Wireless Sensor Networks (WSNs) are deployed in unattended environments and thus are prone to security compromises. Providing security and tamper resistant hardware to each node is also unrealistic. The compromised no...
详细信息
Internet of Things (IoT) is the recent advancement in Wireless technology where multiple embedded devices are connected through internet for exchange of information. Since the information exchanged is private and at t...
详细信息
The popularity of automatic speech recognition (ASR) systems, like Google Assistant, Cortana, brings in security concerns, as demonstrated by recent attacks. The impacts of such threats, however, are less clear, since...
详细信息
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable iss...
This work concentrates around the task scheduling depends on QoS and imperative of desire. Under nature of vibrant cloud computing, effectiveness improving of scheduling of task and load balancing are interminable issues. For clients, be that as it may, it's progressively imperative to meet their necessities of QoS. This paper identifies with an improvement decency intention depends on new Berger's model under the earth of vibrant cloud computing. As indicated by the distinctive kind of task scheduling, we portray the need of decency, proficiency and the Balance among advantage and reasonableness separately. We recompile the CloudSim and recreate the three undertaking task scheduling above based on expanded CloudSim individually. The exploratory outcomes show that this calculation portion not just meet the guideline of offering need to profit with because of thought to decency, yet additionally address clients' issues of orchestrated QoS.
The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/local control centers, one intellig...
详细信息
Criminals and terrorists have become good at using the smartphones. The traditional reactive forensics responds only after an incident. Smartphone OS should include proactive forensics support (pfs), that deals with p...
详细信息
Since radio frequency identification (RFID) technology has been used in various scenarios such as supply chain, access control system and credit card, tremendous efforts have been made to improve the authentication be...
详细信息
Since radio frequency identification (RFID) technology has been used in various scenarios such as supply chain, access control system and credit card, tremendous efforts have been made to improve the authentication between tags and readers to prevent potential attacks. Though effective in certain circumstances, these existing methods usually require a server to maintain a database of identity related information for every tag, which makes the system vulnerable to the SQL injection attack and not suitable for distributed environment. To address these problems, we now propose a novel blockchain-based mutual authentication security protocol. In this new scheme, there is no need for the trusted third parties to provide security and privacy for the system. Authentication is executed as an unmodifiable transaction based on blockchain rather than database, which applies to distributed RFID systems with high security demand and relatively low real-time requirement. Analysis shows that our protocol is logically correct and can prevent multiple attacks.
With the amount of user-contributed image data increasing, it is a potential threat for users that everyone may have the access to gain privacy information. To reduce the possibility of the loss of real information, t...
详细信息
We are living in a time where many of the decisions that affect us are made by mathematical models. These models rely on data. Precision and relevance of the decisions made by these models is dependent on quality of t...
详细信息
The epidemic containment game is a formulation to describe voluntary vaccination behaviors before epidemic spreading. This game relies on the characterization of the susceptible-infected- susceptible (SIS) model in te...
详细信息
The epidemic containment game is a formulation to describe voluntary vaccination behaviors before epidemic spreading. This game relies on the characterization of the susceptible-infected- susceptible (SIS) model in terms of the spectral radius of the network. Existing researches showed that finding the worst Nash Equilibrium (NE) is NP-hard and used a heuristic algorithm called Low Degree (LDG) to estimate the maximum social cost under the worst NE (Max NE cost). By comparing the results of the LDG algorithm and exhaustive search, we found the LDG algorithm cannot estimate Max NE cost well, thus, we proposed a new neighbor information based algorithm to estimate Max NE cost in this paper. Moreover, we discussed Stackelberg strategies in which some nodes are secured first by a leader, then other agents choose their strategies voluntarily. We found the target (TAR) strategy is effective to reduce Max NE cost in a scale- free network when T is large and useless when T is low (T is the ratio of the recovery rate to the transmission rate in the SIS model). Moreover, we found that a lot of nodes with small degrees are secured voluntarily under the TAR strategy when T is low, which leads to high Max NE cost. At last, we proposed a new greedy algorithm to select nodes secured first, which can reduce Max NE cost when T is low.
暂无评论