The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Goutham et al. proposed an ID-based user authentication with key agreement on elliptic curve cryptography(ECC), which is suitable to be applied in client-serverenvironment. The scheme mainly negotiates a temporary session key between two parties. However, we find that the scheme contains some security flaws, such as incomplete anonymity, no provision for updating private key and so on. In...
Energy efficiency is of utmost importance for wireless networks due to the prevalent usage of mobile devices in WLAN and wireless sensor networks (WSNs). Consequently, duty cycling MAC protocols are widely employed in both WLAN (i.e., power saving mode - PSM) and WSNs (i.e., low power listening - LPL)). In a coexisting PSM and LPL network, a significant energy efficiency degradation has been observed...
Deep learning with a large number of parametersrequires distributed training, where model accuracy and runtimeare two important factors to be considered. However, there hasbeen no systematic study of the tradeoff between these two factorsduring the model training process. This paper presents Rudra, aparameter server based distributed computing framework tunedfor training large-scale deep neural networks...
The Location-Based Services (LBSs) have attracted a lot of attention in recent years. For privacy concerns, there are abundant works focusing on the secure query over the location server. However, these works suffer from two main limitations. First, they cannot preserve the location privacy and content privacy simultaneously during LBS queries. Second, they do not support the ranked queries. In this...
With the advantages of vehicle networks, cloud computing, Vehicle Cloud Computing (VCC) has emerged, wins a lot of interests. In this paper, we propose an attack detection scheme in the VCC, that can detect the potential attacks launched by malicious vehicles, while preserving benign vehicles' privacy. First of all, we propose a distributed secret key distribution scheme, where multiple authorities...
As a comprehensive theoretical framework to investigate the strategic choice in complex systems, evolutionary games on multilayer networks or networks of networks have recently gained increasing attention. Previous works have been devoted to investigate the evolutionary game on multilayer networks, but concentrated mainly on the evolution of cooperation. Thus, the purpose of this paper is to explore...
Although wireless sensor networks are widely used in recent years, it remains a big security risk in the transmission of information and energy consumption of the nodes. By summarizing the existing wireless sensor networks attack measures, this paper proposes a way to attack wireless sensor networks by wireless injection, at different times fake nodes is disguised as acquisition nodes and transmission...
Raptor code, as one of the most popular forward error correction codes, has been widely used for reliable transmission over wireless channels. However, there's no standard and effective error checking mechanism in Raptor. In this paper, we fill CRC value in each encoded packet and propose an improved CRC coding approach for Raptor. In our algorithm, we lower the CRC computational complexity by generating...
The use of Network Function Virtualization to run network services in software enables Software Defined Networks to create a largely software-based network. We envision a dynamic and flexible network that can support a smarter data plane than just simple switches that forward packets. This network architecture needs to support complex stateful routing of flows where processing by network functions...
Botnet, a network of computers that are compromised and controlled by the attacker, is one of the most significant and serious threats to the Internet. Researchers have done plenty of research and made significant progress. As the extensive use and unique advantages of peer-to-peer (P2P) technology, the new advanced form of botnets with the P2P architecture have emerged and become more resilient to...
Falls result in substantial disability, morbidity, and mortality among older people. Early detection of fall risks and timely intervention can prevent falls and injuries due to falls. Simple field tests, such as repeated chair rise, are used in clinical assessment of fall risks in older people. Development of on-body sensors introduces potential beneficial alternatives for traditional clinical methods...
Secure and efficient data storage and computation for an outsourced database is a primary concern for users, especially with the push for cloud computing that affords both compute and resource scalability. Among the diverse secure building blocks for secure analytical computations on outsourced databases, the encrypted set intersection operation extracts common sensitive information from datasets...
Since the seminal work of Gupta and Kumar, extensive research has been done on studying the capacity of large wireless networks under various scenarios. Most of the existing work focuses on studying the capacity of networks with uniformly or Poissonly distributed nodes. While uniform and Poisson distribution form an important class of spatial distributions, their capability in capturing the spatial...
DF-AF selection MIMO relaying, where the relay equipped with multiple antennas can adaptively switch between decode-and-forward (DF) protocol and amplify-and-forward (AF) protocol according to its decoding state of the source message, is investigated in cooperative networks. We consider orthogonal space-time block coded transmission for a DF-AF selection MIMO relaying system in Rayleigh fading environment,...
The current sensor networks are assumed to be designed for specific applications, having strongly coupled data communication protocols. The future sensor networks are envisioned as comprising heterogeneous devices assisting to a large range of applications. To achieve this goal, we propose a Web Services approach for the design of sensor networks, in which sensor nodes are service providers and applications...
In order to enable users to get instant messages with mobile phone equipments at any time and any place, a new platform of XMPP-based SMS gateway was put forward. The designation and implementation of XMPP-based SMS gateway were introduced in detail. A further deep analysis on the format of XMPP message was made to make sure the rationality of the extension of XML. Meanwhile, controlling of GSM modem...
In order to use the electricity resources even more intelligent, efficient and safer, the concept of intelligent home electricity system was presented. Based on the analysis of the requirement of the intelligent home electricity system, the Home Gateway and SPO (Smart Power Outlet) were designed to integrate the isolated WSN (Wireless Sensor Network) and the Internet to achieve communication between...
The Rudolph attacks, dictionary attacks in general password-based encrypted mechanism and replay attacks were analyzed in this paper. A new improved DAA scheme was proposed, it based on a bilinear pairing mechanism and Frequency Certificates, improved the JOIN and SIGNING protocol, and added a Trusted Synergic Third Party. The Trusted Synergic Third Party participated in generating public keys between...
Geo-information network service has become more and more popular; however the practical application of vector data service is rare used. The main reasons are as follows: firstly, with the variety of vector data formats, the general format conversion cannot be applied data shared services; Secondly, Existing vector data service interface standard (such as WFS) is too simple, which doesn't meet the...
We consider a set of cognitive nodes cooperatively sensing the activities of a primary system. Two cooperative protocols are proposed, where cognitive nodes opportunistically transmit to each others, and finally each node makes a decision based its own observations. In the first protocol (Protocol~1), a node relays the signal received from the primary to the other nodes only if the signal energy is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.