International conference on security and privacy in communication networks 10th international icst c

Page 1


Visit to download the full and correct content document: https://textbookfull.com/product/international-conference-on-security-and-privacy-in-c ommunication-networks-10th-international-icst-conference-securecomm-2014-beijingchina-september-24-26-2014-revised-selected-papers-part-ii-1st-edi/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

International Conference on Security and Privacy in Communication Networks 10th International ICST Conference SecureComm 2014 Beijing China September 24 26 2014 Revised Selected Papers Part I 1st Edition Jing

Tian https://textbookfull.com/product/international-conference-onsecurity-and-privacy-in-communication-networks-10thinternational-icst-conference-securecomm-2014-beijing-chinaseptember-24-26-2014-revised-selected-papers-part-i-1st-edit/

Security and Privacy in Communication Networks 9th International ICST Conference SecureComm 2013 Sydney NSW Australia September 25 28 2013 Revised Selected Papers 1st Edition Eirini Karapistoli

https://textbookfull.com/product/security-and-privacy-incommunication-networks-9th-international-icst-conferencesecurecomm-2013-sydney-nsw-australiaseptember-25-28-2013-revised-selected-papers-1st-edition-eirinikarapistoli/

Information Security and Cryptology 10th International Conference Inscrypt 2014 Beijing China December 13 15 2014 Revised Selected Papers 1st Edition Dongdai Lin

https://textbookfull.com/product/information-security-andcryptology-10th-international-conference-inscrypt-2014-beijingchina-december-13-15-2014-revised-selected-papers-1st-editiondongdai-lin/

Ad Hoc Networks 6th International ICST Conference

ADHOCNETS 2014 Rhodes Greece August 18 19 2014 Revised Selected Papers 1st Edition Natalie Mitton

https://textbookfull.com/product/ad-hoc-networks-6thinternational-icst-conference-adhocnets-2014-rhodes-greeceaugust-18-19-2014-revised-selected-papers-1st-edition-nataliemitton/

Security and Privacy in Communication Networks 14th

International Conference SecureComm 2018 Singapore Singapore August 8 10 2018 Proceedings Part II Raheem Beyah

https://textbookfull.com/product/security-and-privacy-incommunication-networks-14th-international-conferencesecurecomm-2018-singapore-singapore-august-8-10-2018-proceedingspart-ii-raheem-beyah/

Scalable Information Systems 5th

International

Conference INFOSCALE 2014 Seoul South Korea September 25 26 2014 Revised Selected Papers 1st Edition Jason J. Jung

https://textbookfull.com/product/scalable-informationsystems-5th-international-conference-infoscale-2014-seoul-southkorea-september-25-26-2014-revised-selected-papers-1st-editionjason-j-jung/

Security and Privacy in Communication Networks 15th EAI

International Conference SecureComm 2019 Orlando FL USA October 23 25 2019 Proceedings Part II Songqing Chen

https://textbookfull.com/product/security-and-privacy-incommunication-networks-15th-eai-international-conferencesecurecomm-2019-orlando-fl-usa-october-23-25-2019-proceedingspart-ii-songqing-chen/

Security and Privacy in Communication Networks 16th

EAI

International Conference SecureComm 2020 Washington DC USA October 21 23 2020 Proceedings Part II Noseong Park

https://textbookfull.com/product/security-and-privacy-incommunication-networks-16th-eai-international-conferencesecurecomm-2020-washington-dc-usa-october-21-23-2020-proceedingspart-ii-noseong-park/

Lightweight Cryptography for Security and Privacy Third

International Workshop LightSec 2014 Istanbul Turkey September 1 2 2014 Revised Selected Papers 1st Edition Thomas Eisenbarth

https://textbookfull.com/product/lightweight-cryptography-forsecurity-and-privacy-third-international-workshoplightsec-2014-istanbul-turkey-september-1-2-2014-revisedselected-papers-1st-edition-thomas-eisenbarth/

International Conference on Security and Privacy in Communication Networks

10th International ICST Conference, SecureComm 2014 Beijing, China, September 24–26, 2014

Revised Selected Papers, Part II

LectureNotesoftheInstitute forComputerSciences,SocialInformatics

andTelecommunicationsEngineering153

EditorialBoard

OzgurAkan

MiddleEastTechnicalUniversity,Ankara,Turkey

PaoloBellavista

UniversityofBologna,Bologna,Italy

JiannongCao

HongKongPolytechnicUniversity,HongKong,HongKong

FalkoDressler

UniversityofErlangen,Erlangen,Germany

DomenicoFerrari

Università CattolicaPiacenza,Piacenza,Italy

MarioGerla UCLA,LosAngels,USA

HisashiKobayashi

PrincetonUniversity,Princeton,USA

SergioPalazzo

UniversityofCatania,Catania,Italy

SartajSahni

UniversityofFlorida,Florida,USA

Xuemin(Sherman)Shen

UniversityofWaterloo,Waterloo,Canada

MirceaStan UniversityofVirginia,Charlottesville,USA

JiaXiaohua

CityUniversityofHongKong,Kowloon,HongKong

AlbertZomaya

UniversityofSydney,Sydney,Australia

GeoffreyCoulson

LancasterUniversity,Lancaster,UK

Moreinformationaboutthisseriesathttp://www.springer.com/series/8197

JingTian • JiwuJing

MudhakarSrivatsa(Eds.)

10thInternationalICSTConference,SecureComm2014

Beijing,China,September24–26,2014

RevisedSelectedPapers,PartII

Editors JingTian

InstituteofInformationEngineering,CAS

Beijing China

JiwuJing

InstituteofInformationEngineering,CAS

Beijing China

MudhakarSrivatsa

NewYork,NY USA

ISSN1867-8211

ISSN1867-822X(electronic)

LectureNotesoftheInstituteforComputerSciences,SocialInformatics andTelecommunicationsEngineering

ISBN978-3-319-23801-2ISBN978-3-319-23802-9(eBook) DOI10.1007/978-3-319-23802-9

LibraryofCongressControlNumber:2015948720

SpringerChamHeidelbergNewYorkDordrechtLondon © InstituteforComputerSciences,SocialInformaticsandTelecommunicationsEngineering2015 Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped.

Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse.

Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors giveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforanyerrorsor omissionsthatmayhavebeenmade.

Printedonacid-freepaper

SpringerInternationalPublishingAGSwitzerlandispartofSpringerScience+BusinessMedia (www.springer.com)

Preface

Thisvolumecontainspaperspresentedatthe10thInternationalConferenceonSecurity andPrivacyinCommunicationNetworks,heldinBeijing,China,duringSeptember 24–26,2014.TheconferencewasorganizedbytheInstituteofInformationEngineering,ChineseAcademyofSciences,China.

Themaintrackreceived98submissions,andafteradoublyanonymousreview process,27regularpapersand17shortpapersofhighqualitywereselected.Thebook alsoincludes22papersacceptedforfourworkshops(ATCS,SSS,SLSS,andDAPRO) inconjunctionwiththeconference,6doctoralsymposiumpapers,and8posters.We werehelpedby42ProgramCommitteemembersforthemaintrack.Inthisrespect, specialthanksareduetotheTPCmembersfortheirhandlingofthechallenging,heavy, andrewardingtaskofselectingthepaperstobeincludedintheproceedings.

Thisvolumehighlightsandaddressesseveralkeychallengesintheareaofsecurity andprivacyinnetworks.Thepapershavebeengroupedintothefollowingtopics:

SecurityandPrivacyinWired,Wireless,Mobile,Hybrid,Sensor,andAdHoc Networks;

– NetworkIntrusionDetectionandPrevention,Firewalls,andPacketFilters;

– Malware,Botnets,andDistributedDenialofService;

– CommunicationPrivacyandAnonymity;

– NetworkandInternetForensicsTechniques;

– PublicKeyInfrastructures,KeyManagement,andCredentialManagement;

– SecureRouting,Naming/Addressing,andNetworkManagement;

– SecurityandPrivacyinPervasiveandUbiquitousComputing,e.g.,RFIDs;

– SecurityandPrivacyforEmergingTechnologies:VoIP,Peer-to-PeerandOverlay NetworkSystems;

– SecurityandIsolationinDataCenterNetworks;

– SecurityandIsolationinSoftwareDefinedNetworking.

Theaudienceofthisvolumemayincludeprofessors,researchers,graduatestudents, andprofessionalsintheareasofnetworksecurity,cryptology,informationprivacyand assurance,aswellasnetworkandInternetforensicstechniques.Thebookalso addressesadministrators,programmers,ITmanagers,orjustreaderswhocannotprotectthemselvesiftheydonotknowtheprotectiontechniquesofnetworkandprivacy.

