IEEE 802.16 is the standard for broadband wireless access.The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are specifi...IEEE 802.16 is the standard for broadband wireless access.The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are specified.In IEEE 802.16e,SA-TEK 3-way handshake is added into PKM protocols,aiming to facilitate re-authentication and key distribution.This paper analyzes the SA-TEK 3-way handshake protocol,and proposes an optimized version.We also use CasperFDR,a popular formal analysis tool,to verify our analysis.Moreover,we model various simplified versions to find the functions of those elements in the protocol,and correct some misunderstandings in related works using other formal analysis tools.展开更多
Multi-party applications are becoming popular due to the development of mobile smart devices. In this work, we explore Secure Device Pairing (SDP), a novel pairing mechanism, which allows users to use smart watches ...Multi-party applications are becoming popular due to the development of mobile smart devices. In this work, we explore Secure Device Pairing (SDP), a novel pairing mechanism, which allows users to use smart watches to detect the handshake between users, and use the shaking information to create security keys that are highly random. Thus, we perform device pairing without complicated operations. SDP dynamically adjusts the sensor's sampling frequency and uses different classifiers at varying stages to save the energy. A multi-level quantization algorithm is used to maximize the mutual information between two communicating entities without information leakage. We evaluate the main modules of SDP with 1800 sets of handshake data. Results show that the recognition accuracy of the handshake detection algorithm is 98.2%, and the power consumption is only 1/3 of that of the single sampling frequency classifier.展开更多
When Chinese leader Deng Xiaoping went to Nepal in February 1978,Madan Kumar Bhattarai was a young journalist with Nepal's state-owned The Rising Nepal daily who got the much-coveted assignment to cover the visit.
Formerly opponents, international record company EMI and Chinese search engine Baidu.com have launched an Internet venture, but this model has yet to be
【目的】本文主要根据当前网络发展存在的问题及基于区块链的网络空间标识系统的关键技术等方面展开介绍,为后续相关工作的开展提供参考。【方法】本文梳理了基于区块链的网络空间标识系统的研究现状,介绍了Namecoin、Blockstack、Hands...【目的】本文主要根据当前网络发展存在的问题及基于区块链的网络空间标识系统的关键技术等方面展开介绍,为后续相关工作的开展提供参考。【方法】本文梳理了基于区块链的网络空间标识系统的研究现状,介绍了Namecoin、Blockstack、Handshake、Ethereum Name Service等几种系统的设计架构、技术方案,并对不同项目进行了对比分析。【结果】相较于现有DNS系统,基于区块链的网络空间标识实现了安全平等、抗审查的网络基础架构,并且在数字认证、全球统一身份标识等领域积极探索展开合作,得到了一定程度的应用。【结论】基于区块链的网络空间标识服务为未来网络基础资源发展提供了一种新的思路与趋势,同时也面临着如何处理与现有系统的关系及广泛推广等问题。展开更多
Two types of handshaking circuits are proposed to implement the asynchronous communication between two processing elements in the wavefront array processors. After correcting the flaws in the original design, these ci...Two types of handshaking circuits are proposed to implement the asynchronous communication between two processing elements in the wavefront array processors. After correcting the flaws in the original design, these circuits make the system more robust and flexible. These circuits have compact architectures and are of higher performance. Besides, compared with other handshaking circuits, these designs are more suitable for FPGA.展开更多
An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a loca...An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a local clock generator. Two approaches for the implementation of communication ports are presented, one with pure standard cells and the others with Mttller-C elements. The detailed design methodology for GALS systems is given and the circuits are validated with VHDL and circuits simulation in standard CMOS technology.展开更多
A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and pr...A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.展开更多
The paper focuses on physical contact.It depicts the expression and function of physical contact in nonverbal communication and makes a comparison of physical contact between China and other Countries so as to improve...The paper focuses on physical contact.It depicts the expression and function of physical contact in nonverbal communication and makes a comparison of physical contact between China and other Countries so as to improve the communication competence.展开更多
