Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data an...Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.展开更多
Due to the road-constrained data delivery and highly dynamic topology of vehicle nodes in a Vehicular Ad Hoc Network (VANET), it is better to construct routing based on the road-to-road pattern than the traditional no...Due to the road-constrained data delivery and highly dynamic topology of vehicle nodes in a Vehicular Ad Hoc Network (VANET), it is better to construct routing based on the road-to-road pattern than the traditional node-to-node routing pattern in MANETs. However, the challenging issue is the opportunistic forwarding at intersections. Therefore, we propose a novel routing scheme, called Buffer and Switch (BAS). In BAS, each road buffers the data packets with multiple duplicates propagation in order to provide more opportunities for packet switching at intersections. Different from conventional protocols in VANETs, the propagation of duplicates in BAS is bidirectional along the routing path. Moreover, BAS's cost is much lower than other flooding-based protocols due to its spatio-temporally controlled duplicates propagation. Different from recent researches, BAS can deliver packets not only to a stationary node, but also to the stationary or mobile nodes in a specified area. We conduct the extensive simulations to evaluate the performance of BAS based on the road map of a real city collected from Google Earth. The simulation results show that BAS can outperform the existing protocols, especially when the network resources are limited.展开更多
Edge computing refers to the computing paradigm in which the processing power, communication capabilities and intelligence are pushed down to the edge of the networking system like gateways and devices, where the data...Edge computing refers to the computing paradigm in which the processing power, communication capabilities and intelligence are pushed down to the edge of the networking system like gateways and devices, where the data originates. In doing so, edge computing enables an infrastructure for processing the data directly from devices with low latency, battery consumption and bandwidth cost. With opportunities for research and advanced applications such as augmented reality and wearable cognitive assistance come new challenges. This special issue reports the current re? search on various topics related to edge computing, addressing the challenges in the enabling technologies and practical implementations.展开更多
Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge ...Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains.展开更多
Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and...Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of processing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel approach to detecting deadlocks in distributed system by using mobile agents, which demonstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detection strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.展开更多
基金supported by HONG KONG RGC and HONG KONG PolyU under the Grant G-U752/PolyU5103/09Ethe National Natural Science Foundation of Chinaunder Grant No.61003040,No.61202354
文摘Location-aware applications have been used widely with the assistance of the latest positioning features in Smart Phone such as GPS,AGPS,etc.However,all the existing applications gather users' geographical data and transfer them into the pertinent information to give meaning and value.For this kind of solutions,the user's privacy and security issues might be raised because the geographical location has to be exposed to the service provider.A novel and practical solution is proposed in this article to provide the relative location of two mobile users based on their WiFi scanned results without any additional sensors.There is no privacy concern in this solution because end users will not collect and send any sensitive information to the server.This solution adopts a Client/Server(C/S) architecture,where the mobile user as a client reports the ambient WiFi APs and the server calculates the distances based on the WiFi AP's topological relationships.A series of technologies are explored to improve the accuracy of the estimated distance and the corresponding algorithms are proposed.We also prove the feasibility with the prototype of "Circle Your Friends" System(CYFS) on Android phone which lets the mobile user know the distance between him and his social network friends.
基金supported by the National Natural Science Foundation of China under Grants No. 60903155,No. 60903156,No.60903158,No. 61003229the Fundamental Research Funds for the Central Universities under Grants No. ZYGX2009J063, No.ZYGX2010J074
文摘Due to the road-constrained data delivery and highly dynamic topology of vehicle nodes in a Vehicular Ad Hoc Network (VANET), it is better to construct routing based on the road-to-road pattern than the traditional node-to-node routing pattern in MANETs. However, the challenging issue is the opportunistic forwarding at intersections. Therefore, we propose a novel routing scheme, called Buffer and Switch (BAS). In BAS, each road buffers the data packets with multiple duplicates propagation in order to provide more opportunities for packet switching at intersections. Different from conventional protocols in VANETs, the propagation of duplicates in BAS is bidirectional along the routing path. Moreover, BAS's cost is much lower than other flooding-based protocols due to its spatio-temporally controlled duplicates propagation. Different from recent researches, BAS can deliver packets not only to a stationary node, but also to the stationary or mobile nodes in a specified area. We conduct the extensive simulations to evaluate the performance of BAS based on the road map of a real city collected from Google Earth. The simulation results show that BAS can outperform the existing protocols, especially when the network resources are limited.
文摘Edge computing refers to the computing paradigm in which the processing power, communication capabilities and intelligence are pushed down to the edge of the networking system like gateways and devices, where the data originates. In doing so, edge computing enables an infrastructure for processing the data directly from devices with low latency, battery consumption and bandwidth cost. With opportunities for research and advanced applications such as augmented reality and wearable cognitive assistance come new challenges. This special issue reports the current re? search on various topics related to edge computing, addressing the challenges in the enabling technologies and practical implementations.
基金supported by the Research Institute for Artificial Intelligence of Things,The Hong Kong Polytechnic University,HK RGC Collaborative Research Fund(CRF)under Grant No.C2004-21GF.
文摘Edge blockchains,the blockchains running on edge computing infrastructures,have attracted a lot of attention in recent years.Thanks to data privacy,scalable computing resources,and distributed topology nature of edge computing,edge blockchains are considered promising solutions to facilitating future blockchain applications.However,edge blockchains face unique security issues caused by the de⁃ployment of vulnerable edge devices and networks,including supply chain attacks and insecure consensus offloading,which are mostly not well studied in previous literature.This paper is the first survey that discusses the attacks and countermeasures of edge blockchains.We first summarize the three-layer architecture of edge blockchains:blockchain management,blockchain consensus,and blockchain lightweight cli⁃ent.We then describe seven specific attacks on edge blockchain components and discuss the countermeasures.At last,we provide future re⁃search directions on securing edge blockchains.This survey will act as a guideline for researchers and developers to design and implement se⁃cure edge blockchains.
基金National Natural Science Foundation of China (No.40971217) Geographic Spatial Information Engineering Key Laboratory of the State Bureau of Surveying and mapping (No.200915)
文摘Mobile agent has shown its promise as a powerful means to complement and enhance existing technology in various application areas. In particular, existing work has demonstrated that MA can simplify the development and improve the performance of certain classes of distributed applications, especially for those running on a wide-area, heterogeneous, and dynamic networking environment like the Internet. In our previous work, we extended the application of MA to the design of distributed control functions, which require the maintenance of logical relationship among and/or coordination of processing entities in a distributed system. A novel framework is presented for structuring and building distributed systems, which use cooperating mobile agents as an aid to carry out coordination and cooperation tasks in distributed systems. The framework has been used for designing various distributed control functions such as load balancing and mutual ex- clusion in our previous work. In this paper, we use the framework to propose a novel approach to detecting deadlocks in distributed system by using mobile agents, which demonstrates the advantage of being adaptive and flexible of mobile agents. We first describe the MAEDD (Mobile Agent Enabled Deadlock Detection) scheme, in which mobile agents are dispatched to collect and analyze deadlock information distributed across the network sites and, based on the analysis, to detect and resolve deadlocks. Then the design of an adaptive hybrid algorithm derived from the framework is presented. The algorithm can dynamically adapt itself to the changes in system state by using different deadlock detection strategies. The performance of the proposed algorithm has been evaluated using simulations. The results show that the algorithm can outperform existing algorithms that use a fixed deadlock detection strategy.