January2015 JiwuJing

Organization

SecureComm2014wasorganizedbytheInstituteofInformationEngineering,Chinese AcademyofSciences,incooperationwiththeEuropeanAllianceforInnovation(EAI).

GeneralChair

JingTian InstituteofInformationEngineering,CAS,China

ProgramChairs

JiwuJing InstituteofInformationEngineering,CAS,China

MudhakarSrivatsaIBMT.J.WatsonResearchCenter,USA

IndustryTrackChairs

YafeiWu StateInformationCenter,China

TomQuillin IntelCorporation,USA

WorkshopsChair

DebinGao SingaporeManagementUniversity,Singapore

PublicityChairs

ShaobinWang IntelCorporation,USA

SteveFurnell PlymouthUniversity,UK

PublicationsChair

Wen-TaoZhu InstituteofInformationEngineering,CAS,China

WebChair

JiXiang InstituteofInformationEngineering,CAS,China

LocalArrangementCommittee

LiminLiu(Chair) InstituteofInformationEngineering,CAS,China

YuhanWang InstituteofInformationEngineering,CAS,China

RuiWang InstituteofInformationEngineering,CAS,China

QiyuanGuo StateInformationCenter,China

ProgramCommitteeMembers

JohnC.S.Lui

TheChineseUniversityofHongKong,China

DanfengYao VirginiaTech,USA

GabrieleOligeri UniversityofTrento,Italy

GildasAvoine UCL,Belgium

GuofeiGu TexasA&MUniversity,USA

PeterGutmann UniversityofAuckland,NewZealand

HengYin SyracuseUniversity,USA

UrsHengartner UniversityofWaterloo,Canada

AldarC.-F.Chan InstituteforInfocommResearch,Singapore

MengjunXie UniversityofArkansasatLittleRock,USA

YingZhang EricssonResearch,USA

PierangelaSamaratiUniversityofMilan,Italy

SencunZhu PennsylvaniaStateUniversity,USA

AngeloSpognardi InstituteofInformaticsandTelematics,CNR,Italy

SusanneWetzel StevensInstituteofTechnology,USA

NinoVerde UniversityofRomaTre,Italy

TamVu UniversityofColorado,USA

XinyuanWang GeorgeMasonUniversity,USA

YiMu UniversityofWollongong,Australia

PeterReiher UniversityofCalifornia,LosAngeles,USA

GeorgiosPortokalidisStevensInstituteofTechnology,USA

KuiRen UniversityofBuffalo,USA

RobertoDiPietro UniversityofRomaTre,Italy

SankardasRoy KansasStateUniversity,USA

GiovanniRussello UniversityofAuckland,NewZealand

KasperBonneRasmussenUniversityofCaliforniaatIrvine,USA

JavierLopez UniversityofMalaga,Spain

Jean-PierreSeifert TelekomInnovationLaboratories,Germany

KunBai IBMT.J.WatsonResearchCenter,USA

PatrickLee TheChineseUniversityofHongKong,China

BaselAlomair UniversityofWashington,USA

ChristopheBidan Supelec,France

DavidChadwick UniversityofKent,UK

ClaudioSoriente ETHZürich,Switzerland

MohamedAliKaafarNICTA,Australia

RavishankarBorgaonkarTelekomInnovationLaboratories,Germany

LeiHu InstituteofInformationEngineering,CAS,China

KapilSingh IBMT.J.WatsonResearchCenter,USA

JinpengWei FloridaInternationalUniversity,USA

JingqiangLin InstituteofInformationEngineering,CAS,China

ShengzhiZhang FloridaInstituteofTechnology,USA

Wen-TaoZhu InstituteofInformationEngineering,CAS,China

SteeringCommittee

PengLiu(Chair) PennsylvaniaStateUniversity,USA ImrichChlamtac(Co-chair)Create-Net,Italy GuofeiGu(Co-chair)TexasA&MUniversity,USA KrishnaMoorthySivalingamIITMadras,India

SponsoringInstitutions

InstituteofInformationEngineering,CAS,China DataAssuranceandCommunicationSecurityResearchCenter,CAS,China StateKeyLaboratoryofInformationSecurity,China ChineseAcademyofSciences,China NationalNaturalScienceFoundationofChina,China InformationSecurityResearch&ServiceInstitutionofStateInformationCenter,China BaiduCorporation,China

Contents – PartII

DoctoralSymposium

APerformanceComparisonStudyofaCoverage-PreservingNode SchedulingSchemeandItsEnhancementinSensorNetworks...........3 QunWang,HuanyanQian,PeiyuJi,YuXie,andShuhuiYang

AnImprovedAuthorizationModelinTrustNetwork..................10 XianmingGao,XiaozheZhang,BaoshengWang,andHuitingShi

KEMF:KeyManagementforFederatedSensorNetworks..............17 PiersO’Hanlon,JossWright,IanBrown,andTuliodeSouza

CPS2 :AContextualPrivacyFrameworkforSocialSoftware............25 RulaSayaf,DaveClarke,andRichardHarper

AreYouReallyMyFriend?ExactlySpatiotemporalMatchingScheme inPrivacy-AwareMobileSocialNetworks.........................33 BenNiu,XiuguangLi,XiaoyanZhu,XiaoqingLi,andHuiLi

RFIDAuthenticationProtocolResistanttotheMan-in-the-MiddleAttack....41 LiZhaiandChuanKunWu

IntrusionDetection

METIS:ATwo-TierIntrusionDetectionSystemforAdvanced MeteringInfrastructures......................................51 VincenzoGulisano,MagnusAlmgren,andMarinaPapatriantafilou

OnlineDetectionofConcurrentPrefixHijacks......................69 ShenSu,BeichuanZhang,andBinxingFang

CountermeasuresforMitigatingICNRoutingRelatedDDoSAttacks......84 EslamG.AbdAllah,MohammadZulkernine,andHossamS.Hassanein

ANewAnomalyDetectionMethodBasedonIGTEandIGFE...........93 ZiyuWang,JiahaiYang,andFuliangLi

InternationalWorkshoponApplicationsandTechnologies inCyberSecurity(ATCS)

ForensicPotentialsofSolidStateDrives..........................113 ZubairShah,AbdunNaserMahmood,andJillSlay

CloudSecurityfromUsersPointofView:APragmaticStudy withThematicAnalysis......................................127 SairaSyedandQuaziMamun

ASecureRealTimeDataProcessingFrameworkforPersonallyControlled ElectronicHealthRecord(PCEHR)System........................141 KhandakarRabbi,MohammedKaosar,MdRafiqulIslam, andQuaziMamun

NovelIterativeMin-MaxClusteringtoMinimizeInformationLoss inStatisticalDisclosureControl................................157 AbdunNaserMahmood,MdEnamulKabir,andAbdulK.Mustafa

SecuringSensorNetworksbyModeratingFrequencies................173 PinakiSarkar,PriyatoshMahish,MorshedUddinChowdhury, andKouichiSakurai

IntelligentFinancialFraudDetectionPractices:AnInvestigation..........186 JarrodWest,MaumitaBhattacharya,andRafiqulIslam

NetworkTrafficPatternAnalysisUsingImprovedInformationTheoretic Co-clusteringBasedCollectiveAnomalyDetection...................204 MohiuddinAhmedandAbdunNaserMahmood

ASurveyonMiningProgram-GraphFeaturesforMalwareAnalysis.......220 Md.SaifulIslam,Md.RafiqulIslam,A.S.M.Kayes,ChengfeiLiu, andIrfanAltas

DefenceAgainstCodeInjectionAttacks..........................237 HusseinAlnabulsi,QuaziMamun,RafiqulIslam, andMorshedU.Chowdhury

FalseDataInjectionAttackTargetingtheLTCTransformerstoDisrupt SmartGridOperation.......................................252 AdnanAnwar,AbdunNaserMahmood,andMohiuddinAhmed

ADomain-BasedMulti-clusterSIPSolutionforMobileAdHocNetwork...267 Ala‘ AburummanandKim-KwangRaymondChoo

DAPRO2014andSSS2014InternationalWorkshoponDataProtection inMobileandPervasiveComputing(DAPRO)InternationalWorkshop onSecureSmartSystems(SSS)

virtio-ct:ASecureCryptographicTokenServiceinHypervisors..........285 LeGuan,FengjunLi,JiwuJing,JingWang,andZiqiangMa

BlindFormatStringAttacks...................................301 FatihKilic,ThomasKittel,andClaudiaEckert

AnEmpiricalEvaluationofSoftwareObfuscationTechniquesApplied toAndroidAPKs..........................................315 FelixC.Freiling,MykolaProtsenko,andYanZhuang

TowardsPrivacy-PreservingWebMeteringviaUser-CentricHardware.....329 FahadAlarifiandMaribelFernández

