首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A face-spoofing attack occurs when an imposter manipulates a face recognition and verification system to gain access as a legitimate user by presenting a 2D printed image or recorded video to the face sensor. This paper presents an efficient and non-intrusive method to counter face-spoofing attacks that uses a single image to detect spoofing attacks. We apply a nonlinear diffusion based on an additive operator splitting scheme. Additionally, we propose a specialized deep convolution neural network that can extract the discriminative and high-level features of the input diffused image to differentiate between a fake face and a real face. Our proposed method is both efficient and convenient compared with the previously implemented state-of-the-art methods described in the literature review. We achieved the highest reported accuracy of 99% on the widely used NUAA dataset. In addition, we tested our method on the Replay Attack dataset which consists of 1200 short videos of both real access and spoofing attacks. An extensive experimental analysis was conducted that demonstrated better results when compared to previous static algorithms results. However, this result can be improved by applying a sparse autoencoder learning algorithm to obtain a more distinguishable diffused image.  相似文献   

2.
In recent years, to solve the problem of face spoofing, momentous work has been done in this field, but still, there is a need for establishing counter measures to the biometric spoofing attacks. Although trained and evaluated on different databases, impressive results have been achieved in existing face anti‐spoofing techniques, but biometric authentication is a very significant problem as imposters are using lots of reconstructed samples or fake synthetic material or structure that can be used for various attack purposes. For the first time, to the best of our knowledge, this paper explains the security for face anti‐spoofing detection using linear discriminant analysis and validates the results by calculating HTER and accuracy on different databases (i.e., REPLAY ATTACK and CASIA). The proposed model, that is, three‐tier face anti‐spoofing detection model (3T‐FASDM), is used for the detection of the fake biometric user and works well for real‐time applications. The proposed methods tested on a set of state‐of‐the‐art anti‐spoofing features for the face mode gives a very low degree of complexity as 26 general image quality measures are applied to differentiate among legitimate and imposter samples. The outcomes obtained from publically available data show that this technique has improved performance and accuracy by analyzing the HTER and machine learning classifiers that are helpful to differentiate among real and fake traits.  相似文献   

3.
IEEE 802.15.4 Wireless Sensor Networks (WSNs) and IEEE 802.11b/g Wireless Local Area Networks (WLANs) are often collocated, causing a coexistence issue since these networks share the same 2.4GHz Industrial, Scientific, and Medical band. In our previous work, we built a coexistence model of IEEE 802.15.4 WSNs and IEEE 802.11b/g WLANs. By identifying three distinct coexistence regions, the model explained the coexistence behavior of IEEE 802.15.4 WSNs and IEEE 802.11b/g WLANs, and the model was experimentally validated. In this paper, we improve the model by introducing two important implementation factors: the transceiver’s Rx-to-Tx turnaround time and the Clear Channel Assessment partial detection effect. The enhanced model significantly improves the accuracy on explaining and predicting the coexistence performance of IEEE 802.15.4 WSNs in the real-life environment. Furthermore, under the guidance of the model, the coexistence performance of IEEE 802.15.4 WSNs is extensively investigated in various coexistence scenarios by analysis, simulation and experiments, respectively. The simulation and experimental results agree with our analysis. The coexistence model is believed to be helpful in resolving the coexistence issue.  相似文献   

4.
In this paper we consider the interconnection of an IEEE 802.15.4 body area network (BAN) in which nodes sense physiological variables such as electrocardiography (EKG), electroencephalography (EEG), pulse oximeter data, blood pressure and cardiac output, with an IEEE 802.11b room/ward WLAN. We model the operation of this two-tier network assuming that 802.15.4 BAN operates in CSMA-CA mode and that the BAN coordinator acts as the bridge which conveys BAN packets to the 802.11b access point. We analyze the two-hop network delay and discuss the mutual interaction of different data streams as well as impact of the number of bridges on packet delay.  相似文献   

