Spectrum sensing is adopted to detect the presence of primary users in cognitive radio networks. Considering the sensing overhead, it is not always a good choice that the secondary user senses the channel all the time...
详细信息
ISBN:
(纸本)9781457713460
Spectrum sensing is adopted to detect the presence of primary users in cognitive radio networks. Considering the sensing overhead, it is not always a good choice that the secondary user senses the channel all the time. In this paper, we propose an opportunistic spectrum sensing decision method according to the primary user's traffic. First, the traffic of primary user is observed and estimated. For estimating the parameters of the primary traffic, the Maximum Likelihood estimation is adopted and the confidence interval is calculated based on finite observed samples. Then, according to the estimated primary traffic information, a decision criterion is proposed for determining whether to sense the channel. The simulation results show that the performance of the proposed opportunistic sensing scheme is much better than that when sensing at every timeslots and very close to that in the ideal case in which the primary traffic information is obtained perfectly.
An electronic healthcare (e-Health) system is a database system that collects patients' medical data from participating organizations such as hospitals, clinics and insurance companies, and facilitates services fo...
详细信息
An electronic healthcare (e-Health) system is a database system that collects patients' medical data from participating organizations such as hospitals, clinics and insurance companies, and facilitates services for these organizations. Though e-Health system transforms healthcare services with great savings in terms of efficiency and cost, it also triggers great privacy concerns as all patients' data are maintained in a centralized system which may be accessed and misused by unauthorized parties. One of the most important features of an e-Health system is that the sensitive data mainly distribute in certain columns. Thus, we propose a column based access control scheme for an e-Health database system (eHCBAC scheme), which protects the data by means of imposing access control policies on sensitive columns. Furthermore, we design algorithms to achieve eHCBAC for different SQL statements, and implement an prototype system by adding column based access control module into an open-source DBMS kernel. Experimental results demonstrate the effectiveness and efficiency of the prototype system.
Delay Tolerant networks (DTN) generally lack end-to-end connectivity and multiple message copies routing protocols are often used to improve the efficiency that messages are delivered successfully, but network load is...
详细信息
Delay tolerant networks(DTNs) can interconnect highly heterogeneous networks among extreme environments even between nodes without end-to-end path. As a new evolution of Mobile Ad hoc network(MANET)and wireless sensor...
详细信息
Delay tolerant networks(DTNs) can interconnect highly heterogeneous networks among extreme environments even between nodes without end-to-end path. As a new evolution of Mobile Ad hoc network(MANET)and wireless sensor network(WSN), the DTN is an important technique in ubiquitous networking when the time-space range of data collection and service is greatly expanded. As the key components of DTN, routing technique is a challenge and promising research field. While a lot of DTN routing protocols have been proposed, there is no comprehensive classification system for DTN routing protocols. Review for various protocols in respect of principles, characteristics, comparisons is also needed. This paper introduces the architecture, challenges, theoretical basis, evaluation metrics and classification of DTN routing protocols. The basic principles and features of representative routing algorithms are analyzed and compared for each class, intending to motivate new research and development in this area.
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured a...
详细信息
Integrity measurement is just one of the most important features in a trusted computing platform to provide evidence of platform configuration and behavior. Each set of software instructions(binary code) is measured and recorded before it is executed. Especially, all of boot components which be recorded in pre-boot stage can't be re-measured until the platform is rebooted. However, the reality is that many components belong to pre-boot stage, such as BIOS, Boot Loader and MBR, are easily modified or updated in runtime environment. If these updated results of components are treated as configuration requirements for a remote server-side to verify the access request, the remote network access connection will fail. It must restart the host to re-measure there components, and the result of the new measure is not guaranteed right absolutely. We solve this problem by embedding Integrity Measurement Agency Component(IMAC) which has the capability of monitoring transformation, verifying credibility, updating Platform Configuration Registers and recording integrity measurement logs in Linux kernel. The result of performance analysis demonstrates that the method is feasible and credible.
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy...
详细信息
Authentication has received increasing attention in the literatures of Internet of Things. At the same time, numerous concerns have been raised about the issue of anonymity due to users' awareness of their privacy nowadays. How to achieve trade-off between anonymity and certification simultaneously? In this paper, we propose a security architecture to ensure anonymity and certification for Internet of Things. We use pseudonym and threshold secret sharing approach to resolve conflict between anonymity and certification. Moreover, the implementation of Bloom filter offers security authentication for remote command. Security analysis shows that the proposed mechanism can perfectly achieve tradeoff between anonymity, certification, and also resist impersonation, tamper as well as compromise attacks.
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous a...
详细信息
A lot of attention has been paid to anonymity due to the users' privacy protection. While peer-topeer (P2P) networks need anonymity capacity, the authority also requires partner traceability to prevent anonymous abuse. So there is a challenge to harmonize the dilemma between the anonymity and authentication in P2P networks. Few P2P protocol provides complete anonymity as well as traceability. In this paper, we propose a security mechanism to ensure anonymity for honest peers and traceability for misbehaving peers in P2P systems. We utilize superposition watermarking based anonymity trace scheme to resolve the conflicts between traceability and anonymity. This scheme uses information processing technology similar to CDMA to superpose path information. Security analysis and simulation result show that the superposition watermarking based P2P anonymity trace scheme (SWP2P) can attain tradeoff between anonymity and traceability perfectly.
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support f...
详细信息
Cloud computing is a novel computing pattern, and it can provide underlying hardware resource for cloud users on demand. Virtualization is the key technology of cloud computing, and it provides the technical support for cloud computing. In cloud platform, power management is an indispensable function of cloud system administration. Based on genetic algorithm, this paper proposes a power management method based on virtual cluster. The experiments on Xen platform prove the effectiveness of our method.
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-fr...
详细信息
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-free network realizations are designed by Sagduyu. Then, this paper proposed a new conflict-free transmission schedule based on network coding to achieve better network performance. We construct sub tree graphs by sub tree decomposition, and based on the achieved sub tree graphs, time slots are assigned from the first sub tree. Nodes of the latter sub trees can be chosen to combine with the front time slots according to whether there exist conflicts or not. Finally, network codes allocation method for network with two sources is presented, which adopts the theory of graph coloring.
暂无评论