This paper proposes a new concept of the genetic robot which has its own robot genome, in which each chromosome consists of many genes that contribute to defining the robotpsilas personality. The large number of genes...
详细信息
This paper proposes a new concept of the genetic robot which has its own robot genome, in which each chromosome consists of many genes that contribute to defining the robotpsilas personality. The large number of genes also allows for a highly complex system, however it becomes increasingly difficult and time-consuming to ensure reliability, variability and consistency for the robotpsilas personality while manually initializing values for the individual genes. To overcome this difficulty, this paper proposes an evolutionary algorithm for a genetic robotpsilas personality (EAGRP). EAGRP evolves a gene pool that customizes the robotpsilas genome so that it closely matches a simplified set of features desired by the user. It does this using several new techniques. It acts on a 2 dimensional individual upon which a new masking method, the Eliza-Meme scheme, is used to derive a plausible individual given the restricted preference settings desired by the user. The proposed crossover method allows reproduction for the 2-dimensional genome. Finally, the evaluation procedure for individuals is carried out in a virtual environment using tailored perception scenarios.
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limi...
详细信息
ISBN:
(纸本)9781424432127
Sensor networks are resource-constrained, which makes developing efficient key distribution scheme a challenging problem. In general, many key distribution techniques are designed to address the trade-off between limited resources and security, no key distribution technique is ideal to all the scenarios where sensor networks are used. In this paper, we primarily focus on storage requirements of several key distribution schemes in sensor networks, and obtain their lower bounds on the amount of information each user has to keep secret by modeling the key distribution schemes with an information theoretic framework.
We investigate the impact of node capture attacks on the confidentiality and integrity of network traffic. We map the compromise of network traffic to the flow of current through an electric circuit and propose a metr...
详细信息
We investigate the impact of node capture attacks on the confidentiality and integrity of network traffic. We map the compromise of network traffic to the flow of current through an electric circuit and propose a metric for quantifying the vulnerability of the traffic using the circuit mapping. We compute the vulnerability metric as a function of the routing and the cryptographic protocols used to secure the network traffic. We formulate the minimum cost node capture attack problem as a nonlinear integer programming problem. Due to the NP-hardness of the minimization problem, we provide a greedy heuristic that approximates the minimum cost attack. We provide examples of node capture attacks using our vulnerability metric and show that the adversary can expend significantly less resources to compromise target traffic by exploiting information leakage from the routing and cryptographic protocols.
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key fo...
详细信息
A key pre-distribution scheme is a method by which initially an off-line trusted authority T A distributes pieces of information among a set of users. Later, each member of a group of users can compute a common key for secure communication. In this paper we present a Keying Material Based Key Pre-distribution Scheme, i.e., a group of users, using secret information preloaded in their memory and some public information retrieved from a keying material server, can compute a common key. We first formally define the keying material based key pre-distribution scheme in terms of the entropy, and give lower bounds on the amount of information each user has to keep secret. Then, we describe its applications for sensor networks.
Bill Gates mentioned in Scientific America that robot will enter every home in ten year the same as personal computers have entered into almost every home in ten year. This project is to response to this trend, and to...
详细信息
Bill Gates mentioned in Scientific America that robot will enter every home in ten year the same as personal computers have entered into almost every home in ten year. This project is to response to this trend, and to think about how robot can enhance learning, for example, robot can be as learning tools, teaching tools, learning companions, teaching partner, or some other models to enhance learning.
This paper describes a novel quantitative analysis model for system survivability based on conflict analysis, which provides a direct-viewing survivable situation. Based on the three-dimensional state space of conflic...
详细信息
This paper describes a novel quantitative analysis model for system survivability based on conflict analysis, which provides a direct-viewing survivable situation. Based on the three-dimensional state space of conflict, each player’s efficiency matrix on its credible motion set can be obtained. The player whose desire is the strongest in all initiates the moving and the overall state transition matrix of information system may be achieved. In addition, the process of modeling and stability analysis of conflict can be converted into a Markov analysis process, thus the obtained results with occurring probability of each feasible situation will help the players to quantitatively judge the probability of their pursuing situations in conflict. Compared with the existing methods which are limited to post-explanation of system’s survivable situation, the proposed model is relatively suitable for quantitatively analyzing and forecasting the future development situation of system survivability. The experimental results show that the model may be effectively applied to quantitative analysis for survivability. Moreover, there will be a good application prospect in practice.
Role-Based Access Control (RBAC) model is naturally suitable to organizations where users are assigned organizational roles with well-defined privileges. However, due to the large number of users in nowadays online se...
详细信息
As a security principle, separation of duty (SoD) is widely considered in computer security. In the role-based access control(RBAC) model, separation of duty constraints enforce conflict of interest policies. There ar...
详细信息
暂无评论