5.
Throttling spoofed SYN flooding traffic at the source   总被引:2,自引:0,他引:2  
TCP-based flooding attacks are a common form of Distributed Denial-of-Service (DDoS) attacks which abuse network resources and can bring about serious threats to the Internet. Incorporating IP spoofing makes it even more difficult to defend against such attacks. Among different IP spoofing techniques, which include random spoofing, subnet spoofing and fixed spoofing, subnet spoofing is the most difficult type to fight against. In this paper, we propose a simple and efficient method to detect and defend against TCP SYN flooding attacks under different IP spoofing types, including subnet spoofing. The method makes use of a storage-efficient data structure and a change-point detection method to distinguish complete three-way TCP handshakes from incomplete ones. This lightweight approach makes it relatively easy to deploy the scheme as its resource requirement is reasonably low. Simulation experiments consistently show that our method is both efficient and effective in defending against TCP-based flooding attacks under different IP spoofing types. Specifically, our method outperforms others in achieving a higher detection rate yet with lower storage and computation costs. The research presented in this paper has been supported by a research grant from the Research Grants Council of the Hong Kong Special Administrative Region, China under the Area of Excellence (AoE) Scheme (Project No. AoE/E-01/99).  相似文献   

6.
IEEE802.15.4e networks adopt time-synchronized medium access control protocols which enables highly reliable and ultra-low power industrial wireless networks. In these networks, nodes use timeslot to communicate which need a high-precision time synchronization. In hostile environments, the time synchronization protocol may be destroyed by external, compromise or pulse-delay attacks. In this paper, we present a secure time synchronization for IEEE802.15.4e networks called STS_4e which includes a secure single-hop pair-wise time synchronization and a secure cluster-wise time synchronization. The secure pair-wise time synchronization adopts message integrity authentication mechanism to defend against external attacks and threshold filter algorithm to defend against compromise and pulse-delay attacks. The secure cluster-wise time synchronization adopts packet-based key chain to improve µTESLA broadcast authentication mechanism which can well balance the delay of disclosed keys and the length of key chain. Finally, we implement the STS_4e scheme on OpenMoteSTM node running OpenWSN. The results show that the proposed scheme can successfully defend against time synchronization attacks as well as the low energy consumption.  相似文献   

7.
李娟丽  梁立明  张骅 《现代导航》2017,8(4):253-256
针对 GPS 信号的码相关特性,本文提出一种基于 FFT 的卫星信号转发欺骗干扰检测方法,该方法可以一次性同时输出多个码相位对应的相关值。利用转发信号延迟于真实信号的特点,超过检测门限的滞后相关峰对应信号即为欺骗信号。经仿真验证,上述方法可以有效识别转发延迟不小于 1.5 个码片的欺骗干扰信号。  相似文献   

8.
Wireless Networks - Using efficiently the wireless sensor networks based on IEEE 802.15.4/zigbee remains a real challenge for the forest fire detection and monitoring applications. The most...  相似文献   

9.
The IEEE 802.15.4 standard has been introduced for low latency and low energy consumption in wireless sensor networks. To better support the requirements of industrial applications, where the use of this standard is limited, the low latency deterministic network (LLDN) mechanism of the IEEE 802.15.4e amendment has been proposed. In this paper, we develop a three dimensional Markov chain model for the IEEE 802.15.4e LLDN mechanism. Then, we estimate the stationary probability distribution of this chain in order to derive theoretical expressions of some performance metrics, as the reliability, energy consumption, throughput, delay and jitter. After that, we conduct a comparative study between the IEEE 802.15.4e LLDN and the IEEE 802.15.4 slotted carrier sense multiple access with collision avoidance (CSMA/CA). Numerical results show that the deterministic behavior of the LLDN mechanism significantly reduces the collision probability providing best performances in terms of reliability, energy consumption, throughput and delay compared to the IEEE 802.15.4 slotted CSMA/CA. Finally, the accuracy of our theoretical analysis is validated by Monte Carlo simulations.  相似文献   

10.
In this paper, we propose an indoor localization method in a wireless sensor network based on IEEE 802.15.4 specification. The proposed method follows a ranging-based approach using not only the measurements of received signal strength (RSS) but also the coordinates of the anchor points (APs). The localization accuracy depends on the errors in the distance estimation with the RSS measurements and the size of the polygon composed of the APs used for the lateration. Since errors are inevitably involved in the RSS measurement, we focus on reducing the size of the polygon to increase the localization accuracy. We use the centroid of the polygon as a reference point to estimate the relative location of a target in the polygon composed of the APs hearing the target. Once the relative position is estimated, only the APs covering the area are used for localization. We implement the localization method and evaluate the accuracy of the proposed method in various radio propagation environments. The experimental results show that the proposed method improves the localization accuracy and is robust against the dynamically changing radio propagation environments over time.  相似文献   

