Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols ...Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols are emerging in endlessly various network environments.Herein,relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection.Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols,most existing methods have proven to be time-consuming with limited efficiency,especially when applied on unknown protocol state machines.This paper proposes a state merging algorithm based on EDSM(Evidence-Driven State Merging)to infer the transition rules of unknown protocols in form of state machines with high efficiency.Compared with another classical state machine inferring method based on Exbar algorithm,the experiment results demonstrate that our proposed method could run faster,especially when dealing with massive training data sets.In addition,this method can also make the state machines have higher similarities with the reference state machines constructed from public specifications.展开更多
We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed b...We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed by Phoenix, Barnett and Chefles [J. Mod. Opt. 47, 507 (2000)]. An additional feature, which we introduce in our scheme, is that we add another detection set;where each detection set has three non-orthogonal states. The inclusion of an additional detection set leads to improved symmetry, increased eavesdropper detection and higher security margin for our protocol.展开更多
This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limita...This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol.展开更多
文章针对现代通信网络中的传输效率和能耗管理问题,提出一种基于同步数字体系(Synchronous Digital Hierarchy,SDH)技术的通信网络设计方案。通过分析网络传输需求,构建SDH通信网络性能指标体系,并引入传输性能改善指数作为通信需求标...文章针对现代通信网络中的传输效率和能耗管理问题,提出一种基于同步数字体系(Synchronous Digital Hierarchy,SDH)技术的通信网络设计方案。通过分析网络传输需求,构建SDH通信网络性能指标体系,并引入传输性能改善指数作为通信需求标准。结合SDH技术和链路状态协议,对网络通信链路进行建模,并采用动态地址分配协议实现动态节点配置和优化路由选择。实验结果表明,文章方法在节点能耗和传输时延方面均表现出显著优势,能够有效提升通信网络的整体性能。展开更多
The acquisition and processing of equipment information is pivotol to control and management of the automated storage and retrieval system.The work of this paper is based on the automatic storage and retrieval experim...The acquisition and processing of equipment information is pivotol to control and management of the automated storage and retrieval system.The work of this paper is based on the automatic storage and retrieval experimental system of Wuhan University of Technology.First,the output/input flow and the control information of storage/retrieval vehicle are studied and the plotting finite state machine model of the stacking crane is established.Then,the communication protocol between the center con- trol management computer and the PLC of stacking crane is designed.Finally,the stacking crane’ s monitoring data,which in- clude operating time,running states and real-time position status,are gained by analyzing the communication protocol.The de- tailed program for the acquisition and processing of monitoring information is developed.This method is suitable for the equipment monitoring of the whole system,and provides a platform for studying the intelligent control and optimal scheduling strategies of AS/RS.展开更多
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal deco...Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.展开更多
Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state...Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state photon source for quantum key distribution. Two special cases of this protocol are deduced, i.e., a one-vacuum-and-one-weak-decoy-state protocol and a one-weak-decoy-state protocol. In these protocols, the sender prepares decoy states actively, which avoids the crude estimation of parameters in the SARG04 passive decoy-state method. With the passive decoy-state idea, the detection events on Bob's side that are non-triggered on Alice's side are not discarded, but used to estimate the fractions of single-photon and two-photon pulses, which offsets the limitation of the detector's low efficiency and overcomes the shortcoming that the performance of the active decoy-state protocol critically depends on the efficiency of detector. The simulation results show that the combination of the active and passive decoy-state ideas increases the key generation rate. With a one-vacuum-and-two-weak-decoy-state protocol, one can achieve a key generation rate that is close to the theoretical limit of an infinite decoy-state protocol. The performance of the other two protocols is a little less than with the former, but the implementation is easier. Under the same condition of implementation, higher key rates can be obtained with our protocols than with existing methods.展开更多
由于光网络中的路径跳数过多或距离偏大,使寻找可用的频谱资源难度增加,导致光网络动态频谱利用率降低、网络效益较少且阻塞率较高,为此,提出基于蛙跳博弈优化算法的光网络动态频谱分配方法。采用OHM(Optimized Link State Routing Prot...由于光网络中的路径跳数过多或距离偏大,使寻找可用的频谱资源难度增加,导致光网络动态频谱利用率降低、网络效益较少且阻塞率较高,为此,提出基于蛙跳博弈优化算法的光网络动态频谱分配方法。采用OHM(Optimized Link State Routing Protocol using the Highway Model)路由算法,选择与业务请求对应,且满足跳数最小、调制等级最高的候选路径,找到可用的频谱资源。根据获取的频谱资源,在光网络中将最大频隙号在所有链路中最小作为目标,构建光网络动态频谱分配的目标函数。并在约束条件下,采用蛙跳博弈优化算法对目标函数求解,获取的解即为光网络动态频谱分配最优结果。实验结果表明,该方法的阻塞率低、频谱利用率高、网络收益高,具有实用性。展开更多
基金This work is supported by the National Natural Science Foundation of China(Grant Number:61471141,61361166006,61301099)Basic Research Project of Shenzhen,China(Grant Number:JCYJ20150513151706561)National Defense Basic Scientific Research Program of China(Grant Number:JCKY2018603B006).
