In this paper, the configuration characteristic of the safe parameter measurement and alarm system in new type mine was first simply introduced, which is made up of topological structure and combines wire communicatio...In this paper, the configuration characteristic of the safe parameter measurement and alarm system in new type mine was first simply introduced, which is made up of topological structure and combines wire communication with radio communication, then introduced respectively the hardware and software construction and the working principle and the method of design, which is composed of detecting instrument as the core of enhanced single chip microcomputer AT89S8252 and relay station and CPU which consists of IPC. The three class computer communication system that integrates with measurement and alarm and management works reliably and uses conveniently, especially to thesystem of parameter detecting and alarm in mine, which is adapted to measure dispersedly and manage intensively.展开更多
Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment f...Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.展开更多
文摘In this paper, the configuration characteristic of the safe parameter measurement and alarm system in new type mine was first simply introduced, which is made up of topological structure and combines wire communication with radio communication, then introduced respectively the hardware and software construction and the working principle and the method of design, which is composed of detecting instrument as the core of enhanced single chip microcomputer AT89S8252 and relay station and CPU which consists of IPC. The three class computer communication system that integrates with measurement and alarm and management works reliably and uses conveniently, especially to thesystem of parameter detecting and alarm in mine, which is adapted to measure dispersedly and manage intensively.
基金the NSFC Danish National Research Foundation and National Science Foundation of China Joint Grant (No. 11061130539)the National Natural Science Foundation of China (No. 61021004)
文摘Key establishment is the basic step for the wireless sensor network (WSN) security. The polynomial based key predistribution scheme of Blom and Blundo et al. has been the basic ingredient for the key establishment for WSNs. It is tempting to use many random and different instances of polynomial based key predistribution scheme for various parts of the WSN to enhance the efficiency of WSN key establishment protocols. This paper indicates that it is not secured in general to use many instances of Blom-Blundo et al. polynomial based key predistribution scheme in a WSN key establishment protocol. Thus the previously constructed group-based type WSN key predistribution schemes using polynomial based key predistribution scheme are insecure. We propose new generalized Bloin-Blundo et al. key predistribution schemes. These new generalized Blom-Blundo et al. key predistribution schemes can be used many times in one WSN key establishment protocol with only a small increase of cost. The application to group-based WSN key predistribution schemes is given.