A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.展开更多
During range-based self-localization of Wireless Sensor Network (WSN) nodes, the number and placement methods of beacon nodes have a great influence on the accuracy of localization. This paper proves a theorem which d...During range-based self-localization of Wireless Sensor Network (WSN) nodes, the number and placement methods of beacon nodes have a great influence on the accuracy of localization. This paper proves a theorem which describes the relationship between the placement of beacon nodes and whether the node can be located in 3D indoor environment. In fact, as the highest locating accuracy can be acquired when the beacon nodes form one or more equilateral triangles in 2D plane, we generalizes this conclusion to 3D space, and proposes a beacon nodes selection algorithm based on the minimum condition number to get the higher locating accuracy, which can minimize the influence of distance measurement error. Simulation results show that the algorithm is effective and feasible.展开更多
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co...The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.展开更多
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-...Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.展开更多
In order to effectively control the random tasks submitted and executed in grid workflow,a grid workflow model based on hybrid petri-net is presented. This model is composed of random petri-net,colored petri-net and g...In order to effectively control the random tasks submitted and executed in grid workflow,a grid workflow model based on hybrid petri-net is presented. This model is composed of random petri-net,colored petri-net and general petri-net. Therein random petri-net declares the relationship between the number of grid users' random tasks and the size of service window and computes the server intensity of grid system. Colored petri-net sets different color for places with grid services and provides the valid interfaces for grid resource allocation and task scheduling. The experiment indicated that the model presented in this letter could compute the valve between the number of users' random tasks and the size of grid service window in grid workflow management system.展开更多
This paper analyzes the defaults of traditional method according to the resource management method of grid computing based on virtual organization. It supports the concept to ameliorate the resource management with mo...This paper analyzes the defaults of traditional method according to the resource management method of grid computing based on virtual organization. It supports the concept to ameliorate the resource management with mobile agent and gives the ameliorated resource management model. Also pointed out is the methodology of ameliorating resource management and the way to realize in reality.展开更多
Nowadays,two trends appear in the application of sensor networks in which both multi-service and quality of service(QoS)are supported.In terms of the goal of low energy consumption and high connectivity,the control on...Nowadays,two trends appear in the application of sensor networks in which both multi-service and quality of service(QoS)are supported.In terms of the goal of low energy consumption and high connectivity,the control on topology is crucial.The algorithm of topology control based on quantum genetic algorithm in sensor networks is proposed.An advantage of the quantum genetic algorithm over the conventional genetic algorithm is demonstrated in simulation experiments.The goals of high connectivity and low consumption of energy are reached.展开更多
As the traditional methods were not suitable for the detection of small distribute denial of service(DDoS)attack and identification of busy traffic,on the basis of the influence of DDoS attack,one wavelet analysis met...As the traditional methods were not suitable for the detection of small distribute denial of service(DDoS)attack and identification of busy traffic,on the basis of the influence of DDoS attack,one wavelet analysis method was proposed.Wavelet method of coefficient variance analysis was deduced and a software model for the method was designed.In addition,key issues of the choice of wavelet and calculation of Hurst were resolved.The experimental results show that the proposed method has more advantages in accurately identifying busy traffic and detection of small DDoS attack.展开更多
As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted elemen...As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted element is presented in this paper.The trusted element,which differs from the traditional trusted hardware such as a smart card or a co-processor,offers a third party service based on an encrypted circuit construction.The procedure of constructing an encrypted circuit is introduced and the method of using the trusted service to protect the MA is also described.An application example is given to show how to use the new model at the end of the paper.展开更多
基金Sponsored by the National Natural Science Foundation of China (No. 60973139, 61170065, 61171053, 61003039,61003236)the Natural Science Foundation of Jiangsu Province (BK2011755, BK2012436)+3 种基金Scientific & Technological Support Project of Jiangsu Province (BE2011844,BE2011189)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(12KJB520009)Science & Technology Innovation Fundfor Higher Education Institutions of Jiangsu Province(CXZZ11-0405)the Peak of Six Major Talent inJiangsu Province (2010DZXX026)
文摘A secure communication mechanism is necessary in the applications of Wireless Multimedia Sensor Networks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
基金Supported by the National Natural Science Foundation of China (No.61003236 61171053)+2 种基金the Doctoral Fund of Ministry of Education of China (No.20113223110002)the Natural Science Major Program for Colleges and Universities in Jiangsu Province (No.11KJA520001)Science & Technology Innovation Fund for higher education institutions of Jiangsu Province (CXZZ12_0481)
文摘During range-based self-localization of Wireless Sensor Network (WSN) nodes, the number and placement methods of beacon nodes have a great influence on the accuracy of localization. This paper proves a theorem which describes the relationship between the placement of beacon nodes and whether the node can be located in 3D indoor environment. In fact, as the highest locating accuracy can be acquired when the beacon nodes form one or more equilateral triangles in 2D plane, we generalizes this conclusion to 3D space, and proposes a beacon nodes selection algorithm based on the minimum condition number to get the higher locating accuracy, which can minimize the influence of distance measurement error. Simulation results show that the algorithm is effective and feasible.
基金Supported by the National Natural Science Foundation of China (No.61003236, 61171053, 61170065)the Doctoral Fund of Ministry of Education of China (No.20113223110002)the Natural Science Major Program for Colleges and Universities in Jiangsu Province(No.11KJA520001)
文摘The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.
