In this paper, we propose an energy-efficient cooperative geographic routing (ECGR) to reach energy-efficient routing in wireless sensor networks (WSN). ECGR takes full advantage of cooperative diversity and geographi...
详细信息
In this paper, we propose an energy-efficient cooperative geographic routing (ECGR) to reach energy-efficient routing in wireless sensor networks (WSN). ECGR takes full advantage of cooperative diversity and geographic routing. At physical layer, cooperative nodes transmit the same packet in a cooperative way to achieve farther transmission distance of each hop without more energy consumption. While at the network layer, ECGR adaptively selects the appropriate cooperative nodes to form forwarding clusters to forward the packet to the destination when we consider energy consumption and geographic information of the sensor nodes. Meanwhile, in order to fully assess the energy consumption, we take circuit energy consumption of the sensor nodes into consideration. According to the description above, we increase the transmit distance of each hop; and thereby reducing and balancing the overall network energy consumption among nodes to extend the lifetime of the network.
In this paper, we construct a kind of combiner functions with high nonlinearity and correlation-immunity. This construction is based on the relationship between properties of the combiners with 1bit memory and the cry...
详细信息
The paper proposes a provably-secure certificateless proxy re-signature scheme. Based certificateless public cryptosystem, it solves the using of certificate in certificate-based scheme and removes key escrow in ID-ba...
详细信息
The confidential computation of matrix is a very important issue in secure multi-party computation. But there is no literature proposed truly multi-party confidential computation protocol on matrix factorization. In t...
详细信息
Cheater detection and identification are important issues in the process of secret reconstruction. Most algorithms to detect and identify cheaters need the dealer to generate and distribute additional information to s...
详细信息
ISBN:
(纸本)9783642354724
Cheater detection and identification are important issues in the process of secret reconstruction. Most algorithms to detect and identify cheaters need the dealer to generate and distribute additional information to shareholders. In a recent paper, algorithms have been proposed to detect and identify cheaters based on shares only without needing any additional information. However, more than t (i.e. the threshold) shares are needed in the secret reconstruction. In this paper, we extend the algorithms to the situation when there are exact t shares in the secret reconstruction. We adopt the threshold changeable secret sharing which shareholders work together to change the threshold t into a new threshold t' (i.e., t'
With the prompt evolution of Internet, network identity management is getting more and more basilica. Personal network electronic identity associated in reality has been the significant and urgent task when online lif...
详细信息
In view of the degeneration problem of chaos characteristics of the secret-key sequences, a new key sequence generation system was designed, combining chaos and cryptography. The simulation results shows that, not onl...
详细信息
Predicate Encryption (PE) is a new encryption paradigm which provides more sophisticated and flexible functionality. PE is sufficient for some new applications, such as fine-grained control over access to encrypted da...
详细信息
Piece in Hand method is a security enhancement method for Multivariate Public Key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece...
详细信息
A novel watermarking approach for copyright protection of color images based on the nonsubsampled contour let transform (NSCT). We employ the genetic algorithm optimization principles and HVS masking technique to obta...
详细信息
暂无评论