Due to the characteristics of the underwater acoustic channel, such as long propagation delay and low available bandwidth, the media access control (MAC) protocol designed for underwater acoustic sensor networks (UWAS...Due to the characteristics of the underwater acoustic channel, such as long propagation delay and low available bandwidth, the media access control (MAC) protocol designed for underwater acoustic sensor networks (UWASNs) is quite different from that for terrestrial wireless sensor networks. In this paper, we propose a MAC protocol for the UWASNs, named the funneling MAC (FMAC-U), which is a contention-based MAC protocol with a three-way handshake. The FMAC-U protocol uses an improved three-way handshake mechanism and code division multiple access (CDMA) based technology for request-to-send (RTS) signals transmitting to the sink in order that the sink can receive packets from multiple neighbors in a fixed order during each round of handshakes. The mechanism reduces the packet collisions and alleviates the funneling effect, especially alleviating the choke point of the UWASNs. Simulation results show that the proposed FMAC-U protocol achieves higher throughput, smaller packet drop ratio, lower end-to-end delay, and lower overhead of the control packet compared to the existing MAC protocols for UWASNs.展开更多
Full-Bridge Modular Multilevel Converter(FBMMC) has strong ability to ride through serious DC faults,thus it is very suitable for multi-terminal flexible HVDC applications.However,no references have reported the locat...Full-Bridge Modular Multilevel Converter(FBMMC) has strong ability to ride through serious DC faults,thus it is very suitable for multi-terminal flexible HVDC applications.However,no references have reported the locating and isolating of DC faults and corresponding DC faults ride-through capability evaluation index.This paper introduces the topology mechanism of FBMMC and its loss reduction operation mode,theoretically certifies that the universal decoupled control strategy of Voltage Source Converter(VSC) and the similar modulation strategies of Half-Bridge MMC(HBMMC) can be applied to FBMMC for constructing complete closed-loop control system.On the basis of the existing DC faults locating and isolating schemes of 2-level VSC based Multi-Terminal HVDC(VSC-MTDC) system and the particularity of FBMMC,this paper proposes the DC faults wire selection "handshaking" method of the FBMMC-MTDC system,and proposes the DC Fault Ride-Through Capability Index(DFRTI) for evaluating the DC faults suppressing capability of the VSC-MTDC systems,including FBMMC-MTDC.Simulations of FBMMC-MTDC in PSCAD/EMTDC validate the correctness and effectiveness of the proposed control strategy and evaluation index.展开更多
基金the Startup Research Fund for the Doctoral Faculty of Shenyang University of Chemical Technology(No.51045084)。
文摘IEEE 802.16 is the standard for broadband wireless access.The security sublayer is provided within IEEE 802.16 MAC layer for privacy and access control,in which the privacy and key management(PKM)protocols are specified.In IEEE 802.16e,SA-TEK 3-way handshake is added into PKM protocols,aiming to facilitate re-authentication and key distribution.This paper analyzes the SA-TEK 3-way handshake protocol,and proposes an optimized version.We also use CasperFDR,a popular formal analysis tool,to verify our analysis.Moreover,we model various simplified versions to find the functions of those elements in the protocol,and correct some misunderstandings in related works using other formal analysis tools.
基金supported in part by the National Natural Science Foundation of China (Nos. 61472219 and 61672372)Shaanxi NSF (No. 2017JM6109)
文摘Multi-party applications are becoming popular due to the development of mobile smart devices. In this work, we explore Secure Device Pairing (SDP), a novel pairing mechanism, which allows users to use smart watches to detect the handshake between users, and use the shaking information to create security keys that are highly random. Thus, we perform device pairing without complicated operations. SDP dynamically adjusts the sensor's sampling frequency and uses different classifiers at varying stages to save the energy. A multi-level quantization algorithm is used to maximize the mutual information between two communicating entities without information leakage. We evaluate the main modules of SDP with 1800 sets of handshake data. Results show that the recognition accuracy of the handshake detection algorithm is 98.2%, and the power consumption is only 1/3 of that of the single sampling frequency classifier.
文摘When Chinese leader Deng Xiaoping went to Nepal in February 1978,Madan Kumar Bhattarai was a young journalist with Nepal's state-owned The Rising Nepal daily who got the much-coveted assignment to cover the visit.
文摘Formerly opponents, international record company EMI and Chinese search engine Baidu.com have launched an Internet venture, but this model has yet to be
文摘【目的】本文主要根据当前网络发展存在的问题及基于区块链的网络空间标识系统的关键技术等方面展开介绍,为后续相关工作的开展提供参考。【方法】本文梳理了基于区块链的网络空间标识系统的研究现状,介绍了Namecoin、Blockstack、Handshake、Ethereum Name Service等几种系统的设计架构、技术方案,并对不同项目进行了对比分析。【结果】相较于现有DNS系统,基于区块链的网络空间标识实现了安全平等、抗审查的网络基础架构,并且在数字认证、全球统一身份标识等领域积极探索展开合作,得到了一定程度的应用。【结论】基于区块链的网络空间标识服务为未来网络基础资源发展提供了一种新的思路与趋势,同时也面临着如何处理与现有系统的关系及广泛推广等问题。
文摘Two types of handshaking circuits are proposed to implement the asynchronous communication between two processing elements in the wavefront array processors. After correcting the flaws in the original design, these circuits make the system more robust and flexible. These circuits have compact architectures and are of higher performance. Besides, compared with other handshaking circuits, these designs are more suitable for FPGA.
文摘An asynchronous wrapper with novel handshake circuits for data communication in globally asynchronous locally synchronous (GALS) systems is proposed. The handshake circuits include two communication ports and a local clock generator. Two approaches for the implementation of communication ports are presented, one with pure standard cells and the others with Mttller-C elements. The detailed design methodology for GALS systems is given and the circuits are validated with VHDL and circuits simulation in standard CMOS technology.
文摘A wireless network is not as secure as compare the wired network because the data is transferred on air so any intruder can use hacking techniques to access that data. Indeed it is difficult to protect the data and provide the user a secure information system for lifetime. An intrusions detection system aim to detect the different attacks against network and system. An intrusion detection system should be capable for detecting the misuse of the network whether it will be by the authenticated user or by an attacker. Cross layer based technique help to make decision based on two layer physical layer where we compute RSS value and on MAC layer where one compute RTS-CTS time taken. This will reduce the positive false rate.They detect attempts and active misuse either by legitimate users of the information systems or by external. The paper has higlighted the advances in intrusion detection in wireless local area network.
文摘The paper focuses on physical contact.It depicts the expression and function of physical contact in nonverbal communication and makes a comparison of physical contact between China and other Countries so as to improve the communication competence.
基金(No. 2009AA093601-3) supported by the National High-Tech R & D Program (863) of China
文摘Due to the characteristics of the underwater acoustic channel, such as long propagation delay and low available bandwidth, the media access control (MAC) protocol designed for underwater acoustic sensor networks (UWASNs) is quite different from that for terrestrial wireless sensor networks. In this paper, we propose a MAC protocol for the UWASNs, named the funneling MAC (FMAC-U), which is a contention-based MAC protocol with a three-way handshake. The FMAC-U protocol uses an improved three-way handshake mechanism and code division multiple access (CDMA) based technology for request-to-send (RTS) signals transmitting to the sink in order that the sink can receive packets from multiple neighbors in a fixed order during each round of handshakes. The mechanism reduces the packet collisions and alleviates the funneling effect, especially alleviating the choke point of the UWASNs. Simulation results show that the proposed FMAC-U protocol achieves higher throughput, smaller packet drop ratio, lower end-to-end delay, and lower overhead of the control packet compared to the existing MAC protocols for UWASNs.
基金supported by the National Natural Science Foundation of China (Grant No. 51177042)the Key Project of the National Twelfth FiveYear Research Program of China (Grant No. 2010BAA01B01)
文摘Full-Bridge Modular Multilevel Converter(FBMMC) has strong ability to ride through serious DC faults,thus it is very suitable for multi-terminal flexible HVDC applications.However,no references have reported the locating and isolating of DC faults and corresponding DC faults ride-through capability evaluation index.This paper introduces the topology mechanism of FBMMC and its loss reduction operation mode,theoretically certifies that the universal decoupled control strategy of Voltage Source Converter(VSC) and the similar modulation strategies of Half-Bridge MMC(HBMMC) can be applied to FBMMC for constructing complete closed-loop control system.On the basis of the existing DC faults locating and isolating schemes of 2-level VSC based Multi-Terminal HVDC(VSC-MTDC) system and the particularity of FBMMC,this paper proposes the DC faults wire selection "handshaking" method of the FBMMC-MTDC system,and proposes the DC Fault Ride-Through Capability Index(DFRTI) for evaluating the DC faults suppressing capability of the VSC-MTDC systems,including FBMMC-MTDC.Simulations of FBMMC-MTDC in PSCAD/EMTDC validate the correctness and effectiveness of the proposed control strategy and evaluation index.