TowardsEfficientUpdateofAccessControlPolicyforCryptographic CloudStorage.............................................341 WeiyuJiang,ZhanWang,LiminLiu,andNengGao

InternationalWorkshoponSystemLevelSecurityofSmartphones

UncoveringtheDilemmasonAntivirusSoftwareDesigninModernMobile Platforms................................................359 HeqingHuang,KaiChen,PengLiu,SencunZhu,andDinghaoWu

TransplantationAttack:AnalysisandPrediction.....................367 ZhongwenZhang,JiXiang,LeiWang,andLingguangLei

Timing-BasedCloneDetectiononAndroidMarkets..................375 YingjunZhang,KezhenHuang,YulingLiu,KaiChen,LiangHuang, andYifengLian

ANewTrustChainSecurityEvaluationModelandTool...............382 WeiHu,DongyaoJi,TingWang,andGangYao

ASystemforPrivacyInformationAnalysisandSafetyAssessment ofiOSApplications.........................................392 BinLiandZhijieFeng

HowWeFoundTheseVulnerabilitiesinAndroidApplications...........399 BinMa

Contents – PartI

CloudComputingSecurity

InferringtheStealthyBridgesBetweenEnterpriseNetworkIslands inCloudUsingCross-LayerBayesianNetworks.....................3 XiaoyanSun,JunDai,AnoopSinghal,andPengLiu

ASecureArchitectureforInter-cloudVirtualMachineMigration.........24 TayyabaZeb,AbdulGhafoor,AwaisShibli,andMuhammadYousaf

STRE:Privacy-PreservingStorageandRetrievaloverMultipleClouds.....36 JingweiLi,DanLin,AnnaSquicciarini,andChunfuJia

AnEffectiveSearchSchemeBasedonSemanticTreeOverEncrypted CloudDataSupportingVerifiability.............................45 ZhangjieFu,JiangangShu,andXingmingSun

PolicyDrivenNodeSelectioninMapReduce.......................55 AnnaC.Squicciarini,DanLin,SmithaSundareswaran,andJingweiLi

AuthenticationandIdentity

GridMap:EnhancedSecurityinCued-RecallGraphicalPasswords........75 NicolasVanBalenandHainingWang

UAuth:AStrongAuthenticationMethodfromPersonalDevices toMulti-accounts..........................................95 YazheWang,MingmingHu,andChenLi

TPM-BasedAuthenticationMechanismforApacheHadoop.............105 IssaKhalil,ZuochaoDou,andAbdallahKhreishah

AnAuthenticationandKeyManagementSchemeforHeterogeneous SensorNetworks...........................................123 SarmadullahKhan,RafiullahKhan,InamBari,andNaveedJan

SocialAuthenticationIdentity:AnAlternatetoInternetRealNameSystem...132 ChengchengShao,LiangChen,ShuoFan,andXinwenJiang OntheUsabilityofTwo-FactorAuthentication......................141 DingWangandPingWang

NetworkSecurity

SecuringResourceDiscoveryinContentHostingNetworks.............153 SushamaKarumanchi,JingweiLi,andAnnaSquicciarini

DetectionofBotnetCommandandControlTrafficbytheIdentification ofUntrustedDestinations.....................................174 PieterBurghouwt,MarcelSpruit,andHenkSips

KeeptheFakesOut:DefendingAgainstSybilAttackinP2PSystems......183 KanChen,PeidongZhu,andYueshanXiong

PrivacyandWirelessSecurity

AnonymousPublish-SubscribeSystems...........................195 BinhVoandStevenBellovin

FriendlyJammingforSecureLocalizationinVehicularTransportation.....212 BhaswatiDeka,RyanM.Gerdes,MingLi,andKevinHeaslip

Visual-AssistedWormholeAttackDetectionforWirelessSensorNetworks.....222 EiriniKarapistoli,PanagiotisSarigiannidis, andAnastasiosA.Economides

ImplementinganAffordableandEffectiveGSMIMSICatcher with3GAuthentication......................................239 MaxSuraev

SystemandSoftwareSecurity

ASimpleandNovelTechniqueforCounteractingExploitKits...........259 ByunghoMinandVijayVaradharajan

PolicyEnforcementPointModel................................278 YosraBenMustapha,Hervé Debar,andGregoryBlanc

ControlFlowObfuscationUsingNeuralNetworktoFightConcolicTesting...287 HaoyuMa,XinjieMa,WeijieLiu,ZhipengHuang,DebinGao, andChunfuJia

EFS:EfficientandFault-ScalableByzantineFaultTolerantSystems AgainstFaultyClients.......................................305 QuanweiCai,JingqiangLin,FengjunLi,QiongxiaoWang, andDarenZha

SCADS:SeparatedControl-andData-Stacks.......................323 ChristopherKuglerandTiloMüller

Crypto

ImprovingtheSecurityoftheHMQVProtocol UsingTamper-ProofHardware.................................343 QianyingZhang,ShijunZhao,YuQin,andDengguoFeng

TST:ANewRandomnessTestMethodBasedonCoupon Collector ’sProblem.........................................362 QinglongZhang,ZongbinLiu,QuanweiCai,andJiXiang

Tree-BasedMulti-dimensionalRangeSearchonEncryptedData withEnhancedPrivacy......................................374 BoyangWang,YantianHou,MingLi,HaitaoWang,HuiLi, andFenghuaLi

HardwareImplementationofCryptographicHashFunction BasedonSpatiotemporalChaos................................395 YulingLuo,JunxiuLiu,LvchenCao,JinjieBi,andSenhuiQiu

AnInformation-TheoreticApproachforSecureProtocolComposition......405 Yi-TingChiang,Tsan-ShengHsu,Churn-JungLiau,Yun-ChingLiu, Chih-HaoShen,Da-WeiWang,andJustinZhan

MobileSecurity

TowardsaSystematicStudyoftheCovertChannelAttacksinSmartphones...427 SwarupChandra,ZhiqiangLin,AshishKundu,andLatifurKhan

DroidKin:LightweightDetectionofAndroidAppsSimilarity............436 HugoGonzalez,NataliaStakhanova,andAliA.Ghorbani

DetectingMaliciousBehaviorsinRepackagedAndroidApps withLoosely-CoupledPayloadsFilteringScheme....................454 LuluZhang,YongzhengZhang,andTianningZang

DefendingBlindDDoSAttackonSDNBasedonMovingTargetDefense...463 DuoheMa,ZhenXu,andDongdaiLin

FunctionEscalationAttack....................................481 ChenCao,YuqingZhang,QixuLiu,andKaiWang

RAMSES:RevealingAndroidMalwareThroughStringExtraction andSelection.............................................498 LautaroDolberg,QuentinJérôme,JérômeFrançois,RaduState, andThomasEngel

DetectingMobileMalwarewithTMSVM.........................507 XiXiao,XianniXiao,YongJiang,andQingLi

Posters

ResearchonCredibleRegulationMechanismfortheTrading ofDigitalWorks...........................................519 GuozhenShi,YingShen,FenghuaLi,MangSu,andDongLiu

CoordinationandConcurrencyAwareLikelihoodAssessment ofSimultaneousAttacks......................................524

LéaSamarji,NoraCuppens-Boulahia,FrédéricCuppens, SergePapillon,WaelKanoun,andSamuelDubus

DomainAlgorithmicallyGeneratedBotnetDetectionandAnalysis........530 XiaolinXu,YonglinZhou,andQingshanLi

TowardsImprovingServiceAccessibilitybyAdaptiveResource DistributionStrategy........................................535

JinqiaoShi,XiaoWang,BinxingFang,QingfengTan,andLiGuo

HybridDetectionUsingPermissionAnalysisforAndroidMalware........541 HaofengJiao,XiaohongLi,LeiZhang,GuangquanXu, andZhiyongFeng

ContentSecuritySchemeforContentCentricNetworks................546 FawadKhan,SarmadUllahKhan,andInamBari

DetectionofFoodSafetyTopicsBasedonSPLDAs..................551 JinshuoLiu,YaboLi,YingyuePeng,JuanDeng,andXinChen

PlatformNeutralSandboxforAnalyzingMalwareandResource HoggerApps.............................................556 ParvezFaruki,VijayKumar,AmmarB.,M.S.Gaur,VijayLaxmi, andMauroConti

WebSecurity

JumpBox – ASeamlessBrowserProxyforTorPluggableTransports......563 JeroenMassar,IanMason,LindaBriesemeister, andVinodYegneswaran

AbusingBrowserAddressBarforFunandProfit -AnEmpirical InvestigationofAdd-OnCrossSiteScriptingAttacks ..................582 YinzhiCao,ChaoYang,VaibhavRastogi,YanChen,andGuofeiGu

CharacterizingGoogleHacking:AFirstLarge-ScaleQuantitativeStudy....602 JialongZhang,JayantNotani,andGuofeiGu

DetectingMaliciousSessionsThroughTrafficFingerprintingUsingHidden MarkovModels...........................................623 SamiZhioua,AdneneBenJabeur,MahjoubLangar,andWaelIlahi

AuthorIndex

DoctoralSymposium

A Performance Comparison Study of a Coverage-Preserving

Node Scheduling Scheme and Its Enhancement in Sensor Networks

1 Nanjing University of Science and Technology, Nanjing 210094, China hyqian@mail.njust.edu.cn, xieyuwh@163.com

2 Jiangsu Police Institute, Nanjing 210031, China {wqun,jipeiyu}@jspi.edu.cn

3 Purdue University Calumet, Hammond, IN 46323, USA yang246@purdue.edu

Abstract. In large wireless sensor networks composed of large numbers of lowpowered unreliable sensors, one of the most important issues is saving and balancing the energy consumption of sensors to prolong the life time of the network while maintaining the full sensing coverage. In this paper, we analyze an efficient node scheduling scheme which uses the coverage-based off-duty eligibility rule and backoff-based self-scheduling scheme to perform the job. We give some enhancement to this node scheduling scheme, reducing its overhead without losing much of the capability. In simulation, we make the performance comparison from several aspects of the original coverage-based node scheduling scheme and our enhancement version.

Keywords: Coverage · Node scheduling · Sponsored area · Wireless sensor networks

1Introduction

Recently there is a huge improvement in the affordable and efficient integrated electronic devices, which leads to the advancing of large wireless sensor networks. Sensor networks [1–3] are usually composed of large numbers of randomly deployed stationary sensors. These sensors are designed to perform information collection task. The data collected will finally be gathered and sent to the users via wireless channel. Sensor networks are the basic platform of a broad range of applications related to national security, surveillance, military, health care, and environmental monitoring. In sensor networks, sensing coverage is the area or discrete points of the target field which could be sensed by a predefined number of sensors [4, 5]. In this paper, we will assume the coverage to be only area coverage. A critical issue of the design of sensor networks is the energy consumption problem, which is how to scheduling the sensor nodes to save their scarce power and prolong the life time of the whole network while maintaining the desired degree of sensing coverage which is an important QoS measurement.

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015 J. Tian et al. (Eds.): SecureComm 2014, Part II, LNICST 153, pp. 3–9, 2015.

DOI: 10.1007/978-3-319-23802-9_1

In most cases, the density of sensor nodes in a sensor network is much higher than needed [6]. This redundancy can be used to prolong the life time of the network. The whole sensing period of the network can be divided into rounds by making the sensors take turns to work. The non-working nodes are put into sleep mode to save energy, thus the network’s life time is prolonged. There are many node scheduling schemes (also called density control) in sensor networks. Node scheduling is, concretely, selecting a set of sensor nodes to work in a round and another random set in another round. In each round, the coverage requirement can be guaranteed. PEAS [7, 8], GAF [9], OGDC [10], et al. are all this kind of algorithms.

In this paper, we analyze one of the efficient node scheduling schemes proposed by Tian and Georganas in [11]. This coverage-preserving node scheduling scheme (CPNSS) develops a coverage-based off-duty eligibility rule (COER) and a backoffbased self-scheduling scheme. The underlying principle of COER is that, for each sensor, if all its working neighbors can cover its own sensing area together, it is eligible to turn off. We give a variation to COER by replacing the neighbors’ position information by directional information, which can efficiently reduce the calculation and also commu‐nication overhead. For CPNSS’s backoff-based scheduling scheme, which aims at avoiding ‘blind spot’, we propose a corresponding ID-based self-scheduling scheme to reduce the latency. The simulation results show that these variations can help to reduce overhead largely while introducing some redundancy, which can provide more relia‐bility in some demanding applications.

The rest of the paper is organized as follows. In Sect. 2, we give a brief summary of the existing related work. In Sect. 3, we introduce and analyze the CPNSS. Section 4 is the performance comparison study of these schemes by simulation. Section 5 is the conclusion remarks and our future work.

2Related Work

As mentioned above, there exist several node scheduling schemes in sensor networks. In [12], Slijepcevic et al. have proved the problem of finding maximal number of covers (each cover is a set of sensor nodes that can work together to ensure the predefined degree of sensing coverage) in a sensor network to be NP completeness. Therefore, all these schemes are approximate algorithms.

Ye et al. [7, 8] developed a distributed density control algorithm named PEAS, which is probing based. In PEAS, a sleeping node wakes up and broadcasts a probing message within a certain range at the end of its sleeping period. This node will turn on to work if no reply is received after a timeout. The node will keep working until it depletes its energy. The probing range can be adjusted to achieve different degree of coverage overlap. But PEAS can’t guarantee full coverage, the 100 % coverage of the monitored area. Xu et al. [9] introduced GAF. This method divides the monitored area into rectan‐gular grids, selects a leader in each grid to be the working node. The maximum distance between any pair of working nodes in adjacent grids is within the transmission range of each other. Again, this method cannot ensure full coverage. Recently, Zhang and Hou’s work [10] gets more attention. They introduced a distributed, localized density control

algorithm named OGDC which could provide full coverage. In the ideal case, when all the nodes have the same sensing range and transmission range, every three closest nodes in a cover can form an equilateral triangle with the side length , where rs is the sensing range. Thus the overlap of sensing areas of all the nodes is minimized. The working nodes can be activated by a starting node which is randomly generated in a progressively spreading way. Simulation results show that OGDC has better perform‐ance than other algorithms in both coverage and energy consumption aspects. But this algorithm is complicated, may require much execution power and time.

In [13], Yan et al. proposed an adaptable sensing coverage mechanism which could provide differentiated surveillance service. In their protocol, nodes could dynamically decide their own working schedule to provide not only full coverage, but α degree of coverage, α could be smaller or bigger than 1. A monitored point needs the coverage degree to be 2 means that it needs to be covered by two sensors together all the time. It’s a protocol that achieves both energy efficiency and differentiated degree of sensing coverage. It aims at providing varied degree of coverage, but their current algorithm cannot guarantee correctness when α > 2. Some other researchers have also done some work in this field, such as [14].

3Coverage-Preserving Node Scheduling Scheme (CPNSS)

In [11], Tian and Georganas proposed a coverage-preserving node scheduling scheme (CPNSS). There are two parts in CPNSS. One is a coverage-based off-duty eligibility rule (COER), which tells a sensor whether it should turn itself off; the other is a backoffbased self-scheduling step, which provides the exact turn off procedure for a sensor node who is eligible to turn off, to avoid ‘blind spot’.

3.1Coverage-Based off-Duty Eligibility Rule (COER)

In CPNSS, each sensor node can independently decide its status to be ‘active’ or ‘sleep’ according to the scheme’s coverage-based off-duty eligibility rule. Here we assume the sensing area of a sensor node to be a disk centered at this node with the diameter r, which is this sensor’s sensing range. All the sensors have the iden‐tical sensing range. The transmission range of a sensor node is also r. Therefore, a neighbor node B to the sensor node A means that they are in each other’s sensing range (A’s neighbor set can be defined as N (A) = {B | d (A, B) ≤ r, A ≠ B}, d (A, B) is the distance between them). The main objective of the node scheduling is to turn off the redundant nodes. We can figure out that the ‘redundant’ node is the sensor node whose all sensing area can be covered by other sensor nodes. The redundant node can then be turned off without hurting the whole coverage. Here comes the concept ‘sponsored area’. Sponsored area is the sensing area of one sensor node that can be covered by another sensor node. Such as in Fig. 1(a), the shaded area SB → A is the sponsored area of sensor node B to A (also is SA → B). In order to simplify the calculation, another related concept ‘sponsored sector’ is introduced. In Fig. 1(b), the shaded sector area is the sponsored sector ΦB → A. Since A and B are in each other’s sensing disks, the sector area must

be smaller than the original crescent sponsor area. Therefore, this simplicity won’t reduce coverage.

It is easy to see that if the sponsored area provided by all (or some) of the nodes in A’s neighbor set can cover A’s sensing disk, A is safe to turn off. We can calculate the union of all A’s sponsored sectors. If the union result is 2Π, then A is said to be eligible to turn off (see Fig. 1(c), the area of disk A is equal to ∪ΦBi → A, Bi is nodes in A’s neighbor set). After getting the information about neighbor nodes’ distance and direction from itself, node A can use to calculate each neighbor’s sponsored sector. The authors also give the calculation when sensor nodes have different sensing ranges. We won’t give further discussion about it in this paper.

3.2Backoff-Based Self-scheduling Step

The above discussed node scheduling method is localized. Each sensor node broadcasts a Position Advertisement Message (PAM) including its ID and position and also receives others’ messages to get its neighbor set. Each node then decides its status according to the coverage-based off-duty eligibility rule. It is obvious that a ‘blind spot’, an area not within any sensor node’s sensing range, may occur because two sensor nodes assume each other to cover their overlap area and make decision to turn off at the same time. To avoid ‘blind spot’, a backoff step is introduced.

The main idea is to insert a random backoff time Td before an eligible node turns itself off. The node should broadcast a Status Advertisement Message (SAM) to notify its neighbors that it is off when the time Td expires. If a sensor node receives a SAM during its backoff time, it will recalculate to see whether it is still eligible to turn off without the sponsored area provided by the sender node of the SAM. If not, this sensor node cancels its waiting and decides not to turn off. This scheme may lead to redundant overlap but reduces the possibility of the occurrence of ‘blind spot’. If the size of random number selected as backoff time is W, the possibility for two eligible sensor nodes to turn themselves off together is 1/W2. Although the possibility may be very small, the

Fig. 1. (a) Sponsored area SB → A. (b) Sponsored sector ΦB → A. (c) Node A is eligible to turn off.

‘blind spot’ may still exist. To further avoid ‘blind spot’, another backoff time Tw is introduced. Tw is inserted after Td expires and SAM been sent out. The sensor node will wait another Tw time before really turn itself off. Again, if this node gets some SAMs during the waiting, it recalculates according to the eligibility rule by deleting the senders of SAMs from its neighbor set. Once a node has decided to be on, it won’t change its status in this round.

4Performance Evaluation and Simulation

In this section, we will use simulation to show the performance of the CPNSS and our variation versions to it. In order to simplify the denotation, we will use COER-PO to denote the original coverage-based off-duty eligibility rule using nodes position infor‐mation, and COER-DI as the new rule using nodes direction information.

4.1Simulation Environment

We set up the simulation in a 50 × 50 m2 network areas. Sensor nodes are randomly distributed in it initially and remain stationary once deployed. To calculate sensing coverage of the whole sensor network, we divide the space into 500 × 500 unit grids. If the center point of a grid is covered by some sensor node’s sensing disk, we assume the whole grid being covered. In the same way, if the required coverage sensing degree is more than 1, say, D, (every point in the target area is supposed to within the sensing area of at least D sensor nodes), then still the center point of each grid is the representative of the whole grid. In the simulation, we will use the middle (50 − r) × (50 − r) m2 as the monitored target area to calculate the coverage ratio, in order to ignore the edge effect, for in real case the monitored area will be sufficient larger than the sensor’s sensing disk. Since we assume the transmission range of a sensor to be the same with its sensing range r, full coverage of the whole target area implies connectivity of all the sensor nodes. We only need to concentrate on the coverage and energy consumption issues in the simulation.

4.2Parameters Used and Performance Metrics

In order to evaluate the capability and performance of these schemes, we set several parameters to be tunable in the simulation. They are as follows. (1) The node density. We change the number of deployed nodes (N) from 100 to 1000 to see the effect of node density on the efficiency of the schemes. (2) The sensing range (r). We change the sensing range of the sensor nodes from 6 m to 13 m. (3) Coverage sensing degree (D). Some‐times, more reliability is desired, so D could be more than 1. We vary D’s value from 1 to 5 to see the corresponding performance of the schemes. The performance metrics are: (1) The percentage of coverage, i.e., the ratio of the D degree covered area to the total monitored area. We will use the 500 × 500 bit map to denote them. (2) The percentage of working sensor nodes to all deployed nodes in one round. Since the fewer working nodes needed, the less energy consumed and the longer the network lives.

4.3Simulation Results and Comparison

In order to analyze all these schemes’ performance, we simulate the following four combinations, COER-PO with backoff-based self-scheduling, COER-PO with ID-based self-scheduling, COER-DI with backoff, and COER-DI with ID. In Fig. 2, we can see that when the required sensing coverage degree is small, all these four algorithms have almost full coverage. With larger D (above 2), the coverage ratio will decrease. The algorithm COER-PO with backoff-based self-scheduling (CPNSS) decreases the fastest and COER-DI with ID the slowest. This is because COER-DI has more coverage redun‐dancy by turning off fewer sensor nodes. ID-based self-scheduling has more redundancy than backoff-based one, but this redundancy increase is less significant than COER-DI to COER-PO.

We can see that COER-DI will have more working nodes than COER-PO, but it can reduce the communication overhead and the redundancy is useful when higher sensing coverage degree is required. ID-based self-scheduling scheme will introduce another amount of redundancy compared with backoff-based scheme, but it can save time. Overall, these variation to CPNSS can reduce the overhead by large and without losing too much of performance.

5Conclusions and Future Work

In this paper, we do some research to one of the efficient node scheduling schemes CPNSS which uses a coverage-based off-duty eligibility rule as well as a backoff-based ‘blind spot’ avoidance method. In order to reduce overhead, we put forward some enhancement to CPNSS. Instead of position information of sensor nodes, we use direc‐tional information, and we remove CPNSS’s backoff period to save time. The simulation results show that this variation of CPNSS can provide full coverage, but will introduce

Fig. 2. Coverage ratio with different coverage sensing degree (D) (r = 10 m, N = 500).

more coverage redundancy. Therefore, in some cases where reliability is critical or high coverage sensing degree is demanded, these new schemes are more adaptive. In the future, we will do more research on both improving existing node scheduling schemes and developing new schemes. We can use the two-element tuple (degree, ID), degree is the number of a sensor node’s neighbors, to replace the ID in ID-based scheme. This is because the more neighbors a sensor node has, the higher possibility that it can contribute much to the overall coverage if it is turned on. Therefore, we give this node low priority to turn on.

References

1. Akyildiz, I.F., Su, W., Sankarasubramaniam, Y., Cyirci, E.: Wireless sensor networks: a survey. Comput. Netw. 38, 393–422 (2002)

2. Estrin, D., Govindan, R., Heidemann, J.S., Kumar, S.: Next century challenges: scalable coordination in sensor networks. In: ACM MOBICOM 1999, pp. 263–270 (1999)

3. Kahn, J.M., Katz, R.H., Pister, K.S.J.: Next century challenges: mobile networking for “smart dust”. In: ACM MOBICOM 1999, pp. 271–278 (1999)

4. Li, X., Wan, P., Wang, Y., Frieder, O.: Coverage in wireless ad-hoc sensor networks. IEEE Trans. Comput. 52, 753–763 (2003)

5. Meguerdichian, S., Koushanfar, F., Potkonjak, M., Srivastava, M.B.: Coverage problems in wireless ad-hoc sensor networks. In: INFOCOM 2001, pp. 1380–1387 (2001)

6. Shih, E., Cho, S., Ickes, N., Min, R., Sinha, A., Wang, A., Chandrakasan, A.: Physical layer driven protocol and algorithm design for energy-efficient wireless sensor networks. In: ACM SIGMOBILE, pp. 272–287 (2001)

7. Ye, F., Zhong, G., Lu, S., Zhang, L.: Energy efficient robust sensing coverage in large sensor networks. Technical report, UCLA (2002)

8. Ye, F., Zhong, G., Lu, S., Zhang, L.: Peas: a robust energy conserving protocol for long-lived sensor networks. In: The 23nd International Conference on Distributed Computing Systems (ICDCS), p. 28 (2003)

9. Xu, Y., Heidemann, J., Estrin, D.: Geography-informed energy conservation for ad hoc routing. In: ACM MOBICOM 2001, pp. 70–84 (2001)

10. Zhang, H., Hou, J.C.: Maintaining scheme coverage and connectivity in large sensor networks. Technical report, UIUC (2003)

11. Tian, D., Georganas, N.D.: A coverage-preserving node scheduling scheme for large wireless sensor networks. In: The First ACM International Workshop on Wireless Sensor Networks and Applications, pp. 32–41 (2002)

12. Slijepcevic, S., Potkonjak, M.: Power efficient organization of wireless sensor networks. In: ICC 2001, pp. 472–476 (2001)

13. Yan, T., He, T., Stankovic, J.A.: Differentiated surveillance for sensor networks. In: ACM SenSys 2003, pp. 51–62 (2003)

14. Wang, X., Xing, G., Zhang, Y., Lu, C., Pless, R., Gill, C.: Integrated coverage and connectivity configuration in wireless sensor networks. In: The First International Conference on Embedded Networked Sensor Systems, pp. 28–39. ACM Press (2003)

An Improved Authorization Model in Trust Network

1 School of Computer, National University of Defense Technology, Changsha 410073, China {gxm9000,xiaozhe,baosheng}@163.com

2 School of Mechanical Science and Engineering, HUST, Wuhan 430074, China huiting@163.com

Abstract. Though traditional authorization models can ensure the security of equipment, they don’t offer promise both for good quality of service and for strong system robustness. Therefore, this paper presents a semi-distributed authorization model which splits the single decision point into two roles: core-authorization decision point and sub-authorization decision point. In this model, several deci‐sion points can provide authorization service for one and the same equipment. The experimental results prove that this model can effectively reduce authoriza‐tion service time and has some marked advantages on system robustness.

