The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider at...The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.展开更多
With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of ...With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of data created by numerous 5G IoT devices,the Ethereum platform has become a tool for the storage and sharing of IoT device data,thanks to its open and tamper-resistant characteristics.So,Ethereum account security is necessary for the Internet of Things to grow quickly and improve people's lives.By modeling Ethereum trans-action records as a transaction network,the account types are well identified by the Ethereum account classifi-cation system established based on Graph Neural Networks(GNNs).This work first investigates the Ethereum transaction network.Surprisingly,experimental metrics reveal that the Ethereum transaction network is neither optimal nor even satisfactory in terms of accurately representing transactions per account.This flaw may significantly impede the classification capability of GNNs,which is mostly governed by their attributes.This work proposes an Adaptive Multi-channel Bayesian Graph Attention Network(AMBGAT)for Ethereum account clas-sification to address this difficulty.AMBGAT uses attention to enhance node features,estimate graph topology that conforms to the ground truth,and efficiently extract node features pertinent to downstream tasks.An extensive experiment with actual Ethereum transaction data demonstrates that AMBGAT obtains competitive performance in the classification of Ethereum accounts while accurately estimating the graph topology.展开更多
Node interpolation cell method(NICM)is a micromechanics method employing the virtual displacement principle and the representative volume element(RVE)scheme to obtain the relationship between the global and the lo...Node interpolation cell method(NICM)is a micromechanics method employing the virtual displacement principle and the representative volume element(RVE)scheme to obtain the relationship between the global and the local strain.Mechanical properties of 2-D textile fabric reinforced ceramic matrix composites are predicted by NICM.Microstructures of 2-D woven and braided fabric reinforced composite are modeled by two kinds of RVE scheme.NICM is used to predict the macroscopic mechanical properties.The fill and warp yarns are simulated with cubic B-spline and their undulating forms are approximated by sinusoid.The effect of porosity on the fiber and matrix are considered as a reduction of elastic module.The connection of microstructure parameters and fiber volume fraction is modeled to investigate the reflection on the mechanical properties.The results predicted by NICM are compared with that by the finite element method(FEM).The comparison shows that NICM is a valid and feasible method for predicting the mechanics properties of 2-D woven and braided fabric reinforced ceramic matrix composites.展开更多
Objective This study aimed to compare and analyze the clinical efficacy and safety of late-course and simultaneous integrated dose-increasing intensity-modulated radiation therapy(IMRT) for cervical cancer complicated...Objective This study aimed to compare and analyze the clinical efficacy and safety of late-course and simultaneous integrated dose-increasing intensity-modulated radiation therapy(IMRT) for cervical cancer complicated with pelvic lymph node metastasis. Methods Sixty patients with cervical cancer complicated with pelvic lymph node metastasis who were admitted to our hospital from January 2013 to January 2015 were enrolled. The patients were randomly divided into the late-course dose-increasing IMRT group and the simultaneous integrated dose-increasing IMRT group, with 30 cases included in each group, respectively. All patients were concurrently treated with cisplatin. After treatment, the clinical outcomes of the two groups were compared. Results The remission rate of symptoms in the simultaneous integrated dose-increasing IMRT group was significantly higher than that in the late-course dose-increasing IMRT group(P < 0.05). The follow-up results showed that the overall survival time, progression-free survival time, and distant metastasis time of patients in the simultaneous integrated dose-increasing IMRT group were significantly longer than those in the late-course dose-increasing IMRT group(P < 0.05). The recurrent rate of lymph nodes in the radiation field in the simultaneous integrated dose-increasing IMRT group was significantly lower(P < 0.05) than in the late-course