文摘Internet communication protocols define the behavior rules of network components when they communicate with each other.With the continuous development of network technologies,many private or unknown network protocols are emerging in endlessly various network environments.Herein,relevant protocol specifications become difficult or unavailable to translate in many situations such as network security management and intrusion detection.Although protocol reverse engineering is being investigated in recent years to perform reverse analysis on the specifications of unknown protocols,most existing methods have proven to be time-consuming with limited efficiency,especially when applied on unknown protocol state machines.This paper proposes a state merging algorithm based on EDSM(Evidence-Driven State Merging)to infer the transition rules of unknown protocols in form of state machines with high efficiency.Compared with another classical state machine inferring method based on Exbar algorithm,the experiment results demonstrate that our proposed method could run faster,especially when dealing with massive training data sets.In addition,this method can also make the state machines have higher similarities with the reference state machines constructed from public specifications.
文摘We propose and demonstrate an optical implementation of a quantum key distribution protocol, which uses three-non-orthogonal states and six states in total. The proposed scheme improves the protocol that is proposed by Phoenix, Barnett and Chefles [J. Mod. Opt. 47, 507 (2000)]. An additional feature, which we introduce in our scheme, is that we add another detection set;where each detection set has three non-orthogonal states. The inclusion of an additional detection set leads to improved symmetry, increased eavesdropper detection and higher security margin for our protocol.
文摘This paper discusses the algorithms for achieving global states and self-stabilizationfor communication protocols. It first describes a primary algorithm including its suitability forachieving global states and limitation of self-stabilization for communication protocols, and thenpresents an improved algorithm that can be suitable to achieve global states and can be also usedto self-stabilizing communication protocols. Filially, it gives the proof of correctness and analysis ofcomplexity of the improved algorithm, and verifies its availability and efficiency by illustrating anexample protocol.
文摘文章针对现代通信网络中的传输效率和能耗管理问题,提出一种基于同步数字体系(Synchronous Digital Hierarchy,SDH)技术的通信网络设计方案。通过分析网络传输需求,构建SDH通信网络性能指标体系,并引入传输性能改善指数作为通信需求标准。结合SDH技术和链路状态协议,对网络通信链路进行建模,并采用动态地址分配协议实现动态节点配置和优化路由选择。实验结果表明,文章方法在节点能耗和传输时延方面均表现出显著优势,能够有效提升通信网络的整体性能。
文摘The acquisition and processing of equipment information is pivotol to control and management of the automated storage and retrieval system.The work of this paper is based on the automatic storage and retrieval experimental system of Wuhan University of Technology.First,the output/input flow and the control information of storage/retrieval vehicle are studied and the plotting finite state machine model of the stacking crane is established.Then,the communication protocol between the center con- trol management computer and the PLC of stacking crane is designed.Finally,the stacking crane’ s monitoring data,which in- clude operating time,running states and real-time position status,are gained by analyzing the communication protocol.The de- tailed program for the acquisition and processing of monitoring information is developed.This method is suitable for the equipment monitoring of the whole system,and provides a platform for studying the intelligent control and optimal scheduling strategies of AS/RS.
基金Project supported by the National Natural Science Foundation of China (Grant No 60578055)the State Key Development Program for Basic Research of China (Grant No 2007CB307001)
文摘Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.
基金Project supported by the National High Technology Research and Development Program of China (Grant No. 2011AA7014061)the Science Foundation of Naval University of Engineering, China (Grant No. HGDQNJJ11022)
文摘Combining the passive decoy-state idea with the active decoy-state idea, a non-orthogonal (SARG04) decoy-state protocol with one vacuum and two weak decoy states is introduced based on a heralded pair coherent state photon source for quantum key distribution. Two special cases of this protocol are deduced, i.e., a one-vacuum-and-one-weak-decoy-state protocol and a one-weak-decoy-state protocol. In these protocols, the sender prepares decoy states actively, which avoids the crude estimation of parameters in the SARG04 passive decoy-state method. With the passive decoy-state idea, the detection events on Bob's side that are non-triggered on Alice's side are not discarded, but used to estimate the fractions of single-photon and two-photon pulses, which offsets the limitation of the detector's low efficiency and overcomes the shortcoming that the performance of the active decoy-state protocol critically depends on the efficiency of detector. The simulation results show that the combination of the active and passive decoy-state ideas increases the key generation rate. With a one-vacuum-and-two-weak-decoy-state protocol, one can achieve a key generation rate that is close to the theoretical limit of an infinite decoy-state protocol. The performance of the other two protocols is a little less than with the former, but the implementation is easier. Under the same condition of implementation, higher key rates can be obtained with our protocols than with existing methods.
文摘由于光网络中的路径跳数过多或距离偏大,使寻找可用的频谱资源难度增加,导致光网络动态频谱利用率降低、网络效益较少且阻塞率较高,为此,提出基于蛙跳博弈优化算法的光网络动态频谱分配方法。采用OHM(Optimized Link State Routing Protocol using the Highway Model)路由算法,选择与业务请求对应,且满足跳数最小、调制等级最高的候选路径,找到可用的频谱资源。根据获取的频谱资源,在光网络中将最大频隙号在所有链路中最小作为目标,构建光网络动态频谱分配的目标函数。并在约束条件下,采用蛙跳博弈优化算法对目标函数求解,获取的解即为光网络动态频谱分配最优结果。实验结果表明,该方法的阻塞率低、频谱利用率高、网络收益高,具有实用性。