Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws ...Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.展开更多
Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization st...Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization structure in IEEE 802.11 based wireless networks is pre-configured, and the entire available spectrum is divided into subchannels and equal channel widths. In contrast, this paper presents a Traffic-Aware Channelization MAC (TAC-MAC) protocol for wireless ad hoc networks, where each node is equipped with a single half duplex transceiver. TAC-MAC works in a distributed, fine-grai-ned manner, which dynamically divides variable-width subchannels and allocates subchannel width based on the Orthogonal Frequency Division Multiplexing (OFDM) technique according to the traffic demands of nodes. Simulations show that the TAC-MAC can significantly improve network throughput and reduce packet delay compared with both fixed-width multi-channel MAC and single channel 802.11 protocols, which illustrates a new paradigm for high-efficient multi-channel MAC design in wireless ad hoc networks.展开更多
Based on CAN calibration protocol, a new calibration and monitoring system was developed for the GD-1 high pressure common rail diesel engine. CAN driver block, monitoring program and calibