In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analys...In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system.展开更多
An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web mod...An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies.展开更多
The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end ...The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control.展开更多
Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subjec...Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subject to node capture.Constrained energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network.In this paper,an authenticated dynamic key management scheme,ADKM has been proposed.It provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes.ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication.Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks.展开更多
A critical safe distance(CSD)model in V2V(vehicle-to-vehicle)communication systems was proposed to primarily enhance driving safety by disseminating warning notifications to vehicles when they approach calculated CSD....A critical safe distance(CSD)model in V2V(vehicle-to-vehicle)communication systems was proposed to primarily enhance driving safety by disseminating warning notifications to vehicles when they approach calculated CSD.By elaborately analyzing the vehicular movement features especially when braking,our CSD definition was introduced and its configuration method was given through dividing radio range into different communication zones.Based on our definition,the needed message propagation delay was also derived which could be used to control the beacon frequency or duration.Next,the detailed CSD expressions were proposed in different mobility scenarios by fully considering the relative movement status between the front and rear vehicles.Numerical results show that our proposed model could provide reasonable CSD under different movement scenarios which eliminates the unnecessary reserved inter-vehicle distance and guarantee the safety at the same time.The compared time-headway model always shows a smaller CSD due to focusing on traffic efficiency whereas the traditional braking model generally outputs a larger CSD because it assumes that the following car drives with a constant speed and did not discuss the scenario when the leading car suddenly stops.Different from these two models,our proposed model could well balances the requirements between driving safety and traffic throughput efficiency by generating a CSD in between the values of the two models in most cases.展开更多
In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used ...In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.展开更多
We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the...We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.展开更多
In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. S...In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system.展开更多
The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presente...The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing.展开更多
Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Chall...Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.展开更多
In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the sa...In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method.展开更多
Established in 1997, the European New Car Assessment Programme (Euro NCAP) provides consumers with a safety performance assessment for the majority of the most popular cars in Europe. Thanks to its rigorous crash te...Established in 1997, the European New Car Assessment Programme (Euro NCAP) provides consumers with a safety performance assessment for the majority of the most popular cars in Europe. Thanks to its rigorous crash tests, Euro NCAP has rapidly become an important driver safety improvement to new cars. After ten years of rating vehicles, Euro NCAP felt that a change was necessary to stay in tune with rapidly emerging driver assistance and crash avoidance systems and to respond to shifting priorities in road safety. A new overall rating system was introduced that combines the most important aspects of vehicle safety under a single star rating. The overall rating system has allowed Euro NCAP to continue to push for better fitment and higher performance for vehicles sold on the European market. In the coming years, the safety rating is expected to play an important role in the support of the roll-out of highly automated vehicles.展开更多
Purpose: Unsafe behaviors are an important cause of accidents in adolescent age groups. This study was designed to examine the behaviors of adolescent pedestrians in southern Iran. Methods: This is a descriptive ana...Purpose: Unsafe behaviors are an important cause of accidents in adolescent age groups. This study was designed to examine the behaviors of adolescent pedestrians in southern Iran. Methods: This is a descriptive analytical cross-sectional study. The study population consisted of high school students in Shiraz, capital city of Fars Province, Iran. Five hundred and sixteen students were selected by multi-stage sampling. Data were collected by the use of three questionnaires, which included Persian copies of adolescent road user behavior questionnaire (ARBQ), Duke University Religious Index (DUREL), as well as the context and independent variables questionnaire. Results: The results showed that a decrease in dangerous behaviors on the road resulted in an increase in respondents' intrinsic religiosity. Also, engagement in unsafe crossing behavior in the road decreased with increasing respondents' intrinsic religiosity. Another finding showed that female students were less involved in dangerous play and planned protective behaviors on the road. Conclusion: Findings clearly indicate that intrinsic religiosity has a significant role in reducing the risky road behaviors of students. Hence, religion may improve road safety in school students' road behavior in Iran.展开更多
文摘In order to give a new way for modeling driving behavior, identifying road traffic accident causation and solving a variety of road traffic safety problems such as driving errors prevention and driving behavior analysis, a new driving behavior shaping model is proposed, which could be used to assess the degree of effect of driving error upon road traffic safety. Driver behavior shaping model based on driving reliability and safety analysis could be used to identify the road traffic accident causation, to supply data for driver's behavior training, to evaluate driving procedures, to human factor design of road traffic system.
基金The National Natural Science Foundation of China(No.60474037),Program for New Century Excellent Talents in Univer-sity (No.NCET-04-415).
文摘An integrated security framework for a semantic web is proposed based on the social intelligence of an individual's avoiding harm and preserving transaction logic-integrity. The framework extends the semantic web model and controls the dynamic security of semantic web services, such as trust, logic and reasoning. It includes four layers, that is, a trust entrance layer, a social intelligence layer, a transaction layer, and a TCP/IP security protocols layer. The trust entrance layer deals with trustable features from users. Social intelligence layer is responsible for logical questions for a semantic web. The transaction layer carries out transaction reasoning. And the TCP/IP security protocols layer ensures security communication. These layers can cooperate to build closed-security-ring with different security grades. The integrated security framework provides an integrated security method for semantic web flow so that it is universal for various semantic web technologies.
文摘The virtual private network (VPN) system, which is one of the construction methods for private networks over the Internet, is gaining prominence. VPNs are currently used for corporate networks to support end to end communications. But if they are applied to private networks for distributed departments in organizations, some problems should be concerned, such as low efficiency of packet transfer and nonsupport of unsymmetrical VPN connections. At first this paper analyzes the limitations of VPN used in the environment of multiple subnets, and then brings up a distributed module of VPN with low cost, high packet transfer efficiency and powerful functions of user authentication and access control.
基金The work reported in this paper was supported by the National Natural Science Foundation of China under Grant No. 60972077, the National High-Tech Research and Development Plan of China under Grant No. 2009AA01 Z430, the Beijing Municipal Natural Science Foundation under Grant No. 9092009, the Fundamental Research Funds for the Central Universities under Grant No. B 1020211, China Postdoctoral Science Foundation funded project under Grant No. 20100471373, the "Six Talent Peaks Program" of Jiangsu Province of China and Program for New Century Excellent Talents in Hohai University.
文摘Secure sensor networks has received much attention in the last few years.A sensor network always works unattended possibly in a hostile environment such as a battlefield.In such environments,sensor networks are subject to node capture.Constrained energy,memory,and computational capabilities of sensor nodes mandate a clever design of security solutions to minimize overhead while maintaining secure communication over the lifespan of the network.In this paper,an authenticated dynamic key management scheme,ADKM has been proposed.It provides efficient,scalable,and survivable dynamic keying in a clustered sensor network with a large number of sensor nodes.ADKM employs a combinatorial exclusion basis system (EBS) for efficiency and one-way hash chains for authentication.Analysis of security and performance demonstrate that ADKM is efficient in security of sensor networks.
基金Project(20100481323) supported by China Postdoctoral Science FoundationProjects(61201133,61172055,61072067,51278058)supported by the National Natural Science Foundation of China+4 种基金Project(NCET-11-0691) supported by the Program for New Century Excellent Talents in UniversityProject(11105) supported by the Foundation of Guangxi Key Lab of Wireless Wideband Communication & Signal Processing,ChinaProject(B08038) supported by the "111" Project,ChinaProject(K5051301011) supported by the Fundamental Research Funds for the Central Universities of ChinaProject(CX12178(6)) supported by the Xian Municipal Technology Transfer Promotion funds,China
文摘A critical safe distance(CSD)model in V2V(vehicle-to-vehicle)communication systems was proposed to primarily enhance driving safety by disseminating warning notifications to vehicles when they approach calculated CSD.By elaborately analyzing the vehicular movement features especially when braking,our CSD definition was introduced and its configuration method was given through dividing radio range into different communication zones.Based on our definition,the needed message propagation delay was also derived which could be used to control the beacon frequency or duration.Next,the detailed CSD expressions were proposed in different mobility scenarios by fully considering the relative movement status between the front and rear vehicles.Numerical results show that our proposed model could provide reasonable CSD under different movement scenarios which eliminates the unnecessary reserved inter-vehicle distance and guarantee the safety at the same time.The compared time-headway model always shows a smaller CSD due to focusing on traffic efficiency whereas the traditional braking model generally outputs a larger CSD because it assumes that the following car drives with a constant speed and did not discuss the scenario when the leading car suddenly stops.Different from these two models,our proposed model could well balances the requirements between driving safety and traffic throughput efficiency by generating a CSD in between the values of the two models in most cases.
基金Acknowledgements This work was supported by Research Funds of Information Security Key Laboratory of Beijing Electronic Science & Technology Institute National Natural Science Foundation of China(No. 61070219) Building Together Specific Project from Beijing Municipal Education Commission.
文摘In order to solve the issue that existing direct anonymous attestation (DAA) scheme can not operate effectively in different domains,based on the original DAA scheme,a novel direct anonymous attestation protocol used in multi domains environment is proposed and designed,in which,the certificate issuer located in outside of domain can be considered as a proxy server to issue the DAA certificate for valid member nodes directly.Our designed mechanism accords with present trusted computing group (TCG) international specification,and can solve the problems of practical authentication and privacy information protection between different trusted domains efficiently.Compared with present DAA scheme,in our protocol,the anonymity,unforgeability can be guaranteed,and the replay-attack also can be avoided.It has important referenced and practical application value in trusted computing field.
基金supported by National Natural Science Foundation of China under Crant No.10575017
文摘We introduce a protocol for QKD based on reusable entangled states. In this protocol, the EPR pairs act as a quantum key to encode and decode information particles. And only an information particle travels between the legitimated users. This improves the security and efficiency of communication. In addition, we show that its extension to a new QSS protocol is also secure and efficient.
