In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the abov...In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.展开更多
Advances in mobile communication bring great effects on people’s life styles. This paper describes the implementation of a remote control scheme, Remote Control System via Bluetooth and SMS (Short Message Service), w...Advances in mobile communication bring great effects on people’s life styles. This paper describes the implementation of a remote control scheme, Remote Control System via Bluetooth and SMS (Short Message Service), which controls smart home in short distance and long distance, respectively. Although SMS is widely used for a variety of applications, it is not suitable for the purpose of remote control because it suffers from transmission delay, loss and lacks of confidentiality. This paper proposes a SMS-based protocol, which is designed with the mechanisms of reliable transmission and information encryption, thus it is capable of the implementation of secure and reliable control.展开更多
The term IoT refers to the interconnection and exchange of data among devices/sensors.IoT devices are often small,low cost,and have limited resources.The IoT issues and challenges are growing increasingly.Security and...The term IoT refers to the interconnection and exchange of data among devices/sensors.IoT devices are often small,low cost,and have limited resources.The IoT issues and challenges are growing increasingly.Security and privacy issues are among the most important concerns in IoT applications,such as smart buildings.Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks,where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel.Thus,remote cybersecurity attacks are a significant threat.Emerging applications in smart environments such as smart buildings require remote access for both users and resources.Since the user/building communication channel is insecure,a lightweight and secure authentication protocol is required.In this paper,we propose a new secure remote user mutual authentication protocol based on transitory identities and multi-factor authentication for IoT smart building environment.The protocol ensures that only legitimate users can authenticate with smart building controllers in an anonymous,unlinkable,and untraceable manner.The protocol also avoids clock synchronization problem and can resist quantum computing attacks.The security of the protocol is evaluated using two different methods:(1)informal analysis;(2)model check using the automated validation of internet security protocols and applications(AVISPA)toolkit.The communication overhead and computational cost of the proposed are analyzed.The security and performance analysis show that our protocol is secure and efficient.展开更多
Online criminal litigation transcends the constraints of physical time and space and changes the logic and path of trial hearings for some criminal cases with the help of technology.However,the leapfrog shift from the...Online criminal litigation transcends the constraints of physical time and space and changes the logic and path of trial hearings for some criminal cases with the help of technology.However,the leapfrog shift from the“physical field”to the“virtual field”has brought great challenges to the effective exercise of the defendant's right to defense.Online criminal justice further highlights the imbalance in the relationship between prosecution and defense in the context of smart justice,and proposes a new topic for protecting the human rights of the prosecuted.The introduction of online criminal litigation in judicial practice is intended to achieve justice in a faster and more convenient way.However,the dissipation of the ritualized remote hearings tends to undermine the effectiveness of the defense and impair the defense's ability to cross-examine evidence,while the technically advantageous public authorities can aggravate the barrier to the defense's meeting and reading the case file.The root cause is that technological power instrumentalism overemphasizes pragmatism and the pursuit of truth under the position of authority,thus diluting humanistic care for the subject of litigation.In order to resolve the problem with the quality and effectiveness of the right to defense in remote hearings,it is necessary to transform online criminal litigation from a“practical technical tool”to a“convenient auxiliary method,”and appropriately weigh the limits of pursuing truth against human rights protection in special scenarios.Meanwhile,it is also feasible to provide technical care for the defense and strengthen its ability to cross-examine evidence.Moreover,a covert communication platform should be furnished for the defender's online meeting to actively strengthen the protection of the defendant's right to defense.展开更多
Remote sensing(RS)presents laser scanning measurements,aerial photos,and high-resolution satellite images,which are utilized for extracting a range of traffic-related and road-related features.RS has a weakness,such a...Remote sensing(RS)presents laser scanning measurements,aerial photos,and high-resolution satellite images,which are utilized for extracting a range of traffic-related and road-related features.RS has a weakness,such as traffic fluctuations on small time scales that could distort the accuracy of predicted road and traffic features.This article introduces an Optimal Deep Learning for Traffic Critical Prediction Model on High-Resolution Remote Sensing Images(ODLTCP-HRRSI)to resolve these issues.The presented ODLTCP-HRRSI technique majorly aims to forecast the critical traffic in smart cities.To attain this,the presented ODLTCP-HRRSI model performs two major processes.At the initial stage,the ODLTCP-HRRSI technique employs a convolutional neural network with an auto-encoder(CNN-AE)model for productive and accurate traffic flow.Next,the hyperparameter adjustment of the CNN-AE model is performed via the Bayesian adaptive direct search optimization(BADSO)algorithm.The experimental outcomes demonstrate the enhanced performance of the ODLTCP-HRRSI technique over recent approaches with maximum accuracy of 98.23%.展开更多
Abstract:Based on optical fiber technology, the main electric circuit of the remote I/O unit controller is studied. And the application of the system is illustrated.
The source maintenance technology of the smart substation offers the base for the models, data and graphs sharing between the substation and the dispatch center. This paper researches on the conversion technology betw...The source maintenance technology of the smart substation offers the base for the models, data and graphs sharing between the substation and the dispatch center. This paper researches on the conversion technology between SCD model in IEC 61850 Ed. 2 and the CIM model in IEC 61970. The substation provides SVG and SCD documents to the dispatch center, which includes primary equipment information and the network topology. The dispatch center’s automation system completes the conversion between the two models. This paper researches on the smart remote technology, which uses IEC 61850 as communication protocol. It can filter and restructure communication data based on the needs of different dispatch center. At the same time, it can provide quality control of communication link, to ensure that the important data be sent in real time.展开更多
Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left...Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed.展开更多
Traditional wireless sensor networks(WSNs)are not suitable for rough terrains that are difficult or impossible to access by humans.Smart dust is a technology that works with the combination of many tiny sensors which ...Traditional wireless sensor networks(WSNs)are not suitable for rough terrains that are difficult or impossible to access by humans.Smart dust is a technology that works with the combination of many tiny sensors which is highly useful for obtaining remote sensing information from rough terrains.The tiny sensors are sprinkled in large numbers on rough terrains using airborne distribution through drones or aircraftwithout manually setting their locations.Although it is clear that a number of remote sensing applications can benefit from this technology,but the small size of smart dust fundamentally restricts the integration of advanced hardware on tiny sensors.This raises many challenges including how to estimate the location of events sensed by the smart dusts.Existing solutions on estimating the location of events sensed by the smart dusts are not suitable for monitoring rough terrains as these solutions depend on relay sensors and laser patterns which have their own limitations in terms of power constraint and uneven surfaces.The study proposes a novel machine learning based localization algorithm for estimating the location of events.The approach utilizes timestamps(time of arrival)of sensed events received at base stations by assembling them into a multidimensional vector and input to a machine learning classifier for estimating the location.Due to the unavailability of real smart dusts,we built a simulator for analysing the accuracy of the proposed approach formonitoring forest fire.The experiments on the simulator show reasonable accuracy of the approach.展开更多
The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner a...The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner also needs to rent the house. It can be difficult to find tenants just to hang a lease sign on a building, and as a result, they lose money. An online common platform can play a vital role in this case. The purpose of the study is to develop a common web-based online platform for both tenants and house owners so that both tenants and landowners will mutually benefit from the system. This paper presents the development of web applications for the people of Bangladesh where both house owners and tenants can register and tenants can have houses for rent via sophisticated contact with the house owner. In this paper, a common online-based smart house rental web application has been developed both for tenants and for house owners. This web application is very user-friendly, efficient and it has got many unique features that are not offered by other currently available house rental websites here in Bangladesh. Tenants can register using their phone number, store information about their identity, search for available houses, send messages to house owners, and choose a suitable house using developed web applications. House owners can also register for the system, which will manually verify and authenticate the knowledge provided by the house owner can view a tenant’s information history whenever a tenant makes contact through text and supply house-related information accordingly. The proposed online smart house system has been tested and validated. It works very efficiently with many features. The application provided faster and improved opportunities to get houses, as well as ensuring the availability of houses for rent in the greatest number of areas. The system will help to spread trustworthy services nationwide and supply users with the chance to speak and improve the house rent in Bangladesh. Because it has many smart features, this developed online smart house rental web application will make it very easy for tenants to find a house to rent. House owners, on the other hand, can easily rent out their properties.展开更多
基金the National Natural Science Foundation of China (10671051)the Natural Science Foundation of Zhejiang Province (103060)
文摘In 2000, a remote user authentication scheme using smart cards was proposed and the masquerade attacks were proved successful on this scheme. Recently, Kumar has suggested the idea of check digits to overcome the above attacks with a new scheme that removes these threats well. In this paper it is pointed out that the weakness still exists in Kumar's scheme, and the intruder can login to the remote system through having some information. A new scheme which can overcome these attacks and appears more secure and efficient than Kumar's is presented.