Keywords: Authorization model · Decision point · Centralized/distributed model · Quality of service · System robustness

1Introduction

At present, the existing mature technologies are usually based on the access control mechanisms provided by third-party to build a safe and reliable network environment [1, 2]. Most access control mechanisms use the centralized authorization models including the sole decision point, to control the access requests from equipment. Unfortunately, the continuous expansion of target network and the increasing amount of equipment, which results in the sharp decrease of quality of service and poor system robustness. Specially, when several equipment concurrently send requests for access, the subsequent requests have to wait to be disposed until the decision point completes the anterior requests, which substantially increases the authorization service time. In order to enhance the quality of service, some research communities proposed the semidistributed authorization models [3, 4], which have several decision points being only responsible for disposing the access requests in the corresponding area. In the same way, this model can’t provide normal authorization service for equipment in some areas, when one or some decision points have a single point of failure. Therefore, the traditional authorization models cannot meet practical requirements in terms of quality of service and system robustness. So, this paper presents a semidistributed authorization model, which adopts the hierarchical multi-decision point mode, and spits the decision point of traditional centralized authorization model into one core-authorization decision point and multiple sub-authorization decision points. This model supports for several sub-authorization decision points to dispose the access

© Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015 J. Tian et al. (Eds.): SecureComm 2014, Part II, LNICST 153, pp. 10–16, 2015.

DOI: 10.1007/978-3-319-23802-9_2

request of one and the same equipment. So this model still can provide authorization service for equipment, even though some decision points encounter system halted. At last, the experimental results show that authorization service time of proposed model is only 58 % of traditional centralized authorization model when this model deploys five sub-authorization decision points. At the same time, it also can enhance its system robustness by increasing the number of SADPs.

2Related Works

Many studies have been carried out by industries to ensure the security of equipments. Attempts that solving this problem have resulted in the development of access control mechanism as follows.

For an illustrative purpose, five typical access control mechanisms are presented: Cisco’s Network Admission Control (NAC) [5], Microsoft’s Network Access Protection (NAP) [6], Juniper’s Unified Access Control (UAC) [7], Huawei’s Endpoint Admission Defense (EAD) [8], TOPSEC’s Trusted Network Architecture (TNA) [9]. We analyze these mechanisms in terms of distributed/centralized, system robustness, authorization service time, and network scale, as shown in Table 1.

Table 1. Comparison of typical access control mechanisms

TechnologyDistributed/ centralized System robustnessService time Network scale

NACCentralizedPoorPoorMedium and small-sized

NAPCentralizedPoorPoorMedium and small-sized

UACCentralizedPoorPoorMedium and small-sized

EADSemi-distributedWeak goodWeak goodMedium

TNACentralizedPoorPoorMedium and small-sized

However, these technologies have some lacks in system robustness, quality of service and network scale. Therefore, some research communities propose multiple decision-points model [3, 4], which splits the global authorization strategies into several subsets and issues these subsets to corresponding decision point that only providing authorization service in the defined area. An Improved Authorization Model in Trust Network11

3System Overview

The traditional centralized authorization model or semi-distributed authorization model cannot provide normal authorization service, when the failure of network devices or links occurs. Meanwhile, the traditional centralized authorization model also has poor quality of service. Therefore, we propose new authorization model to solve these above problems.

3.1Design

The decision point in traditional authorization model is a dedicated server, which is equipped to provide authentication service. As illustrated in Fig. 1, our proposed model uses one CADP and multiple SADPs to cooperate the overall functions.

Fig. 1. Proposed authorization model architecture

CADP is the most critical component, which not only provides authorization service, but also is responsible for the planning and distribution of authorization strategies. And SADP only provides authorization service, which can be deployed in network devices rather than in dedicated servers, because SADP is just a special function (or protocol), similar with other routing protocols (such as OSPF, RIP, BGP and so on).

This model splits one decision point into multiple decision points, so how to ensure the consistency of authorization strategies between CADP and SADPs is the primary problem. In startup, CADP stores the global authorization strategies and SADPs don’t store any strategy. Only when SADP completes the registration from CADP, CADP will issue the corresponding authorization strategies to this SADP, while CADP sends keeping alive messages to SADPs. If CADP or SADPs can’t receive keeping alive messages from others, SADP will clean out authorization strategies, and CADP will cancel the authorization service to make SADP to re-register. On the other hand, the operation of authorization strategies can only be done in CADP, and SADP can get the newest authorization strategies from CADP.

An important feature of this model is that several SADPs can provide authorization service for one and the same equipment, which is the biggest different from other tradi‐tional authorization models. Even if an individual SADP has a single of failure, this model is still able to respond to access requests. In this paper, we also define DP trust that refers to the number of decision points providing authorization service for one and the same equipment.

3.2Data Flow

This authorization service uses client/server authorization mode, which is consistent with traditional authorization system. After SADP completes registration from CADP and obtains authorization strategies, it is able to provide authorization service for network devices. The data flow in this model is as shown in Fig. 2.

The processing of authorization service in this model is as follows:

(1) In startup, equipments stay in un-accessed status, and firstly send access requests;

(2) After receiving requests, CADP verifies equipment identity, determines whether to allow this equipment to connect based on its Authorization Strategy-Base. At last, it will return the decision to this equipment.

(3) After the equipment receives response from CADP, it will adopt next action based on this response: if it’s positive, the equipment sends registration request to CADP; otherwise, it won’t adopt any action.

(4) After receiving the request, CADP verifies equipment identity and decides whether to deploy SADP on this equipment based on Registration Policy Set: If it’s positive, CADP will issue corresponding authorization strategies to this equipment; Otherwise, CADP ignores this registration request.

(5) Non-accessed equipment sends access request to the defined SADP.

(6) After receiving request, SADP verifies equipment identity, determines whether to allow this equipment to access to the target network, and returns the decision.

4Simulation and Analysis

This section validates the superiority of ND-OSDAM based on CERNET topology in terms of authorization service time and system robustness.

Fig. 2. Data flow

Another random document with no related content on Scribd:

A Moment of Suspense

Perhaps I may mention that never in my experience have I seen an animal more terrified than that [35]pony was on that occasion. When we stood him again upon terra firma his legs quivered so that it was quite painful to witness, and he neighed and neighed convulsively, and made the sound echo all down the valley. I may also add that from that same scaffolding, that same morning, one of the workmen had fallen over, and his body was dashed into an unrecognisable mass on some rocks in the foaming stream below.

I had heard most peculiar rumours from the natives that the Tibetans had come in great force on to British territory at Garbyang, and with great pomp and much beating of drums were proclaiming that the British Government were afraid of coming to Tibet, and that the entire Bias and Chaudas had now been ceded to Tibet.

It may be remembered that as early as 1898, after the return from my first journey to Tibet, I pointed out to the Government the abuses of Tibetan officials who came over to our side of the frontier, claimed Sah-tal or Land Revenue from British subjects, and even tortured unprotected natives on our side of the frontier if they refused to pay. Some prominence was given in the House of Commons to questions on this subject, and the Governor of the North-West [36]Provinces had to acknowledge that such was the case, but declared that steps would be taken to stop the abuses. That the Sah-tal was paid was admitted, but it was stated to be a trade tax, which was untrue, and possibly uttered in ignorance of facts. It was agreed that the payment of the Sah-tal by British subjects should, nevertheless, be stopped, and it was actually suspended.

Apart from the fact that the words Sah-tal in themselves mean “land revenue,” and that it is paid on the amount of land possessed by Shokas on British soil, a further proof that it is a land tax is provided by the case of Darma Shokas, who pay the Sah-tal on their land to the Jong Pen of Taklakot, and who do no trading with that particular part of Tibet.

Furthermore, the Jong Pen of Taklakot receives the amount with the distinct understanding that it is a land tax, and not a trade tax, and as such

it appears in Government reports by the few British officials who had been to the frontier, such as Mr. Sturt, Mr. Larkin, and other deputy commissioners and collectors, and the Political Agent on the spot. In Darma the Sah-tal was collected direct by Jong Pen’s emissaries, but in Bias and Chaudas the Political Agent was made to act as a servant [37]to the Tibetans, and after collecting the revenue handed it over to the Jong Pen’s officials at Gungi and at Garbyang, two villages conveniently situated for the purpose.

