This paper is to describe a novel approach of building a secure and anonymous yet transparent and immutable identification management system. A consortium block chain with delegated proof of stack (DPOS) is used to bu...
详细信息
ISBN:
(纸本)9781509062966
This paper is to describe a novel approach of building a secure and anonymous yet transparent and immutable identification management system. A consortium block chain with delegated proof of stack (DPOS) is used to build consensus based user credential. It can be used to provide ID related services to various applications including internet social media in which human being is identified from social bots. A prototype shows that such ID management system is feasible. It is also immune to many id attacks.
In a wireless body area sensor network (WBAN), biosensors are implanted or worn on an individual to acquire medical data for a clinical diagnosis or physical monitoring. Traditionally, authentication and cryptography ...
详细信息
ISBN:
(纸本)9781479932474;9780769550237
In a wireless body area sensor network (WBAN), biosensors are implanted or worn on an individual to acquire medical data for a clinical diagnosis or physical monitoring. Traditionally, authentication and cryptography techniques are used to achieve the data confidentiality and privacy of a WBAN system. However, for WBAN systems, besides data itself, the pattern of data transmission may leak critical information about the user. For example, various medical sensors deliver data in different patterns and these patterns leak many critical facts, e. g., what sensors are used (which implies diseases the individual may have), and how frequent the sensor is sampling (which implies how urgent some abnormal observation is about a patient). In this work, to address this challenge, we design a regulator, which packs real data session into a type-independent transmission model at transmission layer. All valid data packets are equably sent at the frequency defined by the regulator and at the same length to clutter the inherent pace of valid data transmission and other parameters. We also propose a strategy PAS to minimize the overhead while preventing attackers from locating the patients. Our extensive experiments validate our regulator and PAS design.
Energy efficiency in wireless sensor network has gained important. Energy efficient routing algorithms are proposed to increase the lifetime of the network. Routing energy is consumed in topology assessesments where t...
详细信息
ISBN:
(纸本)9781467345286
Energy efficiency in wireless sensor network has gained important. Energy efficient routing algorithms are proposed to increase the lifetime of the network. Routing energy is consumed in topology assessesments where the sink broadcast the message and after receiving the acknowledgement assesses the current topology of the network. Our work studies the topological behavior of WSN and proposed an algorithm which can maximize the lifetime by reducing communication overheads increase due to topology assessments.
Three practical meteorological applications with different characteristics are used to highlight the usability of a computer science workflow middleware called ASKALON by allowing easy access to distributedcomputing ...
详细信息
ISBN:
(纸本)9781479927302
Three practical meteorological applications with different characteristics are used to highlight the usability of a computer science workflow middleware called ASKALON by allowing easy access to distributedcomputing for atmospheric scientists. Utilizing Cloud and Grid computing, this paper shows use case scenarios fitting a wide range of applications from operational to research studies with real world examples from meteorological research. The paper concludes that distributedcomputing is easily usable for meteorological problems using ASKALON. This powerful tool allows simple and cost effective access to computing capacity from Grid and Cloud environments.
The complexity of distributedcomputingsystems and their increasing interaction with the physical world impose challenging requirements in terms of adaptation, robustness, and resilience to attack. Based on their rel...
详细信息
ISBN:
(纸本)9781424448906
The complexity of distributedcomputingsystems and their increasing interaction with the physical world impose challenging requirements in terms of adaptation, robustness, and resilience to attack. Based on their reliance on heuristics, algorithms for consensus, where members of a group agree on a course of action, are particularly sensitive to these conditions. Given the ability of natural organisms to respond to adversity, many researchers have investigated biologically-inspired approaches to designing robust distributedsystems. In this paper, we describe a study in the use of digital evolution, a type of artificial life system, to produce a distributed behavior for reaching consensus. The evolved algorithm employs a novel mechanism for probabilistically reaching consensus based on the frequency of messaging. Moreover, this design approach enables us to change parameters based on the specifics of the desired system, with evolution producing corresponding flavors of consensus algorithms. Our results demonstrate that artificial life systems can be used to discover solutions to engineering problems, and that experiments in artificial life can inspire new studies in distributed protocol development.
暂无评论