threshold scheme
Recently Published Documents


TOTAL DOCUMENTS

127
(FIVE YEARS 22)

H-INDEX

12
(FIVE YEARS 1)

Sensors ◽  
2021 ◽  
Vol 21 (23) ◽  
pp. 8071
Author(s):  
Nivedita Mishra ◽  
Sharnil Pandya ◽  
Chirag Patel ◽  
Nagaraj Cholli ◽  
Kirit Modi ◽  
...  

Distributed denial-of-service (DDoS) attacks are significant threats to the cyber world because of their potential to quickly bring down victims. Memcached vulnerabilities have been targeted by attackers using DDoS amplification attacks. GitHub and Arbor Networks were the victims of Memcached DDoS attacks with 1.3 Tbps and 1.8 Tbps attack strengths, respectively. The bandwidth amplification factor of nearly 50,000 makes Memcached the deadliest DDoS attack vector to date. In recent times, fellow researchers have made specific efforts to analyze and evaluate Memcached vulnerabilities; however, the solutions provided for security are based on best practices by users and service providers. This study is the first attempt at modifying the architecture of Memcached servers in the context of improving security against DDoS attacks. This study discusses the Memcached protocol, the vulnerabilities associated with it, the future challenges for different IoT applications associated with caches, and the solutions for detecting Memcached DDoS attacks. The proposed solution is a novel identification-pattern mechanism using a threshold scheme for detecting volume-based DDoS attacks. In the undertaken study, the solution acts as a pre-emptive measure for detecting DDoS attacks while maintaining low latency and high throughput.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012008
Author(s):  
S V Belim ◽  
S Y Belim

Abstract In the article, the protocol for key pre-distribution using a threshold scheme is proposed. The Blom pre-distribution scheme is used as the basis. Shamir secret sharing scheme is used for threshold scheme. A polynomial of three variables is used to form key materials. Messaging between users is required to generate a key. The threshold scheme (3,4) is used to calculate the encryption key.


2021 ◽  
Vol 2096 (1) ◽  
pp. 012019
Author(s):  
A O Shcherbina ◽  
O O Lukovenkova ◽  
A A Solodchuk

Abstract The paper describes a new adaptive threshold scheme for detecting pulses in high-frequency signals against a background of non-stationary noise. The result of the scheme operation is to determine the pulse boundaries by comparing the signal amplitude-time parameters with the threshold. The threshold value is calculated in non-overlapping windows of fixed length and depends only on the background noise level. The detected pulses undergo additional shape checking, taking into account their characteristics. The parameters of the algorithms for detecting pulses and checking their shape can be adjusted for any type of high-frequency pulse signals. This threshold scheme is tuned to detect pulses in high frequency geoacoustic emission signals. The results of the scheme operation on an artificial signal and on fragments of a geoacoustic signal are given, a comparison is made between the proposed scheme and the previously used (outdated) one. The new threshold scheme proposed by the authors is less sensitive to the choice of the initial threshold value and it is more stable in operation. When processing 15-minute fragments of a geoacoustic signal, the new scheme correctly detects, on average, 5 times more pulses.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Ling Zhan ◽  
Hong Zhao

LEDs can be used to communicate under the premise of satisfying illumination, which lays the groundwork for visible light communication (VLC). The application of outdoor VLC has drawn more attention, especially the application of vehicle-to-vehicle (V2V) which can significantly improve traffic safety and information transmission efficiency. The image sensor has the characteristics of spatial separation, easily realizes MIMO, and does not need to be strictly aligned with the transmitter, so it is especially suitable for vehicular VLC. However, because of the diffuseness of LED and the small pixel size of the image sensor, it is easy to produce the blooming effects and interfering among symbols. When decoding at the receiving terminal, it will judge the status Off of LEDs to be the status On. By analysing the blooming effects caused by surrounding LEDs, a novel threshold scheme is proposed in this paper according to the probability distribution of the sum of the optical power of the LED itself and after interference. Experiments show that the proposed method has advantages in improving BER compared with the expected threshold method and the average method, especially with long-distance communication (70 m), and the BER has been improved by 57% and 39%, respectively.


Electronics ◽  
2021 ◽  
Vol 10 (16) ◽  
pp. 1925
Author(s):  
Hongzhan Song ◽  
Shangsheng Wen ◽  
Chen Yang ◽  
Danlan Yuan ◽  
Weipeng Guan

As a promising approach to implement indoor positioning, visible light positioning (VLP) based on optical camera communication (OCC) image sensor has attracted substantial attention. However, the decoding schemes of existing VLP systems still face many challenges. First, the transmission channel between transmitters and receivers can be easily affected by environmental changes, resulting in poor thresholding performance. Second, the inherently unsynchronized air transmission channel issue remains a big obstacle for decoding data. The above two problems limit the application of VLP systems, where various mobile devices are used as receivers and the properties of transmission channel are constantly changing with the movement of receivers. In this paper, a universal and effective decoding scheme named pixel-to-bit calculation (PBC) decoding algorithm for VLP systems is proposed and experimentally demonstrated. It includes a Staged Threshold Scheme which provides excellent thresholding performance for different transmission channel conditions, as well as a Synchronous Decoding Operation to automatically synchronize the clock between transmitters and receivers. A decoding rate of 95.62% at the height of 2.73 m is realized in a practical Robotic-based VLP system embedded with our proposed PBC decoding scheme. In addition, experimental results show that the average decoding rate of the proposed PBC decoding scheme reaches 99.9% when applying different transmitters and receivers.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Guoai Xu ◽  
Jiangtao Yuan ◽  
Guosheng Xu ◽  
Zhongkai Dang

Multipartite secret sharing schemes are those that have multipartite access structures. The set of the participants in those schemes is divided into several parts, and all the participants in the same part play the equivalent role. One type of such access structure is the compartmented access structure, and the other is the hierarchical access structure. We propose an efficient compartmented multisecret sharing scheme based on the linear homogeneous recurrence (LHR) relations. In the construction phase, the shared secrets are hidden in some terms of the linear homogeneous recurrence sequence. In the recovery phase, the shared secrets are obtained by solving those terms in which the shared secrets are hidden. When the global threshold is t , our scheme can reduce the computational complexity of the compartmented secret sharing schemes from the exponential time to polynomial time. The security of the proposed scheme is based on Shamir’s threshold scheme, i.e., our scheme is perfect and ideal. Moreover, it is efficient to share the multisecret and to change the shared secrets in the proposed scheme.


2021 ◽  
Vol 560 ◽  
pp. 183-201
Author(s):  
Lei Zhang ◽  
Desheng Liu ◽  
Meina Chen ◽  
Hongyan Li ◽  
Chao Wang ◽  
...  

2021 ◽  
Vol 1871 (1) ◽  
pp. 012124
Author(s):  
B W Chen ◽  
X Xia ◽  
Q M Liang ◽  
W D Zhong

2021 ◽  
Vol 13 (4) ◽  
pp. 585
Author(s):  
Ji-Eun Park ◽  
Kyung-Ae Park

The detection and removal of erroneous pixels is a critical pre-processing step in producing chlorophyll-a (chl-a) concentration values to adequately understand the bio-physical oceanic process using optical satellite data. Geostationary Ocean Color Imager (GOCI) chl-a images revealed that numerous speckle noises with enormously high and low values were randomly scattered throughout the seas around the Korean Peninsula as well as in the Northwest Pacific. Most of the previous methods used to remove abnormal chl-a concentrations have focused on inhomogeneity in spatial features, which still frequently produce problematic values. Herein, a scheme was developed to detect and eliminate chl-a speckles as well as erroneous pixels near the boundary of clouds; for the purpose, a deep neural network (DNN) algorithm was applied to a large-sized GOCI database from the 6-year period of 2012–2017. The input data of the proposed DNN model were composed of the GOCI level-2 remote-sensing reflectance of each band, chl-a concentration image, median filtered, and monthly climatology chl-a image. The quality of the individual images as well as the monthly composites of chl-a data was improved remarkably after the DNN speckle-removal procedure. The quantitative analyses showed that the DNN algorithm achieved high classification accuracy with regard to the detection of error pixels with both very high and very low chl-a values, and better performance compared to the general arithmetic algorithms of the median filter and threshold scheme. This implies that the implemented method can be useful for investigating not only the short-term variations based on hourly chl-a data but also long-term variabilities with composite products of the GOCI chl-a concentration over the span of a decade.


Mathematics ◽  
2020 ◽  
Vol 8 (12) ◽  
pp. 2218
Author(s):  
Sihem Mesnager ◽  
Ahmet Sınak ◽  
Oğuz Yayla

Blockchain systems store transaction data in the form of a distributed ledger where each node stores a copy of all data, which gives rise to storage issues. It is well-known that the tremendous storage and distribution of the block data are common problems in blockchain systems. In the literature, some types of secret sharing schemes are employed to overcome these problems. The secret sharing method is one of the most significant cryptographic protocols used to ensure the privacy of the data. The main purpose of this paper is to improve the recent distributed storage blockchain systems by proposing an alternative secret sharing method. We first propose a secure threshold verifiable multi-secret sharing scheme that has the verification and private communication steps based on post-quantum lattice-based hard problems. We then apply the proposed threshold scheme to the distributed storage blockchain (DSB) system to share transaction data at each block. In the proposed DSB system, we encrypt the data block with the AES-256 encryption algorithm before distributing it among nodes at each block, and both its secret key and the hash value of the block are privately shared among nodes simultaneously by the proposed scheme. Thereafter, in the DSB system, the encrypted data block is encoded by the Reed–Solomon code, and it is shared among nodes. We finally analyze the storage and recovery communication costs and the robustness of the proposed DSB system. We observe that our approach improves effectively the recovery communication cost and makes it more robust compared to the previous DSB systems. It also improves extremely the storage cost of the traditional blockchain systems. Furthermore, the proposed scheme brings to the DSB system the desirable properties such as verification process and secret communication without private channels in addition to the known properties of the schemes used in the previous DSB systems. As a result of the flexibility on the threshold parameter of the scheme, a diverse range of qualified subsets of nodes in the DSB system can privately recover the secret values.


Sign in / Sign up

Export Citation Format

Share Document