期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
UWB-Based Localization in Wireless Sensor Networks
1
作者 Di WU lichun BAO renfa li 《International Journal of Communications, Network and System Sciences》 2009年第5期407-421,共15页
Localization has many important applications in wireless sensor networks, such as object searching and tracking, remote navigation, location based routing etc. The distance measurements have been based on a variety of... Localization has many important applications in wireless sensor networks, such as object searching and tracking, remote navigation, location based routing etc. The distance measurements have been based on a variety of technologies, such as acoustic, infrared, and UWB (ultra-wide band) media for localization pur-poses. In this paper, we propose UWB-based communication protocols for distance estimation and location calculation, namely a new UWB coding method, called U-BOTH (UWB based on Orthogonal Variable Spreading Factor and Time Hopping), an ALOHA-type channel access method and a message exchange protocol to collect location information. U-BOTH is based on IEEE 802.15.4a that was designed for WPANs (wireless personal area networks) using the UWB technology. We place our system in coal mine environ-ments, and derive the corresponding UWB path loss model in order to apply the maximum likelihood esti-mation (MLE) method to compute the distances to the reference sensors using the RSSI information, and to estimate the coordinate of the moving sensor using least squares (LS) method. The performance of the sys-tem is validated using theoretic analysis and simulations. Results show that U-BOTH transmission technique can effectively reduce the bit error rate under the path loss model, and the corresponding ranging and local-ization algorithms can accurately compute moving object locations in coal mine environments. 展开更多
关键词 ORTHOGONAL Variable SPREADING Factor (Ovsf) Time HOPPING (Th) ULTRA-WIDE Band (Uwb)
下载PDF
Security-aware Signal Packing Algorithm for CAN-based Automotive Cyber-physical Systems 被引量:2
2
作者 Yong Xie liangjiao liu +3 位作者 renfa li Jianqiang Hu Yong Han Xin Peng 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期422-430,共9页
Network and software integration pose severe challenges in cyber-security for controller area network (CAN)-based automotive cyber-physical system (ACPS), therefore we employ message authentication code (MAC) to defen... Network and software integration pose severe challenges in cyber-security for controller area network (CAN)-based automotive cyber-physical system (ACPS), therefore we employ message authentication code (MAC) to defend CAN against masquerade attack, but the consequent bandwidth overhead makes it a necessity to find the tradeoff among security, real-time and bandwidth utilization for signal packing problem (SPP) of CAN. A mixed-security signal model is firstly proposed to formally describe the properties and requirements on security and real-time for signals, and then a mixed-integer linear programming (MILP) formulation of SPP security-aware signal packing (SASP) is implemented to solve the tradeoff problem, where the bandwidth utilization is improved and the requirements in both security and real-time are met. Experiments based on both society of automotive engineers (SAE) standard signal set and simulated signal set showed the effectiveness of SASP by comparing with the state-of-the-art algorithm. © 2014 Chinese Association of Automation. 展开更多
关键词 ALGORITHMS BANDWIDTH Communication channels (information theory) Control system synthesis Embedded systems Integer programming
下载PDF
An Immunity-Based IOT Environment Security Situation Awareness Model 被引量:2
3
作者 Yuanquan Shi Tao li +2 位作者 renfa li Xiaoning Peng Pengju Tang 《Journal of Computer and Communications》 2017年第7期182-197,共16页
To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-sel... To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security situation evaluation method under IOT environment based on artificial immune system is presented. And then according to the situation time series obtained by the mentioned evaluation method, the security situation prediction method based on grey prediction theory is presented for forecasting the intensity and security situation of network attack activities that the IOT environment will be suffered in next step. The experimental results show that IIESSA provides a novel and effective model for perceiving security situation of IOT environment. 展开更多
关键词 IOT ENVIRONMENT Security SITUATION AWARENESS Artificial IMMUNE System GREY Prediction
下载PDF
Unsupervised Anomaly Detection for Network Flow Using Immune Network Based K-means Clustering
4
作者 Yuanquan Shi Xiaoning Peng +1 位作者 renfa li Yu Zhang 《国际计算机前沿大会会议论文集》 2017年第1期96-98,共3页
To detect effectively unknown anomalous attack behaviors of network traffic,an Unsupervised Anomaly Detection approach for network flow using Immune Network based K-means clustering(UADINK)is proposed.In UADINK,artifi... To detect effectively unknown anomalous attack behaviors of network traffic,an Unsupervised Anomaly Detection approach for network flow using Immune Network based K-means clustering(UADINK)is proposed.In UADINK,artificial immune network based K-means clustering algorithm(aiNet_KMC)is introduced to cluster network flow,i.e.extracting abstract internal images from network flows and obtaining an optimizing parameter K of K-means by aiNet model,and network flows are clustered by K-means algorithm.The cluster labeling algorithm(clusLA)and the network flow anomaly detection algorithm(NFAD)are introduced to detect anomalous attack behaviors of network flows,where the clusLA algorithm is used for labeling whether each cluster belongs to malicious,and the labeled clusters are regarded as detectors to identify anomaly network flows by NFAD.To evaluate the effectiveness of UADINK,the ISCX 2012 IDS dataset is considered as the simulating experimental dataset.Compared with the NDM based K-means anomaly detection approach,the results show that UADINK is a radical anomaly detection approach in order to detect anomalies of network flows. 展开更多
关键词 UNSUPERVISED ANOMALY detection Artificial IMMUNE NETWORK K-MEANS CLUSTERING NETWORK flow
下载PDF
FPGA based unified architecture for public key and private key cryptosystems 被引量:1
5
作者 Yi WANG renfa li 《Frontiers of Computer Science》 SCIE EI CSCD 2013年第3期307-316,共10页
Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in... Recently, security in embedded system arises attentions because of modern electronic devices need cau- tiously either exchange or communicate with the sensitive data. Although security is classical research topic in world- wide communication, the researchers still face the problems of how to deal with these resource constraint devices and en- hance the features of assurance and certification. Therefore, some computations of cryptographic algorithms are built on hardware platforms, such as field program gate arrays (FPGAs). The commonly used cryptographic algorithms for digital signature algorithm (DSA) are rivest-shamir-adleman (RSA) and elliptic curve cryptosystems (ECC) which based on the presumed difficulty of factoring large integers and the algebraic structure of elliptic curves over finite fields. Usu- ally, RSA is computed over GF(p), and ECC is computed over GF(p) or GF(2P). Moreover, embedded applications need advance encryption standard (AES) algorithms to pro- cess encryption and decryption procedures. In order to reuse the hardware resources and meet the trade-off between area and performance, we proposed a new triple functional arith- metic unit for computing high radix RSA and ECC operations over GF(p) and GF(2P), which also can be extended to support AES operations. A new high radix signed digital (SD) adder has been proposed to eliminate the carry propagations over GF(p). The proposed unified design took up 28.7% less hardware resources than implementing RSA, ECC, and AES individually, and the experimental results show that our proposed architecture can achieve 141.8 MHz using approxi- mately 5.5k CLBs on Virtex-5 FPGA. 展开更多
关键词 AES RSA ECC signed-digit number FPGA cryptographic algorithms high radix arithmetic unit
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部