The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive...The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive and vulnerable landscape, and peripheral cultural features. Therefore, the tourism development in the nature heritage sites should be on the premise of ecological security. The evaluation index system of tourism ecological security in nature heritage sites was constructed in this article by AHP and Delphi methods, including nature ecological security, landscape visual security and local culture ecological security, and the security thresholds of indices were also established. In the indices' weights of the evaluation model, the nature ecological security ranked the highest, followed by tourist landscape visual security and culture ecological security, which reflected the influence degree of the limited factor to tourism ecological security. Then, this paper carried out an empirical study of Kanas of Xinjiang Uygur Autonomous Region, China, which has the potential to be the World Nature Heritage. On the basis of the data attained from survey and observation on the spot, as well as questionnaire answered by tourists and local communities, the ecological security status in Kanas was evaluated. The result showed that the status of Kanas tourism ecological security was better, but there had some limiting factors. Lastly, effective measures were put forward to ensure its ecological security.展开更多
Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locatio...Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones.展开更多
A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a ...A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly.展开更多
基金Under the auspices of National Natural Science Foundation of China (No. 40671057)Knowledge Innovation Pro-grams of Chinese Academy of Sciences (No. KZCX3-SW-355)
文摘The nature heritages are the precious legacy of nature with outstanding scientific and aesthetic value. They are quite different from other common ecotourism areas, because of its original and unique system, sensitive and vulnerable landscape, and peripheral cultural features. Therefore, the tourism development in the nature heritage sites should be on the premise of ecological security. The evaluation index system of tourism ecological security in nature heritage sites was constructed in this article by AHP and Delphi methods, including nature ecological security, landscape visual security and local culture ecological security, and the security thresholds of indices were also established. In the indices' weights of the evaluation model, the nature ecological security ranked the highest, followed by tourist landscape visual security and culture ecological security, which reflected the influence degree of the limited factor to tourism ecological security. Then, this paper carried out an empirical study of Kanas of Xinjiang Uygur Autonomous Region, China, which has the potential to be the World Nature Heritage. On the basis of the data attained from survey and observation on the spot, as well as questionnaire answered by tourists and local communities, the ecological security status in Kanas was evaluated. The result showed that the status of Kanas tourism ecological security was better, but there had some limiting factors. Lastly, effective measures were put forward to ensure its ecological security.
文摘Wireless Sensor Networks(WSN)has been extensively utilized as a communication model in Internet of Things(IoT).As well,to offer service,numerous IoT based applications need effective transmission over unstable locations.To ensure reliability,prevailing investigations exploit multiple candidate forwarders over geographic opportunistic routing in WSNs.Moreover,these models are affected by crucial denial of service(DoS)attacks,where huge amount of invalid data are delivered intentionally to the receivers to disturb the functionality of WSNs.Here,secure localization based authentication(SLA)is presented to fight against DoS attack,and to fulfil the need of reliability and authentication.By examining state information,SLA projects a trust model to enhance efficacy of data delivery.Indeed,of the prevailing opportunistic protocols,SLA guarantees data integrity by modelling a trust based authentication,providing protection against DoS attackers and diminishing computational costs.Specifically,this model acts as a verification strategy to accelerate?attackers and to handle isolation.This strategy helps SLA in eliminating duplicate transmission and by continuous verification that results from conventional opportunistic routing.Simulation is performed in a MATLAB environment that offers authentic and reliable delivery by consuming approximately 50%of the cost in contrast to other approaches.The anticipated model shows better trade off in comparison to the prevailing ones.
基金The KCC(Korea Communications Commission),Korea,under the R&D program supervised by the KCA(Korea Communications Agency)(KCA-2012-08-911-05-001)
文摘A scheme of rogue access point(Rogue AP)detection based on AP's localization is proposed.Global position system(GPS)information and received signal strength(RSS)information are used to get the location of AP in a smartphone,which is compared with the database located in a remote server.The proposed scheme can detect not only fake access point(Fake AP)but also Evil Twin AP.It can be a user-oriented solution to detecting Rogue AP threats,and users can use it flexibly.