Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authent...
详细信息
Recently, Jung et al. proposed a robust conditional privacy-preserving authentication protocol in vehicle ad-hoc networks. However, Jung et al.'s authentication protocol cannot provide unlinkage and mutual authentication during the communications between the vehicles and the road-side infrastructure units. In this paper, we propose an improved privacy-preserving mutual authentication protocol for vehicle ad hoc networks by using secure identity-based group blind signature, the private encryption system and the public encryption system. The proposed privacy-preserving mutual authentication protocol for vehicle ad-hoc networks satisfies mutual authentication, anonymity and unlinkability under Random Oracle Model and the Decisional Bilinear Diffie-Hellman (DBDH) assumption. In addition, the trusted center can trace malicious on-board units or road-Side infrastructure units in our protocol.
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response ...
详细信息
As computersystems become increasingly internetworked, Distributed Realtime Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE soft...
详细信息
As computersystems become increasingly internetworked, Distributed Realtime Embedded (DRE) software is becoming increasingly common and important, a challenging problem faced by researchers and developers of DRE software is how to devise and implement a method that can effectively analyze requirements in varying operational conditions. In this paper, a Distributed Realtime Embedded net (DREN) is proposed as software design specification modeling tool. The basic tasks, function module and communication process are modeled by using DREN, thus forming the entire application by making use of Petri net’s synthesis operation. Time Reachability Graph is adopted to analyze the correctness of DRENmodel, the basic properties of DRE system are also considered. Finally, a specific example is given to simulate the analytical process, the results show that the method can be a good solution to analyze DRE software.
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on ap...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
Partial order reduction techniques have been used to combat the state explosion problem in model checking procedures for concurrent systems with probabilistic behaviors. There are some results that give criteria on applying partial order reduction for verifying quantitative time properties and reward-based properties on actions. However, there are many situations that reward-based properties are expressed on states rather than on actions because actions are triggered in no time and the quantities can not be obtained easily. This paper presents reduction criteria for a probabilistic temporal logic that allows specification of restrictions on quantitative measures given by spatial resources function for the states of the considered system and provides the proof of the correctness.
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and r...
详细信息
This paper proposes a generalized model by extending Markov chain with spatial resources labels, which can describe the functional and performance properties and some basic characteristics such as nondeterminacy and randomicity. The syntax and semantics of the new model are shown based on the existing temporal logics such as CSRL and pathCSRL. The model checking procedure is discussed and thus the practicability of the new model is intuitive. Based on the existing models, the proposed model includes spatial resources labels only by adding the spatial information to the existing labels of states, so the treatment of the state explosion problem is similar to that in the existing models.
To solve the problem of modeling the horizontal translational motion of a Raptor 30 based miniature helicopter near hovering, a black-box model is built based on echo state networks. Combined with a state space angula...
详细信息
ISBN:
(纸本)9787894631046
To solve the problem of modeling the horizontal translational motion of a Raptor 30 based miniature helicopter near hovering, a black-box model is built based on echo state networks. Combined with a state space angular motion model, a four-degree-of-freedom hybrid model is created. system identification is done using the remote control experiment data. Model validation results demonstrate that the model can predict the motion of the miniature helicopter near hovering on the whole. The model can be used to optimize parameterized controller. Closed-loop simulation further validates the model.
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work ...
详细信息
Under SOA (Service-Oriented Architecture), composite service is formed by aggregating multiple component services together in a given workflow. One key criterion of this research topic is QoS composition. Most work on service composition mainly focuses on the algorithms about how to compose services according to assumed QoS, without considering where the required QoS comes from and the selection of user preferred composition algorithm among those with different computational cost and different selection results. In this paper, we propose to strengthen current service composition mechanism by generation of QoS requirement and its algorithm selection based on the QoS reference vectors which are calculated optimally from the existing individual services' QoS by registry to represent QoS overview about the best QoS, the worst (or most economical) QoS, or the average QoS of all composite services. To implement QoS requirement, which is determined according to QoS overview, this paper introduces two selection algorithms as two kinds of experiment examples, one aiming at the most accurate service selection and the other chasing for trade-off between selection cost and result. Experimental results show our mechanism can help the requester achieve his expected composite service with appropriate QoS requirement and customized selection algorithm.
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In...
详细信息
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by formalizing the notion of hierarchical certificate less signatures. Furthermore, we propose an HCLS scheme which, under the hardness of the computational Diffie-Hellman (CDH) problem, is proven to be existentially unforgeable against adaptive chosen-message attacks in the random oracle model. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Hence, the proposal is secure and scalable for practical applications.
This paper presents a distributed fault detection algorithm for wireless sensor networks (WSNs) by exploring the weighted average value scheme. Considering the spatial correlations in WSNs, a faulty sensor can diagnos...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
This paper presents a distributed fault detection algorithm for wireless sensor networks (WSNs) by exploring the weighted average value scheme. Considering the spatial correlations in WSNs, a faulty sensor can diagnose itself through comparing its own sensed data with the average of neighbors' data. Simulation results show that sensor nodes with permanent faults are identified with high accuracy for a wide range of fault rate, and keep false alarm rate for different levels of sensor fault model.
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. T...
详细信息
A recent primitive known as asymmetric group key agreement allows a group of users to negotiate a common encryption key which is accessible to any entities while each user holds her respective secret decryption key. This concept not only enables confidential communications among group users but also permits any outsider to send encrypted messages to the group. The existing instantiation is only secure against passive adversaries. In this paper, we first propose an authenticated asymmetric group key agreement protocol which captures the practical security properties against active attacks. Based on our protocol, we then propose a broadcast encryption system without relying on a trusted dealer to distribute the secret keys to the users. Our system has also short ciphertexts. Furthermore, the proposal is equipped with the perfect forward security property.
暂无评论