Node-localization is one of the key technologies of wireless sensor networks, and mobile-anchor assisted localization method is a promising method of saving network cost. The path planning of mobile anchor is a basis ...
详细信息
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to...
详细信息
The properties of modular inverse were analyzed and gain to improve the extended Euclid algorithm. In the new scheme, even-reduction and remainder-attenuation were proposed which insured the remainder be attenuated to one third of before in each loop at least, so that for y = a-1 mod p, the number of loops will be lower than log 3 a. Software testing shows the new algorithm is significantly improved on speed than the original algorithm.
The research was on the influence of transmission distance respectively on energy consumption and transmission rate in wireless sensor network. The views of traditional work on this impact was not so precise, which wa...
详细信息
The research was on the influence of transmission distance respectively on energy consumption and transmission rate in wireless sensor network. The views of traditional work on this impact was not so precise, which was essential to the performance of WSN. The sensor node used, experimental environment and design have been introduced;Then the packet loss ratio for different transmission distance have been examined experimentally, and their functional relation by fitting the experimental data have been acquired;finally, considering packet retransmission based on that conclusion at the same time, focused on the variance of energy cost and transmission rate with distance. The main contribution is to acquire the quantitative effect evaluation of one-hop transmission distance and performance in WSN.
The existence of selfish nodes seriously affects the routing performance of opportunistic networks (OppNet). To protect the OppNet against the nodes' selfish behavior, a credit-based selfish nodes detection mechan...
详细信息
The existence of selfish nodes seriously affects the routing performance of opportunistic networks (OppNet). To protect the OppNet against the nodes' selfish behavior, a credit-based selfish nodes detection mechanism was proposed to make it possible to keep away from such nodes during the process of message forwarding. The mechanism leverages 2-ACK messages to observe the nodes' behavior. Then the credit value was calculated based on the observation information and accordingly acts as the metric to distinguish the selfish nodes. Simulation results show that, when coupled with various routing algorithms, the mechanism could detect selfish nodes out accurately, and improve network performance effectively in terms of delivery rate and traffic load.
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model an...
详细信息
Researchers have proposed several security protocols to protect the electronic commerce security in these years;however,not all of them are secure *** article extends model checking method with Casper/FDR2 to model and analyze a new electronic *** are found in the protocol and their mechanisms are discussed.A variety of solutions are given to different security *** improved protocol is proven to be robust and secure.
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challe...
详细信息
Many identity based signature (IBS) schemes have been proposed so far. However, most of the schemes are based on bilinear pairings. Only a few IBS schemes are with-out pairings. Up to now, there still remains a challenge to construct a provably secure and effcient IBS scheme without pairings. In this paper, we propose an effcient IBS scheme based on cubic residues, and we prove that our scheme is secure against adaptively chosen message and ID attack.
Vector OFDM (V-OFDM) for single transmit antenna systems is a general transmission scheme in which OFDM and Single-Carrier Frequency Domain Equalization (SC-FDE) can be considered as two extreme/special cases. Due to ...
详细信息
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of...
详细信息
Model checking is one of the most important technology for automatically verification. So this paper generally proposed a method of combining CCS and Z language, to perform model checking. It combines the advantage of current CCS and Z systems, where CCS is good at describing concurrent systems, also Z is a good tool for data structure. As a result, form the new system CCS-Z. Then we give the syntax and semantics of it, at last give the model checking *** advantage of this paper is combined data stucture on the famous system CCS, and increase the capacity of system description.
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking ...
详细信息
In event-driven wireless sensor networks, many redundant packets flow from monitored sites through the network and to the sink, resulting in a typical funnel effect which affects event reliability, negatively. Taking this transport property into account, a differentiated priority queue management scheme is presented, in which the packets with same event identification are prioritized according to their arrival sequence, and scheduled differentially. The queue model, packet prioritization strategy and event table maintaining methods are examined in detail. Simulation results show that the queue management scheme can improve event reliability of event-driven sensor networks in terms of event detection ratio, accuracy ratio, and event delay efficiently.
Privacy protection and user revocation are essentially conflicting requirements in many cryptographic protocols. It is a particularly challenging problem to harmonize them in a secret handshake protocol that is geared...
详细信息
暂无评论