文摘Advances in mobile communication bring great effects on people’s life styles. This paper describes the implementation of a remote control scheme, Remote Control System via Bluetooth and SMS (Short Message Service), which controls smart home in short distance and long distance, respectively. Although SMS is widely used for a variety of applications, it is not suitable for the purpose of remote control because it suffers from transmission delay, loss and lacks of confidentiality. This paper proposes a SMS-based protocol, which is designed with the mechanisms of reliable transmission and information encryption, thus it is capable of the implementation of secure and reliable control.
文摘The term IoT refers to the interconnection and exchange of data among devices/sensors.IoT devices are often small,low cost,and have limited resources.The IoT issues and challenges are growing increasingly.Security and privacy issues are among the most important concerns in IoT applications,such as smart buildings.Remote cybersecurity attacks are the attacks which do not require physical access to the IoT networks,where the attacker can remotely access and communicate with the IoT devices through a wireless communication channel.Thus,remote cybersecurity attacks are a significant threat.Emerging applications in smart environments such as smart buildings require remote access for both users and resources.Since the user/building communication channel is insecure,a lightweight and secure authentication protocol is required.In this paper,we propose a new secure remote user mutual authentication protocol based on transitory identities and multi-factor authentication for IoT smart building environment.The protocol ensures that only legitimate users can authenticate with smart building controllers in an anonymous,unlinkable,and untraceable manner.The protocol also avoids clock synchronization problem and can resist quantum computing attacks.The security of the protocol is evaluated using two different methods:(1)informal analysis;(2)model check using the automated validation of internet security protocols and applications(AVISPA)toolkit.The communication overhead and computational cost of the proposed are analyzed.The security and performance analysis show that our protocol is secure and efficient.
基金the phased result of the Humanities and Social Science Research and Planning Fund Project of the Ministry of Education,titled“Research on Online Dispute Resolution Mechanisms:Theory,Rules,and Practice”(22YJA820036)Research Project on the Historical and Cultural Heritage,Essential Connotation and Mission of the Era of China’s Human Rights Development Path of the Beijing Research Center of Xi Jinping Thought on Socialism with Chinese Characteristics for a New Era(23LLFXA055)。
文摘Online criminal litigation transcends the constraints of physical time and space and changes the logic and path of trial hearings for some criminal cases with the help of technology.However,the leapfrog shift from the“physical field”to the“virtual field”has brought great challenges to the effective exercise of the defendant's right to defense.Online criminal justice further highlights the imbalance in the relationship between prosecution and defense in the context of smart justice,and proposes a new topic for protecting the human rights of the prosecuted.The introduction of online criminal litigation in judicial practice is intended to achieve justice in a faster and more convenient way.However,the dissipation of the ritualized remote hearings tends to undermine the effectiveness of the defense and impair the defense's ability to cross-examine evidence,while the technically advantageous public authorities can aggravate the barrier to the defense's meeting and reading the case file.The root cause is that technological power instrumentalism overemphasizes pragmatism and the pursuit of truth under the position of authority,thus diluting humanistic care for the subject of litigation.In order to resolve the problem with the quality and effectiveness of the right to defense in remote hearings,it is necessary to transform online criminal litigation from a“practical technical tool”to a“convenient auxiliary method,”and appropriately weigh the limits of pursuing truth against human rights protection in special scenarios.Meanwhile,it is also feasible to provide technical care for the defense and strengthen its ability to cross-examine evidence.Moreover,a covert communication platform should be furnished for the defender's online meeting to actively strengthen the protection of the defendant's right to defense.
文摘Remote sensing(RS)presents laser scanning measurements,aerial photos,and high-resolution satellite images,which are utilized for extracting a range of traffic-related and road-related features.RS has a weakness,such as traffic fluctuations on small time scales that could distort the accuracy of predicted road and traffic features.This article introduces an Optimal Deep Learning for Traffic Critical Prediction Model on High-Resolution Remote Sensing Images(ODLTCP-HRRSI)to resolve these issues.The presented ODLTCP-HRRSI technique majorly aims to forecast the critical traffic in smart cities.To attain this,the presented ODLTCP-HRRSI model performs two major processes.At the initial stage,the ODLTCP-HRRSI technique employs a convolutional neural network with an auto-encoder(CNN-AE)model for productive and accurate traffic flow.Next,the hyperparameter adjustment of the CNN-AE model is performed via the Bayesian adaptive direct search optimization(BADSO)algorithm.The experimental outcomes demonstrate the enhanced performance of the ODLTCP-HRRSI technique over recent approaches with maximum accuracy of 98.23%.
文摘Abstract:Based on optical fiber technology, the main electric circuit of the remote I/O unit controller is studied. And the application of the system is illustrated.