dose-increasing IMRT group. There was no significant difference in the incidence of cervical and vaginal recurrence and distant metastasis between the two groups(P > 0.05). The radiation doses of Dmax in the small intestine, D1 cc(the minimum dose to the 1 cc receiving the highest dose) in the bladder, and Dmax in the rectum in the simultaneous integrated dose-increasing IMRT group were significantly lower(P < 0.05) than in the late-course dose-increasing IMRT group. There was no significant difference in intestinal D2 cc(the minimum dose to the 2 cc receiving the highest dose) between the two groups(P > 0.05). The incidence of bone marrow suppression in the simultaneous integrated dose-increasing IMRT group was significantly lower(P < 0.05) than in the late-course dose-increasing IMRT group.Conclusion The application of simultaneous integrated dose-increasing IMRT in the treatment of cervical cancer patients complicated with pelvic lymph node metastasis can significantly control tumor progression, improve the long-term survival time, and postpone distant metastasis time with high safety.展开更多
In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of W...In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.展开更多
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ...The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks.展开更多
文摘The security problems of wireless sensor networks (WSN) have attracted people’s wide attention. In this paper, after we have summarized the existing security problems and solutions in WSN, we find that the insider attack to WSN is hard to solve. Insider attack is different from outsider attack, because it can’t be solved by the traditional encryption and message authentication. Therefore, a reliable secure routing protocol should be proposed in order to defense the insider attack. In this paper, we focus on insider selective forwarding attack. The existing detection mechanisms, such as watchdog, multipath retreat, neighbor-based monitoring and so on, have both advantages and disadvantages. According to their characteristics, we proposed a secure routing protocol based on monitor node and trust mechanism. The reputation value is made up with packet forwarding rate and node’s residual energy. So this detection and routing mechanism is universal because it can take account of both the safety and lifetime of network. Finally, we use OPNET simulation to verify the performance of our algorithm.
基金supported in part by the National Natural Science Foundation of China under Grant 62272405,School and Locality Integration Development Project of Yantai City(2022)the Youth Innovation Science and Technology Support Program of Shandong Provincial under Grant 2021KJ080+2 种基金the Natural Science Foundation of Shandong Province,Grant ZR2022MF238Yantai Science and Technology Innovation Development Plan Project under Grant 2021YT06000645the Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)under Grant SKLNST-2022-1-12.
文摘With the rapid advancement of 5G technology,the Internet of Things(IoT)has entered a new phase of appli-cations and is rapidly becoming a significant force in promoting economic development.Due to the vast amounts of data created by numerous 5G IoT devices,the Ethereum platform has become a tool for the storage and sharing of IoT device data,thanks to its open and tamper-resistant characteristics.So,Ethereum account security is necessary for the Internet of Things to grow quickly and improve people's lives.By modeling Ethereum trans-action records as a transaction network,the account types are well identified by the Ethereum account classifi-cation system established based on Graph Neural Networks(GNNs).This work first investigates the Ethereum transaction network.Surprisingly,experimental metrics reveal that the Ethereum transaction network is neither optimal nor even satisfactory in terms of accurately representing transactions per account.This flaw may significantly impede the classification capability of GNNs,which is mostly governed by their attributes.This work proposes an Adaptive Multi-channel Bayesian Graph Attention Network(AMBGAT)for Ethereum account clas-sification to address this difficulty.AMBGAT uses attention to enhance node features,estimate graph topology that conforms to the ground truth,and efficiently extract node features pertinent to downstream tasks.An extensive experiment with actual Ethereum transaction data demonstrates that AMBGAT obtains competitive performance in the classification of Ethereum accounts while accurately estimating the graph topology.
