Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif...Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.展开更多
Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior.This paper explores the mechanisms of information spreading including stifling mechan...Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior.This paper explores the mechanisms of information spreading including stifling mechanism,latent mechanism and forgetting mechanism,establishes a refined SEIR model,and builds the corresponding mean-field equations.The methods of the differential dynamics and the next generation matrix are used to calculate the equilibriums and the basic reproductive number,and the asymptotical stability of the network equilibriums are proved theoretically.Simulation experiments are carried out to analyze the effect of the spreading mechanisms on the information spreading process and the results support our conclusions.展开更多
基金supported in part by National Natural Science Foundation of China(61502368,61303033,U1135002 and U1405255)the National High Technology Research and Development Program(863 Program)of China(No.2015AA017203)+1 种基金the Fundamental Research Funds for the Central Universities(XJS14072,JB150308)the Aviation Science Foundation of China(No.2013ZC31003,20141931001)
文摘Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance.
基金The authors would like to thank the reviewers for their detailed reviews and constructive comments, which have helped improve the quality of this paper. This work was supported in part by Program for Changjiang Scholars and Innovative Research Team in University of Ministry of Education of China under Grant No. IRT1078 Key Program of NSFC-Guangdong Union Foundation under Grant No. U1135002+3 种基金 National Science and Technology Major Project of the Ministry of Science and Technology of China under Grant No. 2011ZX03005- 002 National Natural Science Foundation of China under Grant No.61173135 Natural Science Foundation of Shaanxi Province under Grant No.2014JQ8297 Fundamental Research Funds for the Central Universities of Ministry of Education of China under Grant Nos. JY 10000903001, K5051303007, K5051203012.
文摘Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior.This paper explores the mechanisms of information spreading including stifling mechanism,latent mechanism and forgetting mechanism,establishes a refined SEIR model,and builds the corresponding mean-field equations.The methods of the differential dynamics and the next generation matrix are used to calculate the equilibriums and the basic reproductive number,and the asymptotical stability of the network equilibriums are proved theoretically.Simulation experiments are carried out to analyze the effect of the spreading mechanisms on the information spreading process and the results support our conclusions.