Identity management systems enable users (i.e., provers) to authenticate and provide attributes to verifiers by using certified credentials obtained from an authority. To accept such a credential, verifiers require in...
详细信息
ISBN:
(纸本)9781665403924
Identity management systems enable users (i.e., provers) to authenticate and provide attributes to verifiers by using certified credentials obtained from an authority. To accept such a credential, verifiers require information on whether the presented credentials are still valid or if they have been revoked. Up-to-date revocation information can be obtained from a revocation database;however, this requires that the verifier or prover is online. The problem becomes more interesting in the offline case when the prover (e.g., citizen) and verifier (e.g., police officer) do not have an Internet connection to query the revocation status of the presented credential (e.g., digital driver's license). In this paper, we extend the Self-Sovereign Identity (SSI) model to support both revocation as well as offfine-verification. Our concept introduces attestations of validity for a point in time, which are issued by the SSI network for credentials that have not been revoked, i.e., added by authorized entities to a revocation list. The concept aims to be generic so that it can be used for various use cases, e.g., by giving users the control over the frequency of re-attestation. To show our concept's feasibility and practicality, we developed and evaluated an implementation that includes an efficient and privacy-preserving showing of credentials using non-interactive zero-knowledge proofs, all while being offline.
In the field of emerging software architectures, there has been a dramatic push towards flexible and sandboxed software modules that allow systems to safely execute untrusted code in a guaranteed side-effect free mann...
详细信息
ISBN:
(纸本)9781728163307
In the field of emerging software architectures, there has been a dramatic push towards flexible and sandboxed software modules that allow systems to safely execute untrusted code in a guaranteed side-effect free manner. Latest developments have further given rise to portable and statically validatable representations of software in a bytecode format like WebAssembly. In order to ease the segue into the domain of embedded systems, this paper explores the feasibility of a novel and easily retargetable streaming quasi-singlepass on-target-compiler topology with concurrent bytecode validation. For this, a generalized compile-time virtual stack is employed which is logically partitioned into separately emittable blocks (named valent-blocks). This forms the foundation of a corresponding runtime for resource constrained systems that demonstrate the need for predictable, resource-efficient and fast sandboxed execution of hot-loaded software. This paper further benchmarks the resultant performance against current popular competing standalone WebAssembly runtimes.
Internet of Things (IoT), which connects a large number of devices with wireless connectivity, has conic into the spotlight. As the scope of IoT applications becomes wider, we observe a surge of mission-critical IoT s...
详细信息
ISBN:
(纸本)9781728154978
Internet of Things (IoT), which connects a large number of devices with wireless connectivity, has conic into the spotlight. As the scope of IoT applications becomes wider, we observe a surge of mission-critical IoT services, e.g., industrial automation systems and medical IoT systems, requiring to satisfy stringent latency, reliability, and/or energy efficiency guarantees. For this purpose, a new MAC, called Time Slotted Channel 1 lopping (TSCH), has been standardized in ieee 802.15.4e. However, it is challenging to design a distributed scheduling protocol that achieves the required QoS and energy efficiency at the same time due to complicated tradeoff (providing enough number of slots for QoS vs. minimizing scheduled slots for energy efficiency). In this paper, we propose a novel framework for providing QoS, called SSAP, which is designed to maximize network lifetime in a distributed fashion while satisfying given reliability and latency requirements. TO this end, we decompose our goal into two crucial design components: (i) scheduling of slot and channel, and (ii) control of medium access period, each of which is performed by low-complexity and distributed mechanisms. To the best of our knowledge, this paper is the first work to comprehensively handle multiple QoSes for TSCH-based IoT networks. We implement SSAP in Contiki OS and perform extensive simulations and real experiments under various scenarios. Our evaluation results demonstrate that SSAP satisfies highly reliable communication and latency requirements while having the network lifetime that is 1.6 times longer compared to existing protocols for TSCH.
The density matrix renormalization group (DMRG) algorithm is a powerful tool for solving eigenvalue problems to model quantum systems. DMRG relies on tensor contractions and dense linear algebra to compute properties ...