Chaudas, being the most distant from the Tibet border, only paid a nominal sum of 11 rupees in cash, and some 14 rolls of rough cloth; but Garbyang, for instance (besides a real trade tax jointly with Chaudas of 370 boxes of grain, each containing some 24 lbs., and 14 boxes of coarse cloth), paid for Sah-tal the following items:—

86 (three anna bits).

Oats 1230 lbs.

Saluk (right of pasture) 2 Tibetan rupees.

Ghur (sweet paste) 4 balls.

Coarse cloth

Shoka liquor

Timber

3 entire rolls.

55 jars.

30 huge logs.

Iron 4 lbs.

Cakes, sattoo, charcoal, and liquor for collecting party.

The village of Kuti also paid a heavy Sah-tal.

Rupees 17

Oats 1210 lbs.

Saluk 2 rupees.

Garah cloth 40 yards.

Haunches of mutton 12

Jars of chökti (wine) 50

Ghur 28 balls.

Iron 2 lbs. and charcoal, cakes, meat, liquor, etc.

[38]

Darma paid some 150 balls of ghur, which had a local value of about 75 rupees.

Notwithstanding that the Government of the North-West Provinces could not or would not see matters in the right light, it was a great gratification to me to think that, on my giving publicity to such an injustice, the Government had at last deemed it right to discontinue the payment of the land revenue to Tibetans by our frontier subjects. It came, therefore, as a very great surprise to me, on approaching Garbyang, to hear that the Tibetans had come over to that place in great force,—with the sanction of the British Government,—and that several officials, including a Nerba, some Dhats in red and black tunics and long swords, four jimidars, two drummers, and a number of soldiers were parading the streets, proclaiming the annexation of the district to Tibet, and ill-using the natives who differed. They were gorging themselves at the expense of the natives, and having a fine time all round.

At the request of a deputation of Shokas, I hastened on to Garbyang; but the Tibetans, believing that I was coming up with a large and well-armed expedition to take a revenge upon them for former misdeeds, deemed it advisable to pack [39]up their chattels, pocket their pride, and decamp over the frontier.

I met with a most enthusiastic reception from the Garbyalis, who wished me to remain in their village until the passes were closed up by snow so as to keep their compulsory guests away. The Shokas seemed depressed and disgusted at what they rightly believed unwarrantable treachery on the part of the Government of India. They had always been faithful—even under trying circumstances—to the British, and such undeserved treatment led them to the one conclusion, preached by full-powered

Tibetan lungs, that England must indeed be weak, or at least afraid of Tibet.

Undoubtedly these sad and unchecked occurrences all along our Tibetan frontier—you see, it is so uncomfortable for Anglo-Indian officials to go up to the snows to make inquiries and so on—have been the chief cause of Tibetan aggressiveness. There is no man so brave as the one who believes his opponent is not going to fight; and perhaps now, after the much-trumpeted, enigmatical expedition to Lhassa and the unexpected sudden retreat from that city, they will be no better than before.

I was unable to accede to the request of the natives to remain to protect their village, as I [40]intended going farther; and, moreover, the Government of India having become alarmed at my proceeding a second time towards Tibet, behaved with a considerable amount of amusing childishness. Government chaprassis were arriving in quick succession with secret orders to prevent natives selling me provisions, to induce my men treacherously to abandon me, steal my weapons and food, and place every possible obstacle in my way

Some native friends, who, according to custom, had presented me with a ball of ghur and two handfuls of rice, were arrested and prosecuted, being brought down to Almora, some 145 miles, for the purpose. Others met with considerable annoyance, accusations of all kinds being showered upon innocent people—even such gross nonsense as accusations of hiding quick-firing guns and pieces of ordnance!

Both the Governor and the Commissioner at Naini-Tal, and the Deputy Commissioner of Almora, seemed quite hysterical over the affair, and some absurd threatening letters were written to me. My mails were invariably tampered with, and all letters opened. Among the most amusing requests may be noted one that I should show a Chinese passport if I wanted to traverse Bhot (British territory), [41]which made it seem as if the cession of that territory to Tibet had really been accomplished—although even then, as I unfortunately experienced before, a Chinese Imperial

passport has as much effect upon Tibetan officials as a piece of wastepaper would on the Prime Minister of Great Britain.

I was ordered to divulge my plans, which of course I refused to do, principally because I had no plans to divulge; and, further, was told I must stop and “wait for Government orders.” I replied that, being nobody’s servant, I would receive no one’s orders. I had not asked nor wished nor needed Government assistance, and I would go when and where I liked.

I was very sorry that the Political frontier Agent—a most sensible man— was subjected to much inconvenience and anxiety by constant orders to stop my expedition by any means—a matter in which I also happened to be concerned. He could not, as ordered, starve out my expedition, because I had plenty of food of my own. Silly as the orders given him were, he obediently did his utmost to check my movements, and, moreover, behaved like a gentleman into the bargain.

Some spies whom I found in my camp came in [42]for some severe punishment, and two Government chaprassis, who had one night been despatched to threaten my men and induce them to desert and capture my food and ammunition, received a sound thrashing, were disarmed, and I took them prisoners and brought them along with me to do some mountaineering! At the same time I sent word to those in authority that, when it should suit me, on my return, I would personally hand over the two prisoners.

Further orders arrived that any one selling or giving food or showing friendship to me should be arrested and sent down to Almora for punishment. All this seemed very useless, as I possessed all I needed; but, in order to prevent further persecution to some of my friends, I decided to cross the boundary at once—the Kali River—and enter the Nepal kingdom—a country also closed to foreigners, as everybody knows. [43]

CHAPTER V

In the meantime the Tibetans, who had hastily retreated across the boundary into their country, had given the alarm of the approach of my expedition. A spy I had sent over reported that great commotion reigned at Taklakot. Bridges had been hastily destroyed, stone barriers were put up, while warlike preparations of all kinds were carried on in feverish speed. A bluffing message was sent over by the Tibetans to inform the Political Agent that 5000 men were ready to meet my force and capture me again, when they would cut off my head and throw my body into the river—a threat which was by no means new to me.

This sounded interesting, only the Tibetans forgot that they would have to catch me first! The passes—both the Lippu and the Lumpiya (through the latter of which I had evaded their vigilance on my first journey)—were, they stated, [44]strongly guarded. I well knew the contemptible cowardice of the Tibetans, and I took but little notice of these threats; for this time— unlike my first journey—I had twenty men, all of my own selection, and they were magnificent fellows—faithful and plucky to quite an unusual degree.

Red Lamas

In answer to these Tibetan messages to the Government, it is possibly of some interest to notice that the Government of the North-West Provinces in all haste informed the authorities of Taklakot in words to this effect:—

“Mr. Landor is coming to Tibet. Possibly he will enter the country. The Government of India has taken steps to prevent any men accompanying him, also to take away his baggage, provisions, arms, and ammunition. He will enter alone and will be at your mercy. We [the Government] are in no way responsible for his entering Tibet.”

This message surprised me even less than the Tibetan effort. Indeed, I well knew that no one more than some officials of the North-West Provinces wished me dead. You see, I had on several occasions shown them up in a very poor light, and now again I was discovering fresh and most unaccountable misdeeds on their part all along the line. Naturally, I quite understood that it was an [45]uneasy conscience and the fear of being exposed which prompted them to act in such a childish manner in order to prevent my seeing what was going on.

The Political Agent, who was constantly receiving orders which he was powerless to carry out, such as arresting me,—which I defied him to do,— seemed in much distress, and to relieve the strain upon him I decided to cross over into forbidden Nepal territory The British authorities had taken the precaution to warn the Nepalese also that I might cross over their boundary, that my conduct was not countenanced by the Government, and that soldiers must be sent to stop me and possibly capture me. This led to some incidents which gave us a good deal of unexpected merriment.

A guard of Nepalese soldiers was hurried up, and, unaware that it was there, I crossed over the boundary, with our rifles in their cases for protection against the rain, and not at all prepared for war. Two of my men, who carried a rifle each, were a distance ahead. On nearing a small fort and guard-house they were pounced upon by Nepalese soldiers who were hiding behind some rocks, the rifles were seized, and the Nepalese escaped with them into the fort up higher upon the hill. [46]

My men ran back to me in a great state of excitement to report the occurrence. We hurriedly prepared a plan of attack, and without losing any time climbed up to the fort. Upon the walls some gaily attired figures peeped over, brandishing kukris and a few obsolete rifles. I could hear them behind strengthening the hastily barricaded door. An officer peeped over and asked what we wanted.

“I want my rifles back.”
Tibetan Man spinning Wool

“Your rifles are not here. We have already despatched them to Katmandu” (the capital of Nepal).