文摘The source maintenance technology of the smart substation offers the base for the models, data and graphs sharing between the substation and the dispatch center. This paper researches on the conversion technology between SCD model in IEC 61850 Ed. 2 and the CIM model in IEC 61970. The substation provides SVG and SCD documents to the dispatch center, which includes primary equipment information and the network topology. The dispatch center’s automation system completes the conversion between the two models. This paper researches on the smart remote technology, which uses IEC 61850 as communication protocol. It can filter and restructure communication data based on the needs of different dispatch center. At the same time, it can provide quality control of communication link, to ensure that the important data be sent in real time.
文摘Home security should be a top concern for everyone who owns or rents a home. Moreover, safe and secure residential space is the necessity of every individual as most of the family members are working. The home is left unattended for most of the day-time and home invasion crimes are at its peak as constantly monitoring of the home is difficult. Another reason for the need of home safety is specifically when the elderly person is alone or the kids are with baby-sitter and servant. Home security system i.e. HomeOS is thus applicable and desirable for resident’s safety and convenience. This will be achieved by turning your home into a smart home by intelligent remote monitoring. Smart home comes into picture for the purpose of controlling and monitoring the home. It will give you peace of mind, as you can have a close watch and stay connected anytime, anywhere. But, is common man really concerned about home security? An investigative study was done by conducting a survey to get the inputs from different people from diverse backgrounds. The main motivation behind this survey was to make people aware of advanced HomeOS and analyze their need for security. This paper also studied the necessity of HomeOS investigative study in current situation where the home burglaries are rising at an exponential rate. In order to arrive at findings and conclusions, data were analyzed. The graphical method was employed to identify the relative significance of home security. From this analysis, we can infer that the cases of having kids and aged person at home or location of home contribute significantly to the need of advanced home security system. At the end, the proposed system model with its flow and the challenges faced while implementing home security systems are also discussed.
基金This research is supported by Universiti Brunei Darussalam(UBD)under FIC allied research grant program.
文摘Traditional wireless sensor networks(WSNs)are not suitable for rough terrains that are difficult or impossible to access by humans.Smart dust is a technology that works with the combination of many tiny sensors which is highly useful for obtaining remote sensing information from rough terrains.The tiny sensors are sprinkled in large numbers on rough terrains using airborne distribution through drones or aircraftwithout manually setting their locations.Although it is clear that a number of remote sensing applications can benefit from this technology,but the small size of smart dust fundamentally restricts the integration of advanced hardware on tiny sensors.This raises many challenges including how to estimate the location of events sensed by the smart dusts.Existing solutions on estimating the location of events sensed by the smart dusts are not suitable for monitoring rough terrains as these solutions depend on relay sensors and laser patterns which have their own limitations in terms of power constraint and uneven surfaces.The study proposes a novel machine learning based localization algorithm for estimating the location of events.The approach utilizes timestamps(time of arrival)of sensed events received at base stations by assembling them into a multidimensional vector and input to a machine learning classifier for estimating the location.Due to the unavailability of real smart dusts,we built a simulator for analysing the accuracy of the proposed approach formonitoring forest fire.The experiments on the simulator show reasonable accuracy of the approach.
文摘The house rental issue is one of the elemental parts of society. Nowadays, it is extremely difficult to find suitable accommodation in city areas if people search for it physically. On the other hand, the land owner also needs to rent the house. It can be difficult to find tenants just to hang a lease sign on a building, and as a result, they lose money. An online common platform can play a vital role in this case. The purpose of the study is to develop a common web-based online platform for both tenants and house owners so that both tenants and landowners will mutually benefit from the system. This paper presents the development of web applications for the people of Bangladesh where both house owners and tenants can register and tenants can have houses for rent via sophisticated contact with the house owner. In this paper, a common online-based smart house rental web application has been developed both for tenants and for house owners. This web application is very user-friendly, efficient and it has got many unique features that are not offered by other currently available house rental websites here in Bangladesh. Tenants can register using their phone number, store information about their identity, search for available houses, send messages to house owners, and choose a suitable house using developed web applications. House owners can also register for the system, which will manually verify and authenticate the knowledge provided by the house owner can view a tenant’s information history whenever a tenant makes contact through text and supply house-related information accordingly. The proposed online smart house system has been tested and validated. It works very efficiently with many features. The application provided faster and improved opportunities to get houses, as well as ensuring the availability of houses for rent in the greatest number of areas. The system will help to spread trustworthy services nationwide and supply users with the chance to speak and improve the house rent in Bangladesh. Because it has many smart features, this developed online smart house rental web application will make it very easy for tenants to find a house to rent. House owners, on the other hand, can easily rent out their properties.