Table Of ContentIlsun You · Fang-Yie Leu
Hsing-Chung Chen · Igor Kotenko (Eds.)
Communications in Computer and Information Science 797
Mobile Internet Security
First International Symposium, MobiSec 2016
Taichung, Taiwan, July 14–15, 2016
Revised Selected Papers
123
Communications
in Computer and Information Science 797
Commenced Publication in 2007
Founding and Former Series Editors:
Alfredo Cuzzocrea, Xiaoyong Du, Orhun Kara, Ting Liu, Dominik Ślęzak,
and Xiaokang Yang
Editorial Board
Simone Diniz Junqueira Barbosa
Pontifical Catholic University of Rio de Janeiro (PUC-Rio),
Rio de Janeiro, Brazil
Phoebe Chen
La Trobe University, Melbourne, Australia
Joaquim Filipe
Polytechnic Institute of Setúbal, Setúbal, Portugal
Igor Kotenko
St. Petersburg Institute for Informatics and Automation of the Russian
Academy of Sciences, St. Petersburg, Russia
Krishna M. Sivalingam
Indian Institute of Technology Madras, Chennai, India
Takashi Washio
Osaka University, Osaka, Japan
Junsong Yuan
Nanyang Technological University, Singapore, Singapore
Lizhu Zhou
Tsinghua University, Beijing, China
More information about this series at http://www.springer.com/series/7899
Ilsun You Fang-Yie Leu
(cid:129)
Hsing-Chung Chen Igor Kotenko (Eds.)
(cid:129)
Mobile Internet Security
First International Symposium, MobiSec 2016
–
Taichung, Taiwan, July 14 15, 2016
Revised Selected Papers
123
Editors
Ilsun You Hsing-Chung Chen
Department ofInformation Security AsiaUniversity
Engineering Taichung
SoonchunhyangUniversity Taiwan
Chungcheongnam-do
Igor Kotenko
Korea (Republicof)
SPIRAS
Fang-Yie Leu St.Petersburg
Tunghai University Russia
Taichung
Taiwan
ISSN 1865-0929 ISSN 1865-0937 (electronic)
Communications in Computer andInformation Science
ISBN 978-981-10-7849-1 ISBN978-981-10-7850-7 (eBook)
https://doi.org/10.1007/978-981-10-7850-7
LibraryofCongressControlNumber:2017962911
©SpringerNatureSingaporePteLtd.2018
Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe
material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other physical way, and transmission or information
storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow
knownorhereafterdeveloped.
Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication
doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant
protectivelawsandregulationsandthereforefreeforgeneraluse.
Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare
believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin
publishedmapsandinstitutionalaffiliations.
Printedonacid-freepaper
ThisSpringerimprintispublishedbySpringerNature
TheregisteredcompanyisSpringerNatureSingaporePteLtd.
Theregisteredcompanyaddressis:152BeachRoad,#21-01/04GatewayEast,Singapore189721,Singapore
Preface
During the past two decades, mobile Internet technologies have been dramatically
growing while leading to a paradigm shift in our life. Despite their revolution, mobile
Internettechnologieshaveopenedthedoortovarioussecuritythreats,whichshouldbe
addressedtokeepmobileInternetenvironmentssecureandtrustworthy.Moreover,the
latest technologies (e.g., distributed mobility management, mobile Internet of Things,
5Gnetworks,andsoforth)continuouslyintroducenewsecuritychallenges.Therefore,
it is of paramount importance to study mobile Internet security.
Thisvolumecontainsrevisedandselectedpaperspresentedatthe2016International
SymposiumonMobileInternetSecurityheldinTaichung,Taiwan,duringJuly14–15,
2016. The purpose of MobeSec 2016 was to bring together academic and industry
professionalsworkingondifferentaspectstoexchangeideasandexplorenewresearch
directionsforaddressingthechallengesinmobileInternetsecurity.MobeSecalsoaims
to publish high-quality papers that are closely related to various theories and practical
applicationsinmobilitymanagementhighlightingthestate-of-the-artresearch.Inspite
of focusing on security aspects, this symposium welcomes papers that are related to
mobile Internet technologies. We believe that MobeSec 2016 was a trigger for further
research and technology improvements related to this important subject.
MobeSec2016providedaninternationalforumforsharingoriginalresearchresults
amongspecialistsinfundamentalandappliedproblemsofmobileInternetsecurity.The
symposium was organized by the SCH Laboratory of Mobile Internet Security and
KISM SIGSMC (Smart Media Convergence), and technically supported by
KISM SIGSMC in cooperation with Asia University, Tunghai University, and
Soonchunhyang University.
A total of 45 papers related to significant aspects of the theory and applications of
mobile security were accepted for presentation at MobeSec 2016. Moreover, this
symposium was further enriched by the invited talks of Prof. Shain-Shyong Tseng
(VicePresidentofAsiaUniversity,Taiwan)andDr.JoonsangBaek(KUSTAR,UAE).
From all the papers, only 15 were selected for publication in this CCIS volume.
The success of the symposium was assured by the team effort of the sponsors,
organizers,reviewers,andparticipants.Wewouldliketoacknowledgethecontribution
of the individual Program Committee members and thank the reviewers. Our sincere
gratitude goes to the participants of the conference and all authors of the submitted
papers.
WewishtoexpressourgratitudetoSpringerandinparticularAlfredHofmannand
his team for their help and cooperation.