11.
This paper evaluates throughput of IEEE 802.15.4 network under the interference of a saturated IEEE 802.11 network using an analytic method. Packet losses due to both collisions among IEEE 802.15.4 and mutual interference between IEEE 802.15.4 and 802.11 are considered for throughput analysis. To include the interference from IEEE 802.11, we modified the state transition probabilities of IEEE 802.15.4 two-state Markov process model. Simulation results closely match the theoretical expressions confirming the effectiveness of the proposed model.  相似文献   

12.
Institute of Electrical and Electronics Engineers (IEEE) 802.15.4 is a protocol operating in media access control and physical layer, and it is commonly used in low‐power and low data‐rate wireless communications. In this paper, we develop a stochastic model for unslotted operations of IEEE 802.15.4 networks. Signal fading is an important factor in mobile communications. According to the level of fading, signal‐to‐noise ratio gets dynamically changing values. Given a pair of nodes communicating to each‐other in a mobile channel, the model calculates frame sizes providing maximum data‐rate of successful IEEE 802.15.4 transmissions. The experimental results in various environments are given in the paper to discuss the success of the model. In the consideration of real‐time operations, the model is improved to be operated in a low‐complexity hardware/software unit. According to experimental results presented in the paper, the proposed model seems to be suitable in mobile environments by achieving high data‐transfer rate for unslotted IEEE 802.15.4 protocol. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

13.
This paper investigates the maximum achievable channel throughput in a single‐channel and single‐hop wireless sensor network using IEEE 802.15.4 Medium Access Control (MAC) protocol. We introduce a simple mean‐field approach to model the Carrier Sense Multiple Access with Collision Avoidance mechanism of the 802.15.4 MAC protocol under unsaturated conditions. We derive a set of expressions such as optimal sensing rate of a sensor node, its corresponding failure probability, and the channel throughput for both saturated and unsaturated networks. With those expressions, we propose several network designs to achieve the optimal throughput by choosing the appropriate MAC parameters. We validate the proposed optimal designs using ns‐2 simulations. Furthermore, we evaluate the network lifetime expectancy of the optimal designs and compare it with the lifetime of network settings under saturated conditions that use the default MAC parameters of IEEE 802.15.4. Copyright © 2011 John Wiley & Sons, Ltd.  相似文献   

14.
In IEEE 802.15.4/ZigBee Wireless Sensor Networks (WSNs) a specific node (called the PAN coordinator or sink) controls the whole network. When the network operates in a multi-hop fashion, the position of the PAN coordinator has a significant impact on the performance: it strongly affects network energy consumption for both topology formation and data routing. The development of efficient self-managing, self-configuring and self-regulating protocols for the election of the node that coordinates and manages the IEEE 802.15.4/ZigBee WSN is still an open research issue. In this paper we present a cross-layer approach to address the problem of PAN coordinator election on topologies formed in accordance with the IEEE 802.15.4. Our solution combines the network formation procedure defined at the MAC layer by the IEEE 802.15.4 standard with a topology reconfiguration algorithm operating at the network layer. We propose a standard-compliant procedure (named PAN coordinator ELection – PANEL) to self-configure a IEEE 802.15.4/ZigBee WSN by electing, in a distributed way, a suitable PAN coordinator. A protocol implementing this solution in IEEE 802.15.4 is also provided. Performance results show that our cross-layer approach minimizes the average number of hops between the nodes of the network and the PAN coordinator allowing to reduce the data transfer delay and determining significant energy savings compared with the performance of the IEEE 802.15.4 standard.  相似文献   

15.
This paper analyzes the performance of error control strategies in IEEE 802.15.4 wireless sensor networks. ARQ schemes of the IEEE 802.15.4 are used and also we propose custom coding using BCH codes. The performance is analyzed through simulation using the energy efficiency parameter. Performance results are obtained for multi-hop networks with different channel conditions and packet sizes. The results have shown that the ARQ scheme and BCH codes are energy efficient for networks with high number of hops and low values of signal-to-noise ratio.  相似文献   

16.
陈建明  王亭岭 《通信技术》2010,43(7):133-135
针对IEEE802.15.4/Zigbee中信标使能模式,详细阐述了簇树拓扑结构的应用,并提出了单信标周期信标帧调度机制。重点讨论了时间窗口作为单一信标周期,以自由竞争方式,在超帧起始时刻发送信标。各协调器通过选择自由竞争时隙(CFTS)来确定发送时间偏移量,以避免与邻居信标帧碰撞。这种方法的优点是,不同簇在同一时刻进入激活期,因此临近节点间可直接通信,且无占空比要求。该方法的可行性已通过作者自己的IEEE802.15.4/Zigbee协议实验台得到验证。  相似文献   

17.
IEEE 802.15.4m TVWS Multi-Channel Tree PAN (TMCTP) standard that uses the vacant TV frequency of a region is the key to provide a flexible, scalable and cost-effective AMI smart grid networks. However, the performance of the IEEE 802.15.4m based AMI network can suffer from network interruption, varying transmission reliability and energy consumption problems due to the excessive number of channels and periodic channel scanning. To resolve these issues, we presented an enhanced IEEE 802.15.4m TMCTP called TVWS Orphan channel scanning with Multi-Channel Tree PAN Routing (TOMTPR). The proposed TOMTPR framework includes pilot-channel based Multi-Channel beaconing and interleaving-based TVWS orphan channel scanning. Furthermore, a capacity-aware routing tree is constructed during the neighbor discovery procedure. The proposed protocol suite is designed to provide compatibility with the IEEE 802.15.4 family standards with lower architecture complexity. The simulation results in presence of realistic AMI traffic and AMI network model show that TOMTPR can not only satisfy delay requirements of the AMI traffic, but also outperforms IEEE 802.15.4m TMCTP with IEEE 802.15.5 layer 2 mesh routing in terms of topology construction delay, end-to-end transmission reliability, and energy efficiency.  相似文献   

18.
Wireless body sensor networks are offered to meet the requirements of a diverse set of applications such as health‐related and well‐being applications. For instance, they are deployed to measure, fetch and collect human body vital signs. Such information could be further used for diagnosis and monitoring of medical conditions. IEEE 802.15.4 is arguably considered as a well‐designed standard protocol to address the need for low‐rate, low‐power and low‐cost wireless body sensor networks. Apart from the vast deployment of this technology, there are still some challenges and issues related to the performance of the medium access control (MAC) protocol of this standard that are required to be addressed. This paper comprises two main parts. In the first part, the survey has provided a thorough assessment of IEEE 802.15.4 MAC protocol performance where its functionality is evaluated considering a range of effective system parameters, that is, some of the MAC and application parameters and the impact of mutual interference. The second part of this paper is about conducting a simulation study to determine the influence of varying values of the system parameters on IEEE 802.15.4 performance gains. More specifically, we explore the dependability level of IEEE 802.5.4 performance gains on a candidate set of system parameters. Finally, this paper highlights the tangible needs to conduct more investigations on particular aspect(s) of IEEE 802.15.4 MAC protocol. Copyright © 2015 John Wiley & Sons, Ltd.  相似文献   

19.
IEEE 802.15.4是一个自组织的无线网络标准,其中制定了PHY层和MAC层规范,主要应用场合为低成本、低功耗、低复杂度的无线个域网.许多参数在IEEE 802.15.4标准中仅给出取值范围而并未给出确定的值,虽然这些值对系统性能有着较为显著的影响.个域网中的设备大量采用电池供电,因此实现更低的能量消耗是该网络标...  相似文献   

20.
A low power (9 mW) highly-digitized 2.4 GHz receiver for sensor network applications (IEEE 802.15.4 LR-WPAN) is realized by a 0.18 $mu{rm m}$ CMOS process. We adopted a novel receiver architecture adding an intermediate frequency (IF) level detection scheme to a low-power complex fifth-order continuous-time (CT) bandpass $SigmaDelta$ modulator in order to digitalize the receiver. By the continuous-time bandpass architecture, the proposed $SigmaDelta$ modulator requires no additional anti-aliasing filter in front of the modulator. Using the IF detector, the achieved dynamic range (DR) of the overall system is 95 dB at a sampling rate of 64 MHz. This modulator has a bandwidth of 2 MHz centered at 2 MHz. The power consumption of this receiver is 9.0 mW with a 1.8 V power supply.   相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号