Within the framework of the acoowee-project we want to improve the programming of Wireless Sensor networks (WSNs) by using and adapting the expressiveness of UML2 Activity Diagrams (UADs) to specify the behavior of th...
详细信息
Within the framework of the acoowee-project we want to improve the programming of Wireless Sensor networks (WSNs) by using and adapting the expressiveness of UML2 Activity Diagrams (UADs) to specify the behavior of the WSN. We expect that our proposal can simplify the way of programming the functional behavior of a WSN and so bring the programming closer to domain experts. We develop the acoowee-framework for Sun SPOTs (spots). The user of the acoowee-framework visually programs UADs and saves them. Afterwards, these UADs are converted into scripts and deployed to the spots e.g. over the air. Finally, the interpreter that runs on the spots executes the scripts. In this demo we present the usage of the acoowee-framework by means of a network consisting of 5 spots and a host with a connected base station. We present all steps listed above. Additionally, we show a rule based manipulation of already deployed scripts and give the attendees the possibilities to try this kind of programming by themselves.
Open quantum systems interacting with structured environments is important and manifests non-Markovian behavior, which was conventionally studied using a quantum trajectory stochastic method. In this paper, by dividin...
详细信息
Open quantum systems interacting with structured environments is important and manifests non-Markovian behavior, which was conventionally studied using a quantum trajectory stochastic method. In this paper, by dividing the effects of the environment into two parts, we propose a deterministic method without using a quantum trajectory. This method is more efficient and accurate than the stochastic method in most Markovian and non-Markovian cases. We also extend this method to the generalized Lindblad master equation.
Web services are increasingly becoming an integral part of next-generation web applications. A Web service is defined as a software system designed to support interoperable machine-to-machine interaction over a networ...
详细信息
Web services are increasingly becoming an integral part of next-generation web applications. A Web service is defined as a software system designed to support interoperable machine-to-machine interaction over a network based on a set of XML standards. This new architecture and set of protocols brings new vulnerabilities that can be exploited by attackers. To prevent and detect such attacks, several security techniques are available like authentication and encryption mechanisms, firewalls and intrusion detection systems (IDS). Nevertheless these security methods encounter some problems, especially when dealing with new attacks. Relying on additional security principles seems to be important to well protect Web services. In this paper, we propose using honeypots to detect and study attacks against Web services. Honeypots are used to learn new techniques, tools and motivations of hackers to better protect the production systems against attacks. Our solution (WS Honeypot) is to deploy a honeypot as a web service application. This honeypot captures all request messages and analyses them by using machine learning techniques in order to detect and study attacks.
Beside of social media networks, crowdsourcing is one of the emerging new applications and business models in the Future Internet, which can dramatically change the future of work and work organization in the on-line ...
详细信息
Beside of social media networks, crowdsourcing is one of the emerging new applications and business models in the Future Internet, which can dramatically change the future of work and work organization in the on-line world. The crowdsourcing technology can be viewed as "Human Cloud" technique, in contrast to "Machine Cloud Computing". Using a crowd with a large number of internationally widespread workers and the flexibility of micro-payment services, crowdsourcing platforms like Amazon's MTurk and Microworkers can outsource traditional forms of work organization on a microscopic level of granularity to a large, anonymous crowd of workers, the human cloud. In such platforms work or tasks are organized at a finer granularity and jobs are split into micro-tasks that need to be performed by a human cloud. It is a need of analysis to understand the anatomy of such a platform and of models to describe the time-dependent growth of the human cloud, in order to predict the traffic impact of such novel applications and to forecast the growth dynamics. The purpose of this paper is a measurement-based statistical analysis of a crowdsourcing platform, using the *** platform as example. The obtained results are then used to model the growth of such fast-changing environments in the Internet using well-known models from biology. Based on the findings from the population growth, we develop a deterministic fluid model which is an extension of the SIR model of epidemics, in order to investigate the platform dynamics.
Source noise affects the security of continuous-variable quantum key distribution (CV QKD) and is difficult to analyze. We propose a model to characterize Gaussian source noise through introducing a neutral party (Fre...
详细信息
Source noise affects the security of continuous-variable quantum key distribution (CV QKD) and is difficult to analyze. We propose a model to characterize Gaussian source noise through introducing a neutral party (Fred) who induces the noise with a general unitary transformation. Without knowing Fred’s exact state, we derive the security bounds for both reverse and direct reconciliations and show that the bound for reverse reconciliation is tight.
Although Internet on the train and train to wayside communication in general becomes more and more available for train operators, there are still a lot of challenges for future research. We previously developed a netw...
详细信息
When using of the Internet increased dramatically;the congestion avoidance problem became even more important. The congestion is usually caused by the multiplexing for packets when the packets are at the bottleneck li...
详细信息
In this paper, we argue the security protocols of ZigBee wireless sensor network in MAC layer. AES 128-bit encryption algorithm in CCM* mode is secure transferred data;however, AES's secret key will be break withi...
详细信息
In this paper, we argue the security protocols of ZigBee wireless sensor network in MAC layer. AES 128-bit encryption algorithm in CCM* mode is secure transferred data;however, AES's secret key will be break within nearest future. Efficient public key algorithm, ECC has been mixed with AES to rescue the ZigBee wireless sensor from cipher text and replay attack. Also, the proposed protocol can parallelize the integrity function to increase system performance.
An algorithm of cryptographic hash function based on time-delay chaotic system is presented in this paper. In this algorithm, initial message is modulated into time-delay chaotic iteration, and the Hash value can be c...
详细信息
An algorithm of cryptographic hash function based on time-delay chaotic system is presented in this paper. In this algorithm, initial message is modulated into time-delay chaotic iteration, and the Hash value can be calculated by a HMAC-MD5 algorithm. Thus, every bit of this Hash value is correlative with initial message, and this Hash value is very sensitive to micro changes of the initial message or the initial condition of chaotic system. By theory analyses and simulations, we obtain that the Hash value has irregularity and diffusion properties, and the parameter space is augmented because of the properties of chaos. The nonlinear relation between hash value and initial message can be effectively against linear analysis. Therefore, this Hash function based on time-delay chaotic system can get better anti-attack and anti-collision capacity.
Saratoga is a protocol for fast file transfers across dedicated links in private networks, using small amounts of feedback for loss recovery. It is in use to download large amounts of imaging data from remote-sensing ...
详细信息
暂无评论