The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key managemen...The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.展开更多
To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity ...To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced.展开更多
Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, ...Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.展开更多
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, a...This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.展开更多
Aberrations of chromosome 9 p21 22 are involved in the genesis of many forms of cancer.The gene p16 and p15 have been assigned to this region.Both p16 and p15 are an inhibitor of cycli...Aberrations of chromosome 9 p21 22 are involved in the genesis of many forms of cancer.The gene p16 and p15 have been assigned to this region.Both p16 and p15 are an inhibitor of cyclin D cdk4,cyclin D cdk6 complex and have been implicated in a wide variety of cancer types,including the germline of patients with familial melanoma.In order to investigate and compare the status of p16,p15 gene in primary tumors and cell lines,we examined 357 primary tumors and 29 cell lines derived from diverse tumor types.In addition to analysis of these primary tumors and cell lines,blood specimens from 91 patients either with sporadic multiple cancers or from cancer prone families were also analyzed.The data showed the following:1)Homozygous deletions of p16,p15 were comparatively rare and far less common than previously reported,although hemizygous deletions were observed in a significant fraction of many tumor types;2)the incidence of p16,p15 deletions(either homozygous deletions or heterozygous deletions)varied significantly among different tumor types;3)most deletions involved in both p16 and p15 genes;4)sequence variations in the coding sequence of p16,p15 were comparatively rare among these tumor types,though mutations and polymorphisms were identified;5)some tumors which showed LOH at 9p,containing p16 and p15 gene,did not show deletions or point mutations in the p16,p15 gene.6)In a subset of retinoblastoma and osteosarcoma where no Rb gene mutations were present a significant fraction was found to contain p16,p15 gene deletions.展开更多
The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytica...The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends.展开更多
Micropropagation techniques were set up for walnut. Many plantlets were obtained by culturing node explants in MS medium,with 30 g/L sucrose, 7 g/L agar, and different concentrations of BA or Kin alone and different c...Micropropagation techniques were set up for walnut. Many plantlets were obtained by culturing node explants in MS medium,with 30 g/L sucrose, 7 g/L agar, and different concentrations of BA or Kin alone and different concentrations of BA + NAA or BA + Kin. BA at concentration (2 mg L-1 BA) gave the best results in percentage response and number of shoots/plant (100%, 2.84) respectively. While, Kin at 3 mg L-1 gave the highest average shoot length (2.81 cm). However, MS medium supplemented with 2.5 mg L-1 + 0.5 mg L-1 Kin gave the best results compared with all treatment shoot/explants and the highest number of leaves/explants (3.7, 8.2) respectively. While the highest length of shoot (4.7 cm) in MS medium supplemented with 3 mg L-1 Kin. and a high rooting percentage up to 60% at MS medium supplemented with 1 mg L-1 IBA (Indole-3-butyric acid) was obtained.展开更多
基金Project(61100201) supported by National Natural Science Foundation of ChinaProject(12ZZ019) supported by Technology Innovation Research Program,Shang Municipal Education Commission,China+1 种基金Project(LYM11053) supported by the Foundation for Distinguished Young Talents in Higher Education of Guangdong Province,ChinaProject(NCET-12-0358) supported by New Century Excellent Talentsin University,Ministry of Education,China
文摘The key exposure problem is a practical threat for many security applications. In wireless sensor networks (WSNs), keys could be compromised easily due to its limited hardware protections. A secure group key management scheme is responsible for secure distributing group keys among valid nodes of the group. Based on the key-insulated encryption (KIE), we propose a group key management scheme (KIE-GKMS), which integrates the pair-wise key pre-distribution for WSN. The KIE-GKMS scheme updates group keys dynamically when adding or removing nodes. Moreover, the security analysis proves that the KIE-GKMS scheme not only obtains the semantic security, but also provides the forward and backward security. Finally, the theoretical analysis shows that the KIE-GKMS scheme has constant performance on both communication and storage costs in sensor nodes.
基金Project(2007AA01Z224) supported by National High-Tech Research and Development Program of China
文摘To deploy sensor nodes over the area of interest,a scheme,named node scattering manipulation,was proposed.It adopted the following method:during node scattering,the initial states of every node,including the velocity and direction,were manipulated so that it would land in a region with a certain probability;every sensor was relocated in order to improve the coverage and connectivity.Simultaneously,to easily analyze the process of scattering sensors,a trajectory model was also proposed.Integrating node scattering manipulation with trajectory model,the node deployment in wireless sensor network was thoroughly renovated,that is,this scheme can scatter sensors.In practice,the scheme was operable compared with the previous achievements.The simulation results demonstrate the superiority and feasibility of the scheme,and also show that the energy consumption for sensors relocation is reduced.
