The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Delay and security are both highly concerned in the Internet of Things (IoT). In this paper, we set up a secure analytical framework for IoT networks to characterize the network delay performance and secrecy performance. Firstly, stochastic geometry and queueing theory are adopted to model the location of IoT devices and the temporal arrival of packets. Based on this model, a low-complexity secure...
The existing secure transmission methods based on fountain codes require a quite dominant quality of the main channel. In this paper, we propose a novel feedback-based method for fountain code to achieve stronger security. In the binary erasure channel model, the legitimate user shares the decoding situation with transmitter via feedback messages. The transmitter updates the coding process based on...
The traditional computing methods based SCS (Soil Conservation Service) model is of low efficiency and does not satisfy timeliness of some engineering applications in large and medium scale basin flood forecast. The streaming big data processing has the characteristics of cluster nonlinearity, parallel processing and high-efficient computational capability. In this paper, improved SCS model for flood...
Concerning the importance of security and privacy for Internet of Things (IoT) in the future fifth-generation networks, this paper studies physical layer security for IoT in the multi-tier ultra dense heterogeneous networks (UDHNs), where macro-cells overlaid by ultra dense deployed small-cells. In this paper, the locations of the ultra dense deployed base stations are modeling by Poisson cluster...
In the wireless position techniques for cellular networks, the traditional geolocation algorithms have been researched because of the advantage low complexity, however the representative LLOP algorithm does not well performed in the cellular networks since it is constrained with the geometry relationship between mobile station and the base stations. For the low accuracy problem of LLOP algorithm,...
There are still not qualitative analyzing methods to analyze EPC network entity threats. So the Attack Graph theory is brought in this paper. The current Attack Graph techniques have been adjusted due to the difference of EPC network and EPC network attack, so that they can be used to analyze the threats of EPC network entities. A Finite State Machine (FSM) represented the EPC net work is built and...
The security mechanism of LTE system, which provides radio communication and its services with secure network, is much more perfect than that of 3G. This paper puts forward a novel method for key derivation based on the idea of combination of vulnerabilities in both radio interface and core-network in perspective of eavesdropper. The radio child-keys are produced according to the security algorithm...
Wireless Mesh Network is a type of self-organization, self-healing and multi-hop network. The dynamic changes of the network topology and easy accessing of Wireless Mesh Network bring a great challenge to the security of Wireless Mesh Network. In this paper, we divide Wireless Mesh Network into five layers based on the different functions of nodes, and analyze the security threats in different functional...
Model checking is widely used in the verification of security protocols. However, difficulties were often encountered when trying to formalize the complex underlying computations in security protocols. Some flaws of the security protocols, especially the ones that caused by the computations weakness, cannot be detected owing to the simple abstractions of its underlying computations. In this paper,...
This paper presents details of a model checker for security protocols, called ASM-SPV (Abstract State Machines-Security Protocols Verifier), which employs the on-the-fly model checking technique as the convenient verification method and directly supports the whole Core- ASM language. Security protocol is modeled as distributed abstract state machines and the property to be verified is specified in...
This paper presents a tool called ASM-SPV (Abstract State Machines-Security Protocols Verifier) for verifying security protocols by model checking. In ASM-SPV, a security protocol is modeled by CoreASM language which is an executable ASM (Abstract State Machines) language. Then a modified CoreASM engine takes the CoreASM model of the protocol to build state space on-demand. Furthermore, security properties...
In heterogeneous wireless network, its open and interconnected characteristic challenges current secure mechanisms, To enhance the security and reduce the redundant identifiers of users, An access authentication scheme based on the non-redundant identifier is proposed. The scheme is to realize identifier authentication, through using identity separating storage, substitute transmission and identifier...
In downlink of OVSF CDMA system, such as WCDMA, Orthogonal Variable spreading factor (OVSF) codes are used as channelization codes to distinguish different physical channels in order to support variable bit rate services. So the allocation scheme of OVSF codes affects the utilization of downlink bandwidth and the performance of the whole network In this paper, we propose a reassignment code allocation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.