely profiling host normal routine with acceptable latency increment (170 ms). Moreover, by utilizing multiple request queues, the proposed DoS attack detection algorithm reduce the response time to DoS 5 to 20 times less than using a single queue. Keywords:Software defined networking | SDN security | stateful firewall | DoS attack |
مقاله انگلیسی |
3 |
A potential weakness in RFID-based internet-of-things Internet-of-things systems
ضعف بالقوه در اینترنت اشیاء مبتنی بر RFID سیستم های اینترنت اشیاء-2015 Article history:Available online 11 November 2014Keywords:RFIDInternet of things Authentication Compromised readerIn recent years, a large body of research has been devoted to the security and privacy of RFID that is expected to become a critical component of IoT (Internet of Things). Most of these studies have been conducted under the assumption that an RFID system consists of the following elements: RFID tags, a reader and a back-end server. However, in IoT scenario it is supposed that a high density of RFID readers will be deployed and networked to the system over the Internet. Hence, a multi-reader RFID environment circumstance, where readers may be mobile handsets like mobile phones, should be involved in the security analysis of RFID based IoT systems. In this paper, we point out that RFID authentication protocols in the IoT need new security mechanisms that consider untrustworthy RFID entities, compromised readers or insecure communication channel between the readers and the back-end servers. Thus, traditional RFID security schemes designed for closed-loop systems cannot fulfill security and privacy demands, if they are directly adapted to the IoT environment. To emphasize this discrimination, we demonstrate that a secure protocol in a closed-loop RFID system may jeopardize the security of the system in this new RFID concept. Furthermore, we address this fault by investigating the security of a recent IoT RFID authentication protocol, named as AKE-MRFID. We exploit security flaws that have gone unnoticed in the design and present three attacks: de-synchronization, replay and reader impersonation attacks. To defend against the aforementioned attacks, we amend the protocol with a stateful variant so that it holds the claimed security properties.© 2014 Elsevier B.V. All rights reserved.
Keywords: RFID | Internet of things | Authentication | Compromised reader |
مقاله انگلیسی |