August 2017 Ilsun You
Fang-Yie Leu
Hsing-Chung Chen
Igor Kotenko
Organization
General Co-chairs
Ilsun You Soonchunhyang University, South Korea
Fang-Yie Leu Tunghai University, Taiwan
Program Co-chair
Hsing-Chung Chen Asia University, Taiwan
Publication Chair
Igor Kotenko SPIRAS, Russia
International Advisory Committee
Pankoo Kim Chosun University, South Korea
Karl Andersson Lulea University of Technology, Sweden
Program Committee
Hyobum Ahn Kongju National University, South Korea
Benjamin Aziz University of Portsmouth, UK
Cui Baojiang Beijing University of Posts and Telecommunications,
China
Mala Chelliah National Institute of Technology, India
Andrey Chechulin Bonch-BruevichStateUniversityofTelecommications,
Russia
Chin-Ling Chen Chaoyang University of Technology, Taiwan
Justin Chen National Ilan University, Taiwan
Seong-je Cho Dankook University, South Korea
Junho Choi Chosun University, South Korea
Chang Choi Chosun University, South Korea
Yao-Hsin Chou National Chi-Nan University, Taiwan
Luigi Coppolino Epsilon Srl., Italy
Salvatore D’Antonio Università degli Studi di Napoli Parthenope, Italy
Tianhan Gao Northeastern University, China
Jianfeng Guan Beijing University of Posts and Telecommunications,
China
Nan Guo Northeastern University, China
Yi-Li Huang Tunghai University, Taiwan
Yung-Fa Huang Chaoyang University of Technology, Taiwan
VIII Organization
Shinsaku Kiyomoto KDDI, Japan
Seng-Tarng Lai Shih-Chien University, Taiwan
Yong-Hwan Lee Far East University, South Korea
Jae Deok Lim ETRI, South Korea
Fabio Martinelli The Institute of Informatics and Telematics, Italy
Alessio Merlo University of Genoa, Italy
Mauro Migliardi University of Padua, Italy
Evgenia Novikova Electrotechnical University LETI, Russia
Vladimir A. Oleshchuk University of Agder, Norway
Kyung-hyune Rhee Pukyong National University, South Korea
Roland Rieke Fraunhofer SIT, Germany
Igor Saenko Signal Academy, Russia
Kunwar Singh National Institute of Technology, India
Fei Song Beijing Jiaotong University, China
Hui-Kai Su National Formosa University, Taiwan
Kun-Ling Tsai Tunghai University, Taiwan
Shian-Shyong Tsenga Asia University, Taiwan
Chien-Erh Weng National Kaohsiung Marine University, Taiwan
Isaac Woungang Ryerson University, Canada
Akihiro Yamamura Akita University, Japan
Cheng-Ying Yang University of Taipei, Taiwan
Jeong Hyun Yi Soongsil University, South Korea
Chia-Mu Yu Yuan Ze University, Taiwan
Baokang Zhao National University of Defense Technology, China
Contents
Performance on Clustering Routing for Naturally Deployed Wireless
Sensor Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Yung-Fa Huang, Jyu-Wei Wang, John Jenq, Hsing-Chung Chen,
and Chung-Hsin Hsu
Mobile Security Assurance for Automotive Software Through ArchiMate . . . 10
Nobuhide Kobayashi, Shuji Morisaki, and Shuichiro Yamamoto
A Generalized Data Inconsistency Detection Model
for Wireless Sensor Networks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Tzu-Liang Kung and Hsing-Chung Chen
Building a Frame-Based Cyber Security Learning Game . . . . . . . . . . . . . . . 32
Yuh-Jye Wang, Shian-Shyong Tseng, Tsung-Yu Yang,
and Jui-Feng Weng
Personal Identification Using Time and Frequency Domain Features
of ECG Lead-I . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Gyu Ho Choi, Hae Min Moon, and Sung Bum Pan
A Secure Color-Code Key Exchange Protocol for Mobile
Chat Application. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Hsing-Chung Chen, Hong Chang, Tzu-Liang Kung, Yung-Fa Huang,
Ze-Min Lin, Pei-Chi Yeh, and Qiu-Hua Ruan
Design and Implementation of SPEEX Speech Technology
on ARM Processor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Chia-Chi Chang and Yen-Hao Shih
A Discrete Wavelet Transformation Based Fast and Secure
Transmission of Images for Group Communication. . . . . . . . . . . . . . . . . . . 80
M. Sridevi, C. Mala, and S. Lakshmi Prabha
An Automated Graph Based Approach to Risk Assessment
for Computer Networks with Mobile Components. . . . . . . . . . . . . . . . . . . . 95
Elena Doynikova and Igor Kotenko
Assessment of Computer Network Resilience Under Impact of Cyber
Attacks on the Basis of Stochastic Networks Conversion. . . . . . . . . . . . . . . 107
Igor Kotenko, Igor Saenko, Oleg Lauta, and Mikhail Kocinyak
X Contents
The Cryptanalysis of WPA & WPA2 Using the Parallel-Computing
with GPUs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
TienHo Chang, Chiamei Chen, Hanwei Hsiao, and GuHsin Lai
A Policy Management System Based on Multi-dimensional
Attribution Label. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Bosong Liu, Jianfeng Guan, and Zhongbai Jiang
Access Control for Cross-Border Transfer of Sensor Data . . . . . . . . . . . . . . 143
Seira Hidano, Shinsaku Kiyomoto, Abdur Rahim Biswas,
Toshihiro Uchibayashi, and Takuo Suganuma
Security Analysis Oriented Physical Components Modeling
in Quantum Key Distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154
Xilong Mao, Yan Li, Yan Peng, and Baokang Zhao
A Novel Hybrid Architecture for High Speed Regular
Expression Matching. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164
Chengcheng Xu, Baokang Zhao, Shuhui Chen, and Jinshu Su
Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175