The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Inspired by potential application in power systems and a fully distributed primal-dual method, we investigate how a novel distributed optimization algorithm can be used to solve the dispath response problem in power systems with a distributed manner, whose main target is to minimize the generation cost of the whole network. The problem we study here can be formulated as a kind of optimization problem,...
Security protocols are critical components for the construction of secure and dependable distributed applications, but their implementation is challenging and error prone. Therefore, tools for formal modelling and analysis of security protocols can be potentially very useful to support software engineers. However, despite such tools have been available for a long time, their adoption outside the research...
Radio frequency identification is a modern technology for item identification that has widely spread over the recent years. In order to securely identify the items and transfer their ownership from one entity to another, several authentication and ownership management protocols have been proposed. One of the recent protocols is Niu et al.'s EPC Class 1 Generation 2 RFID Standard Authentication and...
In this paper, based on minimum-time consensus, a distributed algorithm is proposed to solve economic dispatch problem (EDP). Firstly, The EDP is transformed to the average consensus problem and the ratio consensus protocol is utilized to address the average consensus problem over unbalanced directed topology. The proposed algorithm is implemented in a fully distributed fashion without using any global...
We develop foundations and several constructions for security protocols that can automatically detect, without false positives, if a secret (such as a key or password) has been misused. Such constructions can be used, e.g., to automatically shut down compromised services, or to automatically revoke misused secrets to minimize the effects of compromise. Our threat model includes malicious agents, (temporarily...
This paper is concerned with the fault detection (FD) problem for a class of networked systems. We introduce a novel communication protocol which is called the Round-Robin protocol (RRP) to overcome the limited communication capacity. Under the RRP protocol, sensor nodes are prearranged in a particular sequence, and communication between sensor and the receiving end is thus periodic. Such kind of...
The needs of random key generator on Android smartphones grow in line with applications which provide cryptographic services. Overcoming this we can use sensor on Android itself to be a key generator, that called Accelerometer sensor. However, raw data generated from this sensor are weak data sources because they have many slow drifts. According to those background, Hong & Liu proposed the protocol...
Recently, a framework has been developed to automate the training of prediction algorithms but has only been tested on one system. In order to generalize the approach a few key functions must be performed. One of these functions is load generation. Unfortunately, a valid load generator has not been developed for a Microsoft Windows active directory environment. In this paper we introduce and detail...
Energy-harvesting techniques for low-power embedded devices are opening up new opportunities for the design and optimization of security protocols for Green Wireless Sensor Networks. In this paper, we focus on scenarios where the energy resources of nodes in the network are heterogeneous, and propose a network-level solution that leverages the heterogeneity of harvesting capabilities to reduce the...
Trajectory-based message delivery is a message forwarding scheme that utilizes the message destination vehicle's trajectory to deliver messages to moving vehicles from infrastructure nodes such as roadside units in vehicular ad hoc networks. To support trajectory-based message delivery to moving vehicles, the driving locations of a vehicle need to be shared with message senders. However, from a security...
The use of Intelligent Electronic Devices (IEDs) in electrical substations has brought a great improvement in terms of speed, costs, maintenance, and reliability. In this context, the use of IEC 61850 standard appears as one of the main recommendations for substation automation in smart grids that digitally perform the electrical network control and protection. Nevertheless, this improvement may be...
Multi-resource arbitration is used where interchangeable resources need to be assigned among a number of client users. An efficient arbiter is thus critical to manage these shared resources. There has been only limited prior research on efficient asynchronous solutions, which have mainly focused on serial approaches. In this paper, a new high-throughput multi-resource arbiter is proposed, based on...
Data center applications require strict characteristics regarding packet loss, fairness, head-of-line blocking, latency, and low processing overhead. Motivated by the emergence of IEEE Data Center Bridging, we explore the possibility of controlling congestion in Ethernet layer while guaranteeing those requirements. We propose HetFlow (Heterogeneous Flow) as a delay-based congestion control mechanism...
Software systems nowadays communicate via a number of complex languages. This is often the cause of security vulnerabilities like arbitrary code execution, or injections. Whereby injections such as cross-site scripting are widely known from textual languages such as HTML and JSON that constantly gain more popularity. These systems use parsers to read input and unparsers write output, where these security...
This paper presents a centralized microgrid control system for effective operation of wind turbines and diesel engines coupled to a flywheel electrical storage component on Saint Paul Island. The wind turbines have sufficient capacity to support the entire island without using the diesel engines, allowing the formation of an islanded power system completely powered by renewables. The proposed strategy...
Concurrent Big Data applications often require high-performance storage, as well as ACID (Atomicity, Consistency, Isolation, Durability) transaction support. Although blobs (binary large objects) are an increasingly popular storage model for such applications, state-of-the-art blob storage systems offer no transaction semantics. This demands users to coordinate data access carefully in order to avoid...
Electricity market designs are continuously undergoing change in an effort to improve and respond to technology, economic and policy changes. Increasing amounts of variable re-newables are a catalyst for additional market evolution. Markets work best when there is transparency between market player. The creation of smarter distribution grid started by developing an advanced metering infrastructure...
In this paper we describe how we realized event-based signaling for large scale artificial robotic skin. We developed a new algorithm for the event generation on multi-modal skin cells. The skin cells have two modes, the conventional data sampling mode and the event mode. A comprehensive performance evaluation and comparison of these two modes is presented. We perform different experiments on our...
An interesting style for SoC (Systems-on-Chip) circuit design is the GALS (Globally Asynchronous, Locally Synchronous) paradigm, but its major drawback shows to be the asynchronous interfaces, especially when the GALS system is applied to a multi-point topology. The asynchronous interfaces found in literature are based on port controllers and can be called asynchronous wrappers (AW). They are responsible...
Duan proposed the first certificateless undeniable signature scheme in 2008. Later in 2012, Zhao and Ye proffered an efficient scheme which enjoys from a pairing-free sign algorithm. In this paper, we prove the insecurity of their efficient scheme by mounting two attacks on its invisibility and non-impersonation. In addition, we propose an improved scheme that addresses both of the above attacks while...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.