期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Distributed Information Flow Verification for Secure Service Composition in Smart Sensor Network 被引量:3
1
作者 XI Ning SUN Cong +2 位作者 MA Jianfeng CHEN Xiaofeng SHEN Yulong 《China Communications》 SCIE CSCD 2016年第4期119-130,共12页
Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, dif... Accelerate processor, efficient software and pervasive connections provide sensor nodes with more powerful computation and storage ability, which can offer various services to user. Based on these atomic services, different sensor nodes can cooperate and compose with each other to complete more complicated tasks for user. However, because of the regional characteristic of sensor nodes, merging data with different sensitivities become a primary requirement to the composite services, and information flow security should be intensively considered during service composition. In order to mitigate the great cost caused by the complexity of modeling and the heavy load of single-node verification to the energy-limited sensor node, in this paper, we propose a new distributed verification framework to enforce information flow security on composite services of smart sensor network. We analyze the information flows in composite services and specify security constraints for each service participant. Then we propose an algorithm over the distributed verification framework involving each sensor node to participate in the composite service verification based on the security constraints. The experimental results indicate that our approach can reduce the cost of verification and provide a better load balance. 展开更多
关键词 information flow security service composition formal verification smart sensor network
下载PDF
Comprehensive evaluation of 5G+smart distribution network based on combined weighting method-cloud model 被引量:2
2
作者 Xiufan Ma Ying Wang +1 位作者 Zihao Liu Xiaoyu Feng 《Global Energy Interconnection》 EI CAS CSCD 2022年第6期675-691,共17页
With the large-scale application of 5G technology in smart distribution networks,the operation effects of distribution networks are not clear.Herein,we propose a comprehensive evaluation model of a 5G+smart distributi... With the large-scale application of 5G technology in smart distribution networks,the operation effects of distribution networks are not clear.Herein,we propose a comprehensive evaluation model of a 5G+smart distribution network based on the combination weighting and cloud model of the improved Fuzzy Analytic Hierarchy-Entropy Weight Method(FAHP-EWM).First,we establish comprehensive evaluation indexes of a 5G+smart distribution network from five dimensions:reliable operation,economic operation,efficient interaction,technological intelligence,and green emission reduction.Second,by introducing the principle of variance minimization,we propose a combined weighting method based on the improved FAHP-EWM to calculate the comprehensive weight,so as to reduce the defects of subjective arbitrariness and promote objectivity.Finally,a comprehensive evaluation model of 5G+smart distribution network based on cloud model is proposed by considering the uncertainty of distribution network node information and equipment status information.The example analysis indicates that the overall operation of the 5G+smart distribution network project is decent,and the weight value calculated by the combined weighting method is more reasonable and accurate than that calculated by the single weighting method,which verifies the effectiveness and rationality of the proposed evaluation method.Moreover,the proposed evaluation method has a certain guiding role for the large-scale application of 5G communication technology in smart distribution networks. 展开更多
关键词 5G+smart distribution network Comprehensive evaluation Improved FAHP Variance minimization Normal cloud model
下载PDF
Smart Rewiring:Improving Network Robustness Faster 被引量:2
3
作者 白亮 肖延东 +1 位作者 侯绿林 老松杨 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第7期218-222,共5页
Previous work puts forward a random edge rewiring method which is capable of improving the network robustness noticeably, while it lacks further discussions about how to improve the robustness faster. In this study, t... Previous work puts forward a random edge rewiring method which is capable of improving the network robustness noticeably, while it lacks further discussions about how to improve the robustness faster. In this study, the detailed analysis of the structures of improved networks show that regenerating the edges between high-degree nodes can enhance the robustness against a targeted attack. Therefore, we propose a novel rewiring strategy based on regenerating more edges between high-degree nodes, called smart rewiring, which could speed up the increase of the robustness index effectively. The smart rewiring method also explains why positive degree-degree correlation could enhance network robustness. 展开更多
关键词 NET smart Rewiring:Improving Network Robustness Faster
下载PDF
Structural and robustness properties of smart-city transportation networks 被引量:1
4
作者 张振刚 丁卓 +4 位作者 樊京芳 孟君 丁益民 叶方富 陈晓松 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期1-4,共4页