基金Supported by the National Natural Science Foundation ofChina(No.61170065,61003039)Postdoctoral Foundation(2012M511753,1101011B)+1 种基金Science & Technology Innovation Fund for Higher Education Institutions of Jiangsu Province(CXLX12_0486)the Priority Academic Program Development of Jiangsu Higher Education Institutions(yx002001)
文摘Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in Wireless Sensor Networks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
基金the National Natural Science Foundation of China (No.60573141, 70271050)the Natural Science Foundation of Jiangsu Province (No.BK2005146)+3 种基金the High Technology Research Programme of Jiangsu Prov-ince (No.BG2005037, BG2005038, BG2006001)the High Technology Research Programme of Nanjing (No. 2006RZ105)the Foundation of National Laboratory for Modern Communications (No.9140C1101010603)the Key Laboratory of Information Technology Processing of Jiangsu Province (No.kjs05001, kjs0606).
文摘In order to effectively control the random tasks submitted and executed in grid workflow,a grid workflow model based on hybrid petri-net is presented. This model is composed of random petri-net,colored petri-net and general petri-net. Therein random petri-net declares the relationship between the number of grid users' random tasks and the size of service window and computes the server intensity of grid system. Colored petri-net sets different color for places with grid services and provides the valid interfaces for grid resource allocation and task scheduling. The experiment indicated that the model presented in this letter could compute the valve between the number of users' random tasks and the size of grid service window in grid workflow management system.
基金Sponsored by the National Natural Science Foundation of China (No.60573141& No.70271050), National 863 High Technology Research Program of China (No.2005AA775050), the Natural Science Foundation of Jiangsu Province (No.BK2005146), High Technology Research Programme of Jiangsu Province (No.BG2004004, No.BG2005038, No.BG2006001), High Technology Research Programme of Nanjing (No.2006RZ105), and key Laboratory of Information Technology Processing of Jiangsu Province (kjs05001), Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions (05KJB520092).
文摘This paper analyzes the defaults of traditional method according to the resource management method of grid computing based on virtual organization. It supports the concept to ameliorate the resource management with mobile agent and gives the ameliorated resource management model. Also pointed out is the methodology of ameliorating resource management and the way to realize in reality.
基金supported by the National Natural Science Foundation of China (Grant No.60573141 and 70271050)the Natural Science Foundation of Jiangsu Province (No.BK2005146)+4 种基金the High Technology Research Program of Jiangsu Province (No.BG2004004 and BG2005038,BG2006001)the Hi-Technology Research and Development Program of China (No.2006AA01Z219)Foundation of National Laboratory for Modern Communications (No.9140C1101010603)the High Technology Research Programme of Nanjing (No.2006RZ105)the Foundation of Jiangsu Key Laboratory of Computer Information Processing Technology (No.kjs050001 and kjs0606).
文摘Nowadays,two trends appear in the application of sensor networks in which both multi-service and quality of service(QoS)are supported.In terms of the goal of low energy consumption and high connectivity,the control on topology is crucial.The algorithm of topology control based on quantum genetic algorithm in sensor networks is proposed.An advantage of the quantum genetic algorithm over the conventional genetic algorithm is demonstrated in simulation experiments.The goals of high connectivity and low consumption of energy are reached.
基金sponsored by the National Natural Science Foundation of China(Grant Nos.60573141,70271050)the Hi-Tech Research and Development Program of China(Nos.2005AA775050,2006AA01Z219,2006AA01Z201,2006AA01Z439)+6 种基金the Natural Science Foundation of Jiangsu Province(No.BK2005146)High Technology Research Programme of Jiangsu Province(Nos.BG2005037,BG2006001)High Technology Research Programme of Nanjing(No.2006RZ105)Foundation of State Key Laboratory for Modern Communications(No.9140C1101010603)Key Laboratory of Information Technology processing of Jiangsu Province(Nos.kjs05001,kjs0606)Project sponsored by Jiangsu Provincial Research Scheme Of Natural Science for Higher Education Institutions(No.05KJB520092)Table 3 Hurst results with traditional methods VTP Periodogram R/S Whittle 0.73540.76580.72530.7556。
文摘As the traditional methods were not suitable for the detection of small distribute denial of service(DDoS)attack and identification of busy traffic,on the basis of the influence of DDoS attack,one wavelet analysis method was proposed.Wavelet method of coefficient variance analysis was deduced and a software model for the method was designed.In addition,key issues of the choice of wavelet and calculation of Hurst were resolved.The experimental results show that the proposed method has more advantages in accurately identifying busy traffic and detection of small DDoS attack.
基金supported by the National Natural Science Foundation of China(60573141,70271050)the Hi-Tech Research and Development Program of China(2005AA775050)+5 种基金the Natural Science Foundation of Jiangsu Province(BK2005146)the High Technology Research Program of Jiangsu Province(BG2004004,BG2005038,BG2005038,BG2006001)the Key Laboratory of Information Technology Processing of Jiangsu Province(kjs05001,kjs0606)the High Technology Research Program of Nanjing City(2006Software Foundation105)the State Key Laboratory of Modern Communication(9140C1101010603)Jiangsu Provincial Research Scheme of Natural Science for Higher Education Institutions(05KJB520092).
文摘As a new technology,mobile agent(MA)shows a wide application in the field of network technology.However,security has been one of the crucial problems in its application.A new protection model based on a trusted element is presented in this paper.The trusted element,which differs from the traditional trusted hardware such as a smart card or a co-processor,offers a third party service based on an encrypted circuit construction.The procedure of constructing an encrypted circuit is introduced and the method of using the trusted service to protect the MA is also described.An application example is given to show how to use the new model at the end of the paper.