“Very good. If you do not return my rifles within two minutes we will come and get them ourselves.”

“We will fight you.”

“All right.”

Pounding with big rocks and by the aid of a wooden lever we got the door loosened, and while the garrison’s attention was directed to prevent our entering that way, four of my best men and I climbed over the wall on the opposite side of the fort and covered the defenders with our rifles. I demanded that they should lay down their weapons or I would shoot. After some indecision, most of them did. The others, especially one who fired at [47]us, got a severe pounding and were disarmed by my men, who had now all entered the fort.

We ransacked the place, and eventually recovered the captured rifles, after which we bade the Nepalese a respectful salaam and proceeded on our way.

“But,” humbly put in the trembling Nepalese, “you cannot travel on Nepal territory. It is forbidden to foreigners, and I have orders to stop you.”

“Very well, do it!”

“I cannot,” he meekly mumbled, as he rubbed aching bruises he had received in the encounter. “But,” he said, “I will follow your movements.”

“Oh, you can follow any movements you like, but mind you do not come too near.”

“Oh, no, no, sahib!” he exclaimed.

The guard, in fact, followed us for some days—and always at a most respectful distance—until we got high up among the snows and glaciers.

Then we lost sight of them. Anyhow, I had no further annoyance all through my journey in Nepal, and found the few natives we saw quite attractive, picturesque, and kind.

After leaving the fort we travelled practically south-east over very rough country, my objective [48]being to visit and if possible climb one of the Lumpa peaks which towers in a majestic needle above most other mountains in the neighbourhood. Every now and then, when we got to some higher point of vantage, we got a beautiful view of it. My men—to my astonishment—received my plan with enthusiasm, for they seemed to hold the snows in veneration. Little they then knew how much they would have to suffer upon them.

In that portion of North-West Nepal the population is sparse and somewhat mixed. Perhaps the finest and most interesting types I saw were the cross-breeds of Shokas and Nepalese, which seemed to produce most striking heads. One of the coloured drawings representing a typical Nepalese-Shoka young man, with temples shaved and long wavy hair hanging down his back, is, I think, a good example. These men had very fine traits about them, were most hospitable and civil, manly and serious in manner. They were enterprising traders, carrying on a brisk business mainly in borax, salt, wool, and skins, which they generally bartered with Tibetans in exchange for grain, ghur, and other food stuffs.

A Nepalese Shoka

It is rather interesting to note that whereas similar frontier tribes on neighbouring British soil [49]are imposed upon, taxed and ill-used by Tibetans, no interference at all is experienced by those living under the protection of the King of Nepal. Possibly this is due to the fact that when Nepalese subjects have been ill-used in Tibet an armed expedition has been sent over the frontier by the Nepalese, and reparation demanded and obtained at once.

Nepalese women are not unattractive, having large brown eyes, made additionally languid by blackening the lower lid, long eyelashes and wellcut features, skin of a well-polished, smooth, light-yellowish brown, and most graceful hands and feet. The better class are generally much decorated with heavy silver necklaces, bracelets, and rings, and with huge nose-rings of gold, brass, or silver. They are handsome while young, but they fade away at an early age, and the smooth skin becomes wrinkled and grooved long before they are thirty. They are said to be most affectionate, and of a somewhat jealous temperament, which they couple with extreme conjugal fidelity.

In Western Nepal the hair is worn in many little plaits festooned on both sides of the forehead, and a head-cover, white, yellow, or red, such as is seen in India among Hindoo women, is usually worn.

The women have comparative freedom, and [50]seldom are they seen completely veiled. Sati or suttee, the widow’s self-sacrifice by throwing herself upon the flames which have cremated her dead husband, is now forbidden by law in Nepal. It is, nevertheless, indulged in to some extent in districts far away from the capital.

Nepal is principally known to English people as the country from which, by a special agreement, we draw recruits for our Gurkha regiments. It should, nevertheless, be borne in mind that not all people living in Nepal are by any means Gurkhas—far from it. We find in Nepal a great variety of types —some pure enough, others distinct mixtures of two or more races.

The Gurkha district proper lies in the north-easterly portion of the Gandak basin, the chief city being Gurkha, some fifty-four or fifty-five miles to the west of the Nepalese capital, Katmandu.

Formerly Nepal’s sovereignty extended over Kumaon, which we have already traversed, as far as the Sutlej River. The Nepal kingdom, as it stands now, is an elongated tract of country—mostly mountainous—some 500 miles in length, and less than 150 miles in breadth at its widest points. As everybody knows, it is situated on the southern slopes of the central Himahlyan range, [51]and borders with Tibet on the north, Kumaon (NorthWest Provinces) to the west, the Kali River, as we know, forming the boundary; the North-West Province and Bengal to the south, and Sikkim to the east.

Nepal is divided into three natural zones by high ranges with peaks rising from 25,000 to 28,000 feet, these ridges shooting off southwards from the main Himahlyan range. The eastern zone is drained by the Kosi River, the central by the Gandak, and the Western by the Gogra. To the above should be added what is called the Terai and the thickly-populated Nepal Valley, which, geographically, must be classed separately. Formerly Nepal was divided into twenty-four principalities in addition to the Gurkha kingdom, but since the invasion by the latter of the entire country they have been divided into five provinces—viz. Gurkha, Malibam, Palpa, Pokra, and Khachi.

In the space at my disposal I cannot enter into the history nor go into a detailed description of the many tribes which inhabit Nepal, but generally speaking, in the aboriginal stock a Mongolian origin is evident, particularly in the population of the central zone, where recent Tibetan influence is marked; but this is not the case with the [52]inhabitants of the lower region, who seem to have descended partly from a mixture of an earlier Tibetan and Aryan source. Perhaps among the most prominent aboriginal tribes we should mention the Magars, Gurungs, Newars, Sunwars, the Khambas or Khambus, and Yakhas (the latter two closely resembling Rais), the Yakthumbas, Murmis, and Lepchas. Then in the forests of Western Nepal we find to this day wild tribes of Chepangs and Kasundas.

In the Terai district live the Tarus, a servile and ill-shaped people of no great strength of character; in the eastern zone we have Limbus, a name

A Nepalese Lady

which practically includes Kirantis, Ekas, and Rais—a people of apparently Tibetan origin, flat-faced, beardless, and with long unplaited hair, who wear wide trousers and a short jacket instead of the long coat of the Lepchas.

The central zone, from which most of the recruits for the British Gurkha regiments are drawn, is inhabited by a small but strongly built, warlike, and plucky people, the Magars and Gurungs, the Magars being in their turn subdivided into six distinct tribes, of which the Thapa tribe is the most numerous. Both the Magars and the Gurungs—who are somewhat taller and more [53]stoutly built than the Magars—although of marked Mongolian characteristics, are by religion Brahmins, but have no sort of strong caste prejudices such as one finds, for instance, in India. Gay and simpleminded, with hearts of gold, faithful and obstinate to an extreme degree, independent in themselves yet loyal to their friends or employers, fond of fighting and possessing the courage of lions, these fellows make wonderful soldiers indeed. Perhaps in many ways they are not unlike the Japanese, both in appearance and temperament, except that the physique of the Gurkha is the superior of the two.

In the Valley of Nepal—or Nepal proper—we find mostly Newars and Murmis. The Newars, who claim to be the aborigines of the Nepal Valley, are in many ways not unlike the Bhotias or Shokas, and in many of their customs and in their habitations show a marked similarity to those tribes of Mongolian descent. Their language resembles Tibetan, and their religion is a modified form of inherited Buddhism. The Newars are much given to agricultural pursuits, and they do not display so prominently the fighting qualities of the Magars and Gurungs. On the contrary, they seem to devote all their energy to art and trade, of which [54]they seem to have the entire monopoly in Nepal. The Murmis resemble Bhotias even more closely than the Newars. They are subdivided into two classes—the Barathamang, which is the most numerous, and the Atharajat.

Katmandu, the capital of Nepal and residence of the King and Government, lies in this valley, and is a city of great size and some beauty

The Terai is inhabited by a poor, sickly-looking race called the Tarus, malarial fever being rampant in their district, while wild beasts abound in the jungle. They seem to be a poverty-stricken lot with a wretched physique—although endowed with astounding strength and powers of endurance. They divide their time between fishing, agriculture, and hunting wild animals.

Now comes the western zone, which is entirely inhabited by non-Gurkha tribes, such as the Doti and Jumli (the Doti’s country being south of the Jumli’s), as well as by wilder tribes, such as the Chepangs and Kusundas, the former being very similar to the Raots or Rajis of Kumaon. Then there are minor Hinduised tribes generically known as Parbatiyas (or hill men).

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.