The concept of smart city gives an excellent resolution to construct and develop modern cities, and also demands infrastructure construction. How to build a safe, stable, and highly efficient public transportation sys... The concept of smart city gives an excellent resolution to construct and develop modern cities, and also demands infrastructure construction. How to build a safe, stable, and highly efficient public transportation system becomes an important topic in the process of city construction. In this work, we study the structural and robustness properties of transportation networks and their sub-networks. We introduce a complementary network model to study the relevance and complementarity between bus network and subway network. Our numerical results show that the mutual supplement of networks can improve the network robustness. This conclusion provides a theoretical basis for the construction of public traffic networks, and it also supports reasonable operation of managing smart cities. 展开更多
关键词 percolation phase transition finite size scaling theory network smart city
下载PDF
Wireless Body Area Networks for Pervasive Healthcare and Smart Environments
5
作者 Victor C.M.Leung Hongke Zhang 《ZTE Communications》 2014年第3期1-2,共2页
Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, a... Wireless body area networks (WBANs) use RF communication for interconnection of tiny sensor nodes located in, on, or in close prox- imity to the human body. A WBAN enables physiological signals, physical activity, and body position to be continuously monitored. 展开更多
关键词 WBAN BODY LEACH Wireless Body Area Networks for Pervasive Healthcare and smart Environments
下载PDF
Progressive Transfer Learning-based Deep Q Network for DDOS Defence in WSN
6
作者 S.Rameshkumar R.Ganesan A.Merline 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2379-2394,共16页
In The Wireless Multimedia Sensor Network(WNSMs)have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets.By utilising portable technologies,it achieve... In The Wireless Multimedia Sensor Network(WNSMs)have achieved popularity among diverse communities as a result of technological breakthroughs in sensor and current gadgets.By utilising portable technologies,it achieves solid and significant results in wireless communication,media transfer,and digital transmission.Sensor nodes have been used in agriculture and industry to detect characteristics such as temperature,moisture content,and other environmental conditions in recent decades.WNSMs have also made apps easier to use by giving devices self-governing access to send and process data connected with appro-priate audio and video information.Many video sensor network studies focus on lowering power consumption and increasing transmission capacity,but the main demand is data reliability.Because of the obstacles in the sensor nodes,WMSN is subjected to a variety of attacks,including Denial of Service(DoS)attacks.Deep Convolutional Neural Network is designed with the stateaction relationship mapping which is used to identify the DDOS Attackers present in the Wireless Sensor Networks for Smart Agriculture.The Proposed work it performs the data collection about the traffic conditions and identifies the deviation between the network conditions such as packet loss due to network congestion and the presence of attackers in the network.It reduces the attacker detection delay and improves the detection accuracy.In order to protect the network against DoS assaults,an improved machine learning technique must be offered.An efficient Deep Neural Network approach is provided for detecting DoS in WMSN.The required parameters are selected using an adaptive particle swarm optimization technique.The ratio of packet transmission,energy consumption,latency,network length,and throughput will be used to evaluate the approach’s efficiency. 展开更多
关键词 DOS attack wireless sensor networks for smart agriculture deep neural network machine learning technique
下载PDF
Quick Hosting Capacity Evaluation Based on Distributed Dispatching for Smart Distribution Network Planning with Distributed Generation
7
作者 Bing Sun Ruipeng Jing +3 位作者 Leijiao Ge Yuan Zeng Shimeng Dong Luyang Hou 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2024年第1期128-140,共13页
The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with DG.DG and ES are usually invested by users... The smart distribution network(SDN)is integrat ing increasing distributed generation(DG)and energy storage(ES).Hosting capacity evaluation is important for SDN plan ning with DG.DG and ES are usually invested by users or a third party,and they may form friendly microgrids(MGs)and operate independently.Traditional centralized dispatching meth od no longer suits for hosting capacity evaluation of SDN.A quick hosting capacity evaluation method based on distributed optimal dispatching is proposed.Firstly,a multi-objective DG hosting capacity evaluation model is established,and the host ing capacity for DG is determined by the optimal DG planning schemes.The steady-state security region method is applied to speed up the solving process of the DG hosting capacity evalua tion model.Then,the optimal dispatching models are estab lished for MG and SDN respectively to realize the operating simulation.Under the distributed dispatching strategy,the dual-side optimal operation of SDN-MGs can be realized by several iterations of power exchange requirement.Finally,an SDN with four MGs is conducted considering multiple flexible resources.It shows that the DG hosting capacity of SDN oversteps the sum of the maximum active power demand and the rated branch capacity.Besides,the annual DG electricity oversteps the maximum active power demand value. 展开更多
关键词 smart distribution network(SDN) MICROGRID hosting capacity multi-objective optimization distributed opti mal dispatching flexible resource
原文传递
Energy Efficient Ambience Awake Routing with OpenFlow Approach
8
作者 Hima Bindu Valiveti SNV Ganesh +1 位作者 Budati Anil Kumar Dileep Kumar Yadav 《Computers, Materials & Continua》 SCIE EI 2021年第5期2049-2059,共11页
A major problem in networking has always been energy consumption.Battery life is one parameter which could help improve Energy Efficiency.Existing research on wireless networking stresses on reducing signaling message... A major problem in networking has always been energy consumption.Battery life is one parameter which could help improve Energy Efficiency.Existing research on wireless networking stresses on reducing signaling messages or time required for data transfer for addressing energy consumption issues.Routing or Forwarding packets in a network between the network elements like routers,switches,wireless access points,etc.,is complex in conventional networks.With the advent of Software Defined Networking(SDN)for 5G network architectures,the distributed networking has embarked onto centralized networking,wherein the SDN Controller is responsible for decision making.The controller pushes its decision onto the network elements with the help of a control plane protocol termed OpenFlow.Decentralized networks have been largely in use because of their ease in physical and logically setting the administrative hierarchies.The centralized controller deals with the policy funding and the protocols used for routing procedures are designated by the decentralized controller.Ambience Awake is a location centered routing protocol deployed in the 5G network architecture with OpenFlow model.The Ambience Awake mechanism relies on the power consumption of the network elements during the packet transmission for unicast and multicast scenarios.The signalling load and the routing overhead witnessed an improvement of 30%during the routing procedure.The proposed routing mechanism run on the top of the decentralized SDN controller proves to be 19.59%more efficient than the existing routing solutions. 展开更多
关键词 Energy efficiency ROUTING smart networks 5G software defined networking openflow
下载PDF
Overall-Transparent Dynamic Identifier-Mapping Mechanism Against Scanning and Worm Propagation in the SINET
9
作者 Linyuan Yao Ping Dong +1 位作者 Hongke Zhang Xiaojun Wang 《China Communications》 SCIE CSCD 2020年第5期137-150,共14页
Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of t... Static assignment of IP addresses or identifiers can be exploited by an adversary to attack a network. However, existing dynamic IP address assignment approaches suffer from two limitations, namely: participation of terminals in the assignment and inadequate network server management. Thus, in this paper, we propose an Overall-transparent Dynamic Identifier-mapping Mechanism(ODIM) to manage the identifier of network nodes to defend against scanning and worm propagation in the Smart Identifier NETwork(SINET). We establish the selection and allocation constraints, and present selection and allocation algorithms to determine the constraints. The non-repetition probability and cover cycle allow us to evaluate the defense efficiency against scanning. We propose the probability for routing identifiers and derive the defense efficiency of ODIM against worm propagation. Simulation results and theoretical analysis show that the proposed method effectively reduces the detection probability of Routing IDentifiers(RIDs) and thus improves defense capabilities against worm propagation. 展开更多
关键词 dynamic identifier-mapping network scanning worm propagation smart identifier network
下载PDF
NICFS:a file system based on persistent memory and SmartNIC
10
作者 Yitian YANG Youyou LU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2023年第5期675-687,共13页
Emergence of new hardware,including persistent memory and smart network interface card(SmartNIC),has brought new opportunities to file system design.In this paper,we design and implement a new file system named NICFS ... Emergence of new hardware,including persistent memory and smart network interface card(SmartNIC),has brought new opportunities to file system design.In this paper,we design and implement a new file system named NICFS based on persistent memory and SmartNIC.We divide the file system into two parts:the front end and the back end.In the front end,data writes are appended to the persistent memory in a log-structured way,leveraging the fast persistence advantage of persistent memory.In the back end,the data in logs are fetched,processed,and patched to files in the background,leveraging the processing capacity of SmartNIC.Evaluation results show that NICFS outperforms Ext4 by about 21%/10%and about 19%/50%on large and small reads/writes,respectively. 展开更多
关键词 Non-volatile memory Persistent memory Data processing unit smart network interface card(smartNIC) File system
原文传递
Exploring self-organization and self-adaption for smart manufacturing complex networks
11
作者 Zhengang GUO Yingfeng ZHANG +2 位作者 Sichao LIU Xi Vincent WANG Lihui WANG 《Frontiers of Engineering Management》 CSCD 2023年第2期206-222,共17页
Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal... Trends toward the globalization of the manufacturing industry and the increasing demands for small-batch,short-cycle,and highly customized products result in complexities and fluctuations in both external and internal manufacturing environments,which poses great challenges to manufacturing enterprises.Fortunately,recent advances in the Industrial Internet of Things(IIoT)and the widespread use of embedded processors and sensors in factories enable collecting real-time manufacturing status data and building cyber–physical systems for smart,flexible,and resilient manufacturing systems.In this context,this paper investigates the mechanisms and methodology of self-organization and self-adaption to tackle exceptions and disturbances in discrete manufacturing processes.Specifically,a general model of smart manufacturing complex networks is constructed using scale-free networks to interconnect heterogeneous manufacturing resources represented by network vertices at multiple levels.Moreover,the capabilities of physical manufacturing resources are encapsulated into virtual manufacturing services using cloud technology,which can be added to or removed from the networks in a plug-and-play manner.Materials,information,and financial assets are passed through interactive links across the networks.Subsequently,analytical target cascading is used to formulate the processes of self-organizing optimal configuration and self-adaptive collaborative control for multilevel key manufacturing resources while particle swarm optimization is used to solve local problems on network vertices.Consequently,an industrial case based on a Chinese engine factory demonstrates the feasibility and efficiency of the proposed model and method in handling typical exceptions.The simulation results show that the proposed mechanism and method outperform the event-triggered rescheduling method,reducing manufacturing cost,manufacturing time,waiting time,and energy consumption,with reasonable computational time.This work potentially enables managers and practitioners to implement active perception,active response,self-organization,and self-adaption solutions in discrete manufacturing enterprises. 展开更多
关键词 cyber–physical systems Industrial Internet of Things smart manufacturing complex networks self-organization and self-adaption analytical target cascading collaborative optimization
原文传递
Reinforcement Learning-Empowered Graph Convolutional Network Framework for Data Integrity Attack Detection in Cyber-Physical Systems
12
作者 Edeh Vincent Mehdi Korki +2 位作者 Mehdi Seyedmahmoudian Alex Stojcevski Saad Mekhilef 《CSEE Journal of Power and Energy Systems》 SCIE EI CSCD 2024年第2期797-806,共10页
The massive integration of communication and information technology with the large-scale power grid has enhanced the efficiency, safety, and economical operation of cyber-physical systems. However, the open and divers... The massive integration of communication and information technology with the large-scale power grid has enhanced the efficiency, safety, and economical operation of cyber-physical systems. However, the open and diversified communication environment of the smart grid is exposed to cyber-attacks. Data integrity attacks that can bypass conventional security techniques have been considered critical threats to the operation of the grid. Current detection techniques cannot learn the dynamic and heterogeneous characteristics of the smart grid and are unable to deal with non-euclidean data types. To address the issue, we propose a novel Deep-Q-Network scheme empowered with a graph convolutional network (GCN) framework to detect data integrity attacks in cyber-physical systems. The simulation results show that the proposed framework is scalable and achieves higher detection accuracy, unlike other benchmark techniques. 展开更多
关键词 Deep reinforcement learning graph convolutional network heterogeneous smart grid network
原文传递
Towards Privacy-Aware and Trustworthy Data Sharing Using Blockchain for Edge Intelligence
13
作者 Youyang Qu Lichuan Ma +4 位作者 Wenjie Ye Xuemeng Zhai Shui Yu Yunfeng Li David Smith 《Big Data Mining and Analytics》 EI CSCD 2023年第4期443-464,共22页
The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs ... The popularization of intelligent healthcare devices and big data analytics significantly boosts the development of Smart Healthcare Networks(SHNs).To enhance the precision of diagnosis,different participants in SHNs share health data that contain sensitive information.Therefore,the data exchange process raises privacy concerns,especially when the integration of health data from multiple sources(linkage attack)results in further leakage.Linkage attack is a type of dominant attack in the privacy domain,which can leverage various data sources for private data mining.Furthermore,adversaries launch poisoning attacks to falsify the health data,which leads to misdiagnosing or even physical damage.To protect private health data,we propose a personalized differential privacy model based on the trust levels among users.The trust is evaluated by a defined community density,while the corresponding privacy protection level is mapped to controllable randomized noise constrained by differential privacy.To avoid linkage attacks in personalized differential privacy,we design a noise correlation decoupling mechanism using a Markov stochastic process.In addition,we build the community model on a blockchain,which can mitigate the risk of poisoning attacks during differentially private data transmission over SHNs.Extensive experiments and analysis on real-world datasets have testified the proposed model,and achieved better performance compared with existing research from perspectives of privacy protection and effectiveness. 展开更多
关键词 edge intelligence blockchain personalized privacy preservation differential privacy smart Healthcare Networks(SHNs)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部