Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
In this paper, the authors investigate the overload problem of a congested router in TCP (Transmission Control Protocol) networks, with a design of an AQM (Active Queue Management) controller based on control theo...In this paper, the authors investigate the overload problem of a congested router in TCP (Transmission Control Protocol) networks, with a design of an AQM (Active Queue Management) controller based on control theory. The model of TCP/AQM is converted into a second-order system with time delay, the stability of the closed-loop AQM system is described in terms of a characteristic quasi-polynomial. The authors focus on the synthesis of first-order AQM controller. The authors' approach consists of determining the stabilizing regions in the parameter space of the first-order controller, then choosing controller's parameters within these regions. Finally, the authors illustrate the proposed methodology with an example and simulations using NS-2 simulator.展开更多
Based on the methods of acquaintance cache and group-based intelligent forwarding of service recommendations,a novel group-based active service(GAS) protocol for migrating workflows was proposed.This protocol did not ...Based on the methods of acquaintance cache and group-based intelligent forwarding of service recommendations,a novel group-based active service(GAS) protocol for migrating workflows was proposed.This protocol did not require service requesters to discover services or resources.The semantic acquaintance knowledge representation was exploited to describe service groups and this semantic information was used to recommend service to respective clients.The experimental results show that the new protocol proposed offers better performance than other protocols in terms of first-response-time,success-scope and ratio of success-packet-number to total-packet-number.When the number of service request packet is 20,the first-response-time of GAS protocol is only 5.1 s,which is significantly lower than that of other protocols.The success-scope of GAS protocol is 49.1%,showing that GAS protocol can effectively improve the reliability of mobile transactions.And the ratio of success-packet-number to total-packet-number of GAS protocol is up to 0.080,which is obviously higher than that of other protocols.展开更多
The low-cost,self-configuration capability and "plug-and-play" feature of Ethernet establishes its dominant position in the local area networks(LAN).However,it is hard to extend to large scale because of the...The low-cost,self-configuration capability and "plug-and-play" feature of Ethernet establishes its dominant position in the local area networks(LAN).However,it is hard to extend to large scale because of the legacy broadcast-based service discovery mechanism.Therefore,to solve this problem,a new split network architecture named Software-Defined Networking(SDN) is introduced in this paper,and a novel floodless service discovery mechanism(FSDM)for SDN is designed.For the FSDM,the widespread broadcast messages for Dynamic Host Configuration Protocol(DHCP) and Address Resolution Protocol(ARP) are considered especially,respectively.Then the DHCP relay and ARP proxy are proposed to handle DHCP broadcast messages and ARP broadcast messages,respectively.The proposed FSDM in this paper can eliminate flooding completely,reserve the autoconfiguration characteristics.Particularly,there is no need to change the existing hardware,software and protocols of hosts for the proposed scheme.Finally,the simulation results are demonstrated to show that our proposed model allows redundant links existed in network and has the property of scalability,which can significantly reduce network traffic in data plane and control traffic in control plane,and decrease the overhead of control plane.展开更多
Valuation Adjustment Mechanism of PE in western capitalist countries' economic activity is a high-risk, high-yield investment financing. As a new import from at the beginning of entering into China, the law and pract...Valuation Adjustment Mechanism of PE in western capitalist countries' economic activity is a high-risk, high-yield investment financing. As a new import from at the beginning of entering into China, the law and practice of the exploration of the related theory have not stopped. This article integrates the actual case of China's enterprises to participate in the bet agreement.It proposes to bet on the agreement of the meanings, contents, elements, and introduces the related concept of contrast and analysis, bet agreement on hot issues existing in the practice. It also put forward personal views and Suggestions on legislation.展开更多
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
文摘In this paper, the authors investigate the overload problem of a congested router in TCP (Transmission Control Protocol) networks, with a design of an AQM (Active Queue Management) controller based on control theory. The model of TCP/AQM is converted into a second-order system with time delay, the stability of the closed-loop AQM system is described in terms of a characteristic quasi-polynomial. The authors focus on the synthesis of first-order AQM controller. The authors' approach consists of determining the stabilizing regions in the parameter space of the first-order controller, then choosing controller's parameters within these regions. Finally, the authors illustrate the proposed methodology with an example and simulations using NS-2 simulator.
基金Project(60573169) supported by the National Natural Science Foundation of China
文摘Based on the methods of acquaintance cache and group-based intelligent forwarding of service recommendations,a novel group-based active service(GAS) protocol for migrating workflows was proposed.This protocol did not require service requesters to discover services or resources.The semantic acquaintance knowledge representation was exploited to describe service groups and this semantic information was used to recommend service to respective clients.The experimental results show that the new protocol proposed offers better performance than other protocols in terms of first-response-time,success-scope and ratio of success-packet-number to total-packet-number.When the number of service request packet is 20,the first-response-time of GAS protocol is only 5.1 s,which is significantly lower than that of other protocols.The success-scope of GAS protocol is 49.1%,showing that GAS protocol can effectively improve the reliability of mobile transactions.And the ratio of success-packet-number to total-packet-number of GAS protocol is up to 0.080,which is obviously higher than that of other protocols.
基金supported by the National Basic Research Program(973)of China(No.2012CB315801)the National Natural Science Fund(No.61302089,61300184)the fundamental research funds for the Central Universities(No.2013RC0113)
文摘The low-cost,self-configuration capability and "plug-and-play" feature of Ethernet establishes its dominant position in the local area networks(LAN).However,it is hard to extend to large scale because of the legacy broadcast-based service discovery mechanism.Therefore,to solve this problem,a new split network architecture named Software-Defined Networking(SDN) is introduced in this paper,and a novel floodless service discovery mechanism(FSDM)for SDN is designed.For the FSDM,the widespread broadcast messages for Dynamic Host Configuration Protocol(DHCP) and Address Resolution Protocol(ARP) are considered especially,respectively.Then the DHCP relay and ARP proxy are proposed to handle DHCP broadcast messages and ARP broadcast messages,respectively.The proposed FSDM in this paper can eliminate flooding completely,reserve the autoconfiguration characteristics.Particularly,there is no need to change the existing hardware,software and protocols of hosts for the proposed scheme.Finally,the simulation results are demonstrated to show that our proposed model allows redundant links existed in network and has the property of scalability,which can significantly reduce network traffic in data plane and control traffic in control plane,and decrease the overhead of control plane.
文摘Valuation Adjustment Mechanism of PE in western capitalist countries' economic activity is a high-risk, high-yield investment financing. As a new import from at the beginning of entering into China, the law and practice of the exploration of the related theory have not stopped. This article integrates the actual case of China's enterprises to participate in the bet agreement.It proposes to bet on the agreement of the meanings, contents, elements, and introduces the related concept of contrast and analysis, bet agreement on hot issues existing in the practice. It also put forward personal views and Suggestions on legislation.