The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In industrial applications synchronized sensor nodes are vital for many tasks like multi parameter sampling of complex machinery behavior. The wirelessly connected nodes are usually synchronized to a base station. Therefore, frequency or period estimation of the reference clock is a key issue for all connected tasks like sampling, localization or applying energy optimized communication protocols....
Signature-based Network Intrusion Detection Systems (NIDS) are an integral part of modern network security solutions. They help to detect and prevent network attacks and intrusions. However, they show critical performance problems in today's high speed networks. Filters have been proposed to reduce the amount of traffic to be analyzed by a NIDS, yet, such filters need to be very carefully designed...
We present a feasibility analysis of the controlled delivery power grid (CDG) that uses aggregated power request by users to reduce communications overhead. The CDG, as an approach to the power grid, uses a data network to communicate requests and grants of power in the distribution of electrical power. These requests and grants allow the energy supplier know the power demand in advance and to designate...
Electric vehicles are becoming parts of our daily lives with the increasing investment from auto industry. However, their charging is an issue as this requires frequent charging and longer waiting times compared to traditional gasoline-based vehicles. The charging is typically done at residential or public charging stations. With the increased dominance of electric vehicles, one potential solution...
In this paper, we investigate multi-message authentication to combat adversaries with infinite computational capacity. An authentication framework over a wiretap channel (W_1, W_2) is proposed to achieve information-theoretic security with the same key. The proposed framework bridges the two research areas in physical (PHY) layer security: secure transmission and message authentication. Specifically,...
Non-malleable commitments, introduced by Dolev, Dwork and Naor (STOC 1991), are a fundamental cryptographic primitive, and their round complexity has been a subject of great interest. And yet, the goal of achieving non-malleable commitments with only one or two rounds} has been elusive. Pass (TCC 2013) captured this difficulty by proving important impossibility results regarding two-round non-malleable...
Non-malleable commitments are a fundamental cryptographic tool for preventing against (concurrent) man-in-the-middle attacks. Since their invention by Dolev, Dwork, and Naor in 1991, the round-complexity of non-malleable commitments has been extensively studied, leading up to constant-round concurrent non-malleable commitments based only on one-way functions, and even 3-round concurrent non-malleable...
For any n-bit boolean function f, we show that the randomized communication complexity of the composed function f o g^n, where g is an index gadget, is characterized by the randomized decision tree complexity of f. In particular, this means that many query complexity separations involving randomized models (e.g., classical vs. quantum) automatically imply analogous separations in communication complexity.
Due to its modularity and scalability, modular multilevel converter is a promising topology for medium voltage applications, such as energy storage or motor drives. Because of the large number of modules, the wiring can become complex if the conventional star topology communication network is used. To solve this issue, a communication link that uses a ring topology to connect the central controller...
Long transactions, high concurrency, and frequent activity situations occur in many areas. The intermediate process of long transactions in the process of execution is more, in the process, therefore, can not avoid frequent access to the data, the system overhead of the data access process is relatively large, which reduces the efficiency of the system and increase the pressure of the server. The...
Some enterprises would place their core business system in the enterprise network and cut off the connection with the external network, in order to prevent network attacks from outside. Enterprises often need to move business data from the external network to the enterprise network. There will be needs of across-network transmission. In this paper, a one-way transmission technology in network isolation...
Critical infrastructures conduct important services for the countries where they are via help of SCADA (Supervisory Control and Data Acquisition) systems/networks. Even little hitches in these services cause severe economic and environmental damage to countries where these systems are. When the SCADA systems used at the first time, unsecured communication protocols were not considered as a threat...
With the rapid development of the Internet, especially in recent years, the development of mobile Internet is increasingly rapid. Message push, which is an important way for mobile client to publish information and make communication, plays a significant role in mobile Internet. MQTT protocol is one of the implementation technologies of message push in Android system with low power consumption and...
This paper presents a kind of architecture design of bus based CNC system of domestic-processor based on Loongson and analyzes both the design of module structure of domestic-processor based on Loongson and the function and implementation method of MII bus based CNC main control board. These studies can solve the problem of chip of domestic NC system chip and have great significance to improve the...
In today's highly competitive market, the industry must focus on production yield to keep a competitive advantage. Through Automatic Optical Inspection (AOI) or Automated Visual Inspection (AVI), products can be monitored the situation and improved the quality of production. With the development of network technology, operators can use the graphical user interface (GUI) to capture remote visual images...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
In order to ensure that the message is fresh, both the identity of the communication and the shared key in the session are reliable, while avoiding the defects of the old message retransmission attack and identity posing in the native NS protocol, the optimized protocol adopts the means by which the receiver communicates with the key distribution center, and add the sender's identity and the temporary...
In order to succeed in updating ECU program without specific downloader, this paper designed and developed a Bootloader based on CCP protocol, which has the advantages of high flexibility, good portability. This system uses three steps– import of Bootloader, operation of the Bootloader and import of new ECU program–to realize online program upgrade for freescale chip MC9S12P64. Finally, this thesis...
Engineering of medical informatics systems is a complex work because it is at the intersection of several critical domains, among which medicine, computer science, electrical engineering to mention just a few. One critical aspect of such systems is the interoperability of the different components. One key solution for the interoperability is the creation of good standards that will assure the interchange...
The measurement of consumption of public services such as drinking water and electric energy, and information management is one of the problems facing intelligent cities. In this article we describe the design of a computer system that allows the management and administration of consumption records made by smart meters that communicate through MQTT using mobile telecommunications networks. The results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.