详细信息
ISBN:
(纸本)9781728199986
The density matrix renormalization group (DMRG) algorithm is a powerful tool for solving eigenvalue problems to model quantum systems. DMRG relies on tensor contractions and dense linear algebra to compute properties of condensed matter physics systems. However, its efficient parallel implementation is challenging due to limited concurrency, large memory footprint, and tensor sparsity. We mitigate these problems by implementing two new parallel approaches that handle block sparsity arising in DMRG, via Cyclops, a distributed memory tensor contraction library. We benchmark their performance on two physical systems using the Blue Waters and Stampede2 supercomputers. Our DMRG performance is improved by up to 5.9X in runtime and 99X in processing rate over ITensor, at roughly comparable computational resource use. This enables higher accuracy calculations via larger tensors for quantum state approximation. We demonstrate that despite having limited concurrency, DMRG is weakly scalable with the use of efficient parallel tensor contraction mechanisms.
The animal aggregation has attracted many attentions in different studies for decades. A reported model of the coordinated behaviour of animals using the nearest neighbour rule has inspired many algorithms in Mobile S...
详细信息
ISBN:
(纸本)9781665495516
The animal aggregation has attracted many attentions in different studies for decades. A reported model of the coordinated behaviour of animals using the nearest neighbour rule has inspired many algorithms in Mobile sensor Networks (MSNs) to optimise their coverage performance. However, the energy consumption, fault tolerance and finally, the coverage performance of these algorithms are not efficient. In this paper, a novel distributed node deployment algorithm, Nearest Neigh-bour based Node Deployment Algorithm, NNND, is proposed to enhance the performance of the requested coverage. In the NNND algorithm not only the full coverage purpose is fulfilled, but also the flexibility of accommodating several pivotal sensor nodes guided to a parallelism movement of sensor nodes that reduces the consumed energy significantly is provided. In our extensive simulation study in different configurations, NNND surpasses the performance evaluation in comparison to a well-known algorithm. The obtained result confirms enormous less energy consumption.
It is considered that Electronic Votes is an alternative of safer systems, which provides greater confidence and transparency to the general public, but the problems exist in the organisms that manage this process. Th...
详细信息
Modern cities and their citizens rely on a vast availability of urban data to offer high living standards. In the past, various systems have been developed to address this problem by providing platforms for collecting...
详细信息
The centralized computing model in traditional Wireless sensor/Actuator Networks (WSANs) can lead to large delays and unbalances, which severely restricts the adoption of WSANs in applications requiring high network p...
详细信息
ISBN:
(纸本)9781728149646
The centralized computing model in traditional Wireless sensor/Actuator Networks (WSANs) can lead to large delays and unbalances, which severely restricts the adoption of WSANs in applications requiring high network performance. To address this limitation, the in-network computation model has been proposed, in which the computation capability is distributed among wireless nodes in WSANs, i.e., wireless nodes perform not only data communication but also data processing. Node placement is a primary step to build the underlaying topologies of WSANs. Nevertheless, the problem of node placement to design underlaying network topologies supporting in-network computation is still unexplored. To this end, we propose an In-network oriented Node Placement Algorithm (INPA) to build WSANs supporting in-network computation. Moreover, we investigate the time complexity of INPA and verify the efficiency of INPA through extensive simulations.
The proceedings contain 8 papers. The topics discussed include: converting driving scenario framework for testing self-driving systems;unit testing framework for embedded component systems;an iterative approach to aut...
ISBN:
(纸本)9781665404006
The proceedings contain 8 papers. The topics discussed include: converting driving scenario framework for testing self-driving systems;unit testing framework for embedded component systems;an iterative approach to automate the tuning of continuous controller parameters;run-time hardware Trojan detection and recovery for third-party IPs in SoC FPGA;trusted video streams in camera sensor networks;estimation method considering OS overheads for embedded many-core platform;efficient difference analysis algorithm for runtime requirement degradation under system functional fault;and unit testing framework for embedded component systems.
This paper reports a multi-band surface-enhanced molecular detection technique induced by bright-dark coupling in the mid-IR fingerprint region. Our device enables the excitation of four plasmonic resonances (3 mu m, ...
详细信息
ISBN:
(纸本)9781728135816
This paper reports a multi-band surface-enhanced molecular detection technique induced by bright-dark coupling in the mid-IR fingerprint region. Our device enables the excitation of four plasmonic resonances (3 mu m, 5.6 mu m, 6.9 mu m, and 7.4 mu m) covering an ultra-wide spectral range, which paves the way to molecule recognition from the whole IR fingerprint region. The multi-band plasmonic sensor with ultra-wide continuous resonance spectra can be used for a wide range of infrared molecular sensing applications with enhanced detection resolution and sensitivity.
暂无评论