期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Analysis on the Resilience of Key Pre-distribution in Sensor Networks 被引量:1
1
作者 Shen Yulong Ma Jianfeng Pei Qingqi 《China Communications》 SCIE CSCD 2007年第3期30-37,共8页
Resilience against node capture is one of the main indicators of the key pre-distribution security in sensor networks.On providing the attack model and the definition of the resilience against node capture of sensor n... Resilience against node capture is one of the main indicators of the key pre-distribution security in sensor networks.On providing the attack model and the definition of the resilience against node capture of sensor networks,the resilience of basic random key pre-distribution,Q-composite random key pre-distribution and their reinforced schemes are analyzed and compared in depth.Research results show that the size of key pool,the numbers of the keys stored in nodes and the value of Q determine the resilience of random key pre-distribution.The tradeoff between the resilience,security connectivity and costs in sensor networks is presented.These researches lay a foundation on the design of the secure protocol and the algorithm in the specific application environment of sensor networks. 展开更多
关键词 SENSOR networks RESILIENCE ANALYSIS key pre-distribution
下载PDF
Deterministic Quantum Key Distribution Using Gaussian-Modulated Squeezed States 被引量:1
2
作者 何广强 朱俊 曾贵华 《Communications in Theoretical Physics》 SCIE CAS CSCD 2011年第10期664-668,共5页
A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministi... A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministic char- acteristic, i.e., no basis reconciliation between two parties, leads a nearly two-time efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy. 展开更多
关键词 Gaussian-modulated squeezed state quantum key distribution deterministic private key
下载PDF
Deterministic Quantum Key Distribution with Pulsed Homodyne Detection
3
作者 王川 王婉莹 +1 位作者 艾清 龙桂鲁 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第1期67-70,共4页
In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information determin... In this paper, we propose a deterministic quantum communication protocol using weak coherent states and pulsed homodyne detection. In this protocol, the communication parties exchange their secret information deterministicaJly in two rounds. The devices and efficiency of the protocol are discussed respectively. We also show the security of the protocol against intercept-resend and Trojan-Horse eavesdropping attacks. 展开更多
关键词 deterministic quantum key distribution pulsed homodyne detection
下载PDF
Review of Key Management Mechanisms in Wireless Sensor Networks 被引量:1
4
作者 SUN Dong-Mei HE Bing 《自动化学报》 EI CSCD 北大核心 2006年第6期900-906,共7页
Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inn... Recent advancements in wireless communication and microchip techniques have accelerated the development of wireless sensor networks (WSN). Key management in WSN is a critical and challenging problem because of the inner characteristics of sensor networks: deployed in hostile environments, limited resource and ad hoc nature. This paper investigates the constraints and special requirements of key management in sensor network environment, and some basic evaluation metrics are introduced. The key pre-distribution scheme is thought as the most suitable solution for key management problem in wireless sensor networks. It can be classified into four classes: pure probabilistic key pre-distribution, polynomial-based, Blom's matrix-based, and deterministic key pre-distribution schemes. In each class of methods, the related research papers are discussed based on the basic evaluation metrics. Finally, the possible research directions in key management are discussed. 展开更多
关键词 key management key pre-distribution wireless sensor networks
下载PDF
A Cluster-Based Random Key Revocation Protocol for Wireless Sensor Networks 被引量:1
5
作者 Yi Jiang Hao-Shan Shi 《Journal of Electronic Science and Technology of China》 2008年第1期10-15,共6页
In recent years,several random key pre-distribution schemes have been proposed to bootstrap keys for encryption,but the problem of key and node revocation has received relatively little attention.In this paper,based o... In recent years,several random key pre-distribution schemes have been proposed to bootstrap keys for encryption,but the problem of key and node revocation has received relatively little attention.In this paper,based on a random key pre-distribution scheme using clustering,we present a novel random key revoca-tion protocol,which is suitable for large scale networks greatly and removes compromised information efficiently.The revocation protocol can guarantee network security by using less memory consumption and communication load,and combined by centralized and distributed revoca-tion,having virtues of timeliness and veracity for revoca-tion at the same time. 展开更多
关键词 Cluster-based key pre-distribution revocation wireless sensor networks.
下载PDF
Uncertainty analysis of seawater intrusion forecasting 被引量:1
6
作者 Zhong-wei ZHAO Jian ZHAO Chang-sheng FU 《Water Science and Engineering》 EI CAS CSCD 2013年第4期380-391,共12页
In order to describe the importance of uncertainty analysis in seawater intrusion forecasting and identify the main factors that might cause great differences in prediction results, we analyzed the influence of sea le... In order to describe the importance of uncertainty analysis in seawater intrusion forecasting and identify the main factors that might cause great differences in prediction results, we analyzed the influence of sea level rise, tidal effect, the seasonal variance of influx, and the annual variance of the pumping rate, as well as combinations of different parameters. The results show that the most important factors that might cause great differences in seawater intrusion distance are the variance of pumping rate and combinations of different parameters. The influence of sea level rise can be neglected in a short-time simulation (ten years, for instance). Retardation of seawater intrusion caused by tidal effects is obviously important in aquifers near the coastline, but the influence decreases with distance away from the coastline and depth away from the seabed. The intrusion distance can reach a dynamic equilibrium with the application of the sine function for seasonal effects of influx. As a conclusion, we suggest that uncertainty analysis should be considered in seawater intrusion forecasting, if possible. 展开更多
关键词 key words: seawater intrusion forecasting uncertainty analysis deterministic model uncertainty model factorial design
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部