基金supported by the Sharing and Diffusion of National R&D Outcome funded by the Korea Institute of Science and Technology Information
文摘Since a sensor node handles wireless communication in data transmission and reception and is installed in poor environment, it is easily exposed to certain attacks such as data transformation and sniffing. Therefore, it is necessary to verify data integrity to properly respond to an adversary's ill-intentioned data modification. In sensor network environment, the data integrity verification method verifies the final data only, requesting multiple communications. An energy-efficient private information retrieval(PIR)-based data integrity verification method is proposed. Because the proposed method verifies the integrity of data between parent and child nodes, it is more efficient than the existing method which verifies data integrity after receiving data from the entire network or in a cluster. Since the number of messages for verification is reduced, in addition, energy could be used more efficiently. Lastly, the excellence of the proposed method is verified through performance evaluation.
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金Supported by the National High Technology Research and Development Programme of China (No. 2007AA01Z429, 2007AA01Z405 ) and the National Natural Science Foundation of China (No. 60633020, 60702059, 60872041 ).
文摘This paper presents a new graph-based single-copy routmg method m delay tolerant networks (DTN). With time goes on in the networks, a DTN connectivity graph is constituted with mobility of nodes and communication, and a corresponding greedy tree is obtained using a greedy algorithm in DTN connectivity graph. While there are some bad nodes such as disabled nodes or selfish nodes in delay tolerant networks, the nodes can choose the next p^oper intermediate node to transmit the mes- sage by comparing the location of neighboring nodes in the greedy tree. The single-copy routing method is very appropriate for energy-constrained, storage-constrained and bandwidth-constrained applications such as mobile wireless DTN networks. We show that delivery ratio is increased significantly by using the graph-based single-copy routing when bad nodes exist.
文摘Aberrations of chromosome 9 p21 22 are involved in the genesis of many forms of cancer.The gene p16 and p15 have been assigned to this region.Both p16 and p15 are an inhibitor of cyclin D cdk4,cyclin D cdk6 complex and have been implicated in a wide variety of cancer types,including the germline of patients with familial melanoma.In order to investigate and compare the status of p16,p15 gene in primary tumors and cell lines,we examined 357 primary tumors and 29 cell lines derived from diverse tumor types.In addition to analysis of these primary tumors and cell lines,blood specimens from 91 patients either with sporadic multiple cancers or from cancer prone families were also analyzed.The data showed the following:1)Homozygous deletions of p16,p15 were comparatively rare and far less common than previously reported,although hemizygous deletions were observed in a significant fraction of many tumor types;2)the incidence of p16,p15 deletions(either homozygous deletions or heterozygous deletions)varied significantly among different tumor types;3)most deletions involved in both p16 and p15 genes;4)sequence variations in the coding sequence of p16,p15 were comparatively rare among these tumor types,though mutations and polymorphisms were identified;5)some tumors which showed LOH at 9p,containing p16 and p15 gene,did not show deletions or point mutations in the p16,p15 gene.6)In a subset of retinoblastoma and osteosarcoma where no Rb gene mutations were present a significant fraction was found to contain p16,p15 gene deletions.
基金Project(60873081)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0787)supported by Program for New Century Excellent Talents in UniversityProject(11JJ1012)supported by the Natural Science Foundation of Hunan Province,China
文摘The optimization of network performance in a movement-assisted data gathering scheme was studied by analyzing the energy consumption of wireless sensor network with node uniform distribution. A theoretically analytical method for avoiding energy hole was proposed. It is proved that if the densities of sensor nodes working at the same time are alternate between dormancy and work with non-uniform node distribution. The efficiency of network can increase by several times and the residual energy of network is nearly zero when the network lifetime ends.
文摘Micropropagation techniques were set up for walnut. Many plantlets were obtained by culturing node explants in MS medium,with 30 g/L sucrose, 7 g/L agar, and different concentrations of BA or Kin alone and different concentrations of BA + NAA or BA + Kin. BA at concentration (2 mg L-1 BA) gave the best results in percentage response and number of shoots/plant (100%, 2.84) respectively. While, Kin at 3 mg L-1 gave the highest average shoot length (2.81 cm). However, MS medium supplemented with 2.5 mg L-1 + 0.5 mg L-1 Kin gave the best results compared with all treatment shoot/explants and the highest number of leaves/explants (3.7, 8.2) respectively. While the highest length of shoot (4.7 cm) in MS medium supplemented with 3 mg L-1 Kin. and a high rooting percentage up to 60% at MS medium supplemented with 1 mg L-1 IBA (Indole-3-butyric acid) was obtained.