基金Supported by the Aviation Science Foundationof China(2009ZB5052)the Specialized Research Foundation for the Doctor Program of Higher Education(20070287039)~~
文摘Node interpolation cell method(NICM)is a micromechanics method employing the virtual displacement principle and the representative volume element(RVE)scheme to obtain the relationship between the global and the local strain.Mechanical properties of 2-D textile fabric reinforced ceramic matrix composites are predicted by NICM.Microstructures of 2-D woven and braided fabric reinforced composite are modeled by two kinds of RVE scheme.NICM is used to predict the macroscopic mechanical properties.The fill and warp yarns are simulated with cubic B-spline and their undulating forms are approximated by sinusoid.The effect of porosity on the fiber and matrix are considered as a reduction of elastic module.The connection of microstructure parameters and fiber volume fraction is modeled to investigate the reflection on the mechanical properties.The results predicted by NICM are compared with that by the finite element method(FEM).The comparison shows that NICM is a valid and feasible method for predicting the mechanics properties of 2-D woven and braided fabric reinforced ceramic matrix composites.
文摘Objective This study aimed to compare and analyze the clinical efficacy and safety of late-course and simultaneous integrated dose-increasing intensity-modulated radiation therapy(IMRT) for cervical cancer complicated with pelvic lymph node metastasis. Methods Sixty patients with cervical cancer complicated with pelvic lymph node metastasis who were admitted to our hospital from January 2013 to January 2015 were enrolled. The patients were randomly divided into the late-course dose-increasing IMRT group and the simultaneous integrated dose-increasing IMRT group, with 30 cases included in each group, respectively. All patients were concurrently treated with cisplatin. After treatment, the clinical outcomes of the two groups were compared. Results The remission rate of symptoms in the simultaneous integrated dose-increasing IMRT group was significantly higher than that in the late-course dose-increasing IMRT group(P < 0.05). The follow-up results showed that the overall survival time, progression-free survival time, and distant metastasis time of patients in the simultaneous integrated dose-increasing IMRT group were significantly longer than those in the late-course dose-increasing IMRT group(P < 0.05). The recurrent rate of lymph nodes in the radiation field in the simultaneous integrated dose-increasing IMRT group was significantly lower(P < 0.05) than in the late-course dose-increasing IMRT group. There was no significant difference in the incidence of cervical and vaginal recurrence and distant metastasis between the two groups(P > 0.05). The radiation doses of Dmax in the small intestine, D1 cc(the minimum dose to the 1 cc receiving the highest dose) in the bladder, and Dmax in the rectum in the simultaneous integrated dose-increasing IMRT group were significantly lower(P < 0.05) than in the late-course dose-increasing IMRT group. There was no significant difference in intestinal D2 cc(the minimum dose to the 2 cc receiving the highest dose) between the two groups(P > 0.05). The incidence of bone marrow suppression in the simultaneous integrated dose-increasing IMRT group was significantly lower(P < 0.05) than in the late-course dose-increasing IMRT group.Conclusion The application of simultaneous integrated dose-increasing IMRT in the treatment of cervical cancer patients complicated with pelvic lymph node metastasis can significantly control tumor progression, improve the long-term survival time, and postpone distant metastasis time with high safety.
文摘In recent scenario of Wireless Sensor Networks(WSNs),there are many application developed for handling sensitive and private data such as military information,surveillance data,tracking,etc.Hence,the sensor nodes of WSNs are distributed in an intimidating region,which is non-rigid to attacks.The recent research domains of WSN deal with models to handle the WSN communications against malicious attacks and threats.In traditional models,the solution has been made for defending the networks,only to specific attacks.However,in real-time applications,the kind of attack that is launched by the adversary is not known.Additionally,on developing a security mechanism for WSN,the resource constraints of sensor nodes are also to be considered.With that note,this paper presents an Enhanced Security Model with Improved Defensive Routing Mechanism(IDRM)for defending the sensor network from various attacks.Moreover,for efficient model design,the work includes the part of feature evaluation of some general attacks of WSNs.The IDRM also includes determination of optimal secure paths and Node security for secure routing operations.The performance of the proposed model is evaluated with respect to several factors;it is found that the model has achieved better security levels and is efficient than other existing models in WSN communications.It is proven that the proposed IDRM produces 74%of PDR in average and a minimized packet drop of 38%when comparing with the existing works.
文摘The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks.