The search functionality is under construction.

Keyword Search Result

[Keyword] CGA(6hit)

1-6hit
  • ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6

    Ilsun YOU  Jong-Hyouk LEE  Kouichi SAKURAI  Yoshiaki HORI  

     
    PAPER

      Vol:
    E93-D No:5
      Page(s):
    1096-1105

    Fast Handover for Hierarchical Mobile IPv6 (F-HMIPv6) that combines advantages of Fast Handover for Mobile IPv6 (FMIPv6) and Hierarchical Mobile IPv6 (HMIPv6) achieves the superior performance in terms of handover latency and signaling overhead compared with previously developed mobility protocols. However, without being secured, F-HMIPv6 is vulnerable to various security threats. In 2007, Kang and Park proposed a security scheme, which is seamlessly integrated into F-HMIPv6. In this paper, we reveal that Kang-Park's scheme cannot defend against the Denial of Service (DoS) and redirect attacks while largely relying on the group key. Then, we propose an Enhanced Security Scheme for F-HMIPv6 (ESS-FH) that achieves the strong key exchange and the key independence as well as addresses the weaknesses of Kang-Park's scheme. More importantly, it enables fast handover between different MAP domains. The proposed scheme is formally verified based on BAN-logic, and its handover latency is analyzed and compared with that of Kang-Park's scheme.

  • Security-Enhanced Fast Mobile IPv6 Handover

    Chang-Seop PARK  

     
    LETTER-Internet

      Vol:
    E93-B No:1
      Page(s):
    178-181

    Motivated by the fact that the existing FMIPv6 security scheme has several weaknesses in terms of security and efficiency, we propose a security-enhanced fast mobile IPv6 in this letter. Based on the concept of a secret key-based CGA (Cryptographically Generated Address), we show how to establish a new security association between the MN and AR (Access Router) whenever a handover occurs. We also show that the proposed scheme is robust against several types of security attacks feasible with the existing scheme. Our scheme is more efficient in that it requires fewer public key operations.

  • A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6

    Ilsun YOU  Kouichi SAKURAI  Yoshiaki HORI  

     
    LETTER-Internet

      Vol:
    E92-B No:6
      Page(s):
    2287-2290

    Recently, the security scheme, proposed by Kempf and Koodli, has been adopted as a security standard for Fast handover for Mobile IPv6. But, it does not prevent denial of service attacks while resulting in high computation cost. More importantly, we find that it is still vulnerable to redirection attacks because it fails to secure the Unsolicited Neighbor Advertisement messages. In this paper, Kempf-Koodli's scheme is formally analyzed through BAN-logic and its weaknesses are demonstrated.

  • Metaheuristic Optimization Algorithms for Texture Classification Using Multichannel Approaches

    Jing-Wein WANG  

     
    PAPER-Image

      Vol:
    E87-A No:7
      Page(s):
    1810-1821

    This paper proposes the use of the ratio of wavelet extrema numbers taken from the horizontal and vertical counts respectively as a texture feature, which is called aspect ratio of extrema number (AREN). We formulate the classification problem upon natural and synthesized texture images as an optimization problem and develop a coevolving approach to select both scalar wavelet and multiwavelet feature spaces of greater discriminatory power. Sequential searches and genetic algorithms (GAs) are comparatively investigated. The experiments using wavelet packet decompositions with the innovative packet-tree selection scheme ascertain that the classification accuracy of coevolutionary genetic algorithms (CGAs) is acceptable enough.

  • Blurred Image Restoration by Using Real-Coded Genetic Algorithm

    Hideto NISHIKADO  Hiroyuki MURATA  Motonori YAMAJI  Hironori YAMAUCHI  

     
    PAPER-Digital Signal Processing

      Vol:
    E85-A No:9
      Page(s):
    2118-2126

    A new blind restoration method applying Real-coded genetic algorithm (RcGA) will be proposed, and this method will be proven valid for the blurred image restoration with unidentified degradation in the experiments. In this restoration method, the degraded and blurred image is going to get restricted to the images possible to be expressed in the point spread function (PSF), then the restoration filter for this degraded image, which is also the 2-dimentional inverse filter, will be searched among several points applying RcGA. The method will enable to seek efficiently among vast solution space consists of numeral coefficient filters. And perceiving the essential features of the spectrum in the frequency space, an evaluation function will be proposed. Also, it will be proposed to apply the Rolling-ball transform succeeding an appropriate Gaussian degrade function against the dual degraded image with blur convoluting impulse noise. By above stated features of this restoration method, it will enable to restore the degraded image closer to the original within a practical processing time. Computer simulations verify this method for image restoration problem when the factors causing image distortions are not identified.

  • A Study on Improving the Convergence of the Real-Coded Genetic Algorithm for Electromagnetic Inverse Scattering of Multiple Perfectly Conducting Cylinders

    Anyong QING  Ching Kwang LEE  

     
    PAPER-Electromagnetic Theory

      Vol:
    E85-C No:7
      Page(s):
    1460-1471

    A study on improving the performance of the real-coded genetic algorithm for electromagnetic inverse scattering of two-dimensional perfectly conducting cylinders is presented. Three schemes, namely, the penalty function approach, the closed cubic B-splines local shape function approach and the adaptive hybrid algorithm approach are proposed to deal with the problem. These schemes can be used separately or be combined to improve the performance. Numerical examples validate the schemes.