文摘In this paper, the authors design a novel chaotic secure communication system, which has high security and good error correcting capability. Firstly, the Henon Chaos Shift Keying (CSK) modulation block is presented. Secondly, chaotic turbo encoder/decoder (hard decision) is introduced. Thirdly, this chaotic secure communication system, which comprises the Henon CSK modulation block and chaotic turbo encoder in a serially concatenated form, is shown. Furthermore, a novel two step encryption scheme is proposed, which is based on the chaotic turbo encoded Henon CSK secure communication system.
基金This study is supported by National Natural Science Foundation of China (No.60973146) National Natur al Science Foundation of Beijing (No.4092029) The Fundamental Research Funds for the Central Universities (No.2009RC0217). We also thank the anonymous reviewers for their constructive comments.
文摘The security of critical data is an important issue for distributed storage system design,especially for long-term storage.ESSA (An Efficient and Secure Splitting Algorithm for Distributed Storage Systems) is presented,which takes advantage of a two level information dispersal scheme to strengthen the security of data.In ESSA,the approach of knight’s tour problem,which is NP-Complete,is introduced to scramble data at the first level,and a split cube is used to split scrambled data at the second level.Thus,it is very difficult for the malicious user to get information because the task of reconstructing the original data needs more computation than they can tolerate.We prove that the security of ESSA is better than encryption algorithm and not inferior to erasure codes and secret sharing.Experimental results show that distributed storage systems exploiting ESSA has greater efficiency than that exploiting keyed encryption,erasure codes and secret sharing.
文摘Key agreement and identification protocols are much applicable among current protocols in cryptography. These protocols are used for a secure communication through an insecure channel in a network like Internet. Challenge-response identification protocol is an important identification method. In this paper, by making some slight changes in the public-key-based challenge-response identification protocol, we have introduced a new scheme in which the users in addition to authenticating each other can also agree on multiple keys. Then, this protocol's security from both aspects regarding the identification and key agreement will be analyzed. At the end, we will prove our scheme has a high security and efficiency in comparison with some famous and similar protocols.
基金supported by the New Century Excellent Researcher Award Program from Ministry of Education of China (Grant No. NCET-07-0059)the Fundamental Research Funds for the Central Universities (Grant No.2011YJS006)+1 种基金the National High Technology Research and DevelopmentProgram of China ("863" Program) (Grant No. 2011AA010104)the State Key Laboratory of Rail Traffic Control and Safety Research Project(Grant Nos. RCS2008ZZ001, RCS2008ZZ005)
文摘In order to satisfy the safety-critical requirements,the train control system(TCS) often employs a layered safety communication protocol to provide reliable services.However,both description and verification of the safety protocols may be formidable due to the system complexity.In this paper,interface automata(IA) are used to describe the safety service interface behaviors of safety communication protocol.A formal verification method is proposed to describe the safety communication protocols using IA and translate IA model into PROMELA model so that the protocols can be verified by the model checker SPIN.A case study of using this method to describe and verify a safety communication protocol is included.The verification results illustrate that the proposed method is effective to describe the safety protocols and verify deadlocks,livelocks and several mandatory consistency properties.A prototype of safety protocols is also developed based on the presented formally verifying method.
文摘Established in 1997, the European New Car Assessment Programme (Euro NCAP) provides consumers with a safety performance assessment for the majority of the most popular cars in Europe. Thanks to its rigorous crash tests, Euro NCAP has rapidly become an important driver safety improvement to new cars. After ten years of rating vehicles, Euro NCAP felt that a change was necessary to stay in tune with rapidly emerging driver assistance and crash avoidance systems and to respond to shifting priorities in road safety. A new overall rating system was introduced that combines the most important aspects of vehicle safety under a single star rating. The overall rating system has allowed Euro NCAP to continue to push for better fitment and higher performance for vehicles sold on the European market. In the coming years, the safety rating is expected to play an important role in the support of the roll-out of highly automated vehicles.
文摘Purpose: Unsafe behaviors are an important cause of accidents in adolescent age groups. This study was designed to examine the behaviors of adolescent pedestrians in southern Iran. Methods: This is a descriptive analytical cross-sectional study. The study population consisted of high school students in Shiraz, capital city of Fars Province, Iran. Five hundred and sixteen students were selected by multi-stage sampling. Data were collected by the use of three questionnaires, which included Persian copies of adolescent road user behavior questionnaire (ARBQ), Duke University Religious Index (DUREL), as well as the context and independent variables questionnaire. Results: The results showed that a decrease in dangerous behaviors on the road resulted in an increase in respondents' intrinsic religiosity. Also, engagement in unsafe crossing behavior in the road decreased with increasing respondents' intrinsic religiosity. Another finding showed that female students were less involved in dangerous play and planned protective behaviors on the road. Conclusion: Findings clearly indicate that intrinsic religiosity has a significant role in reducing the risky road behaviors of students. Hence, religion may improve road safety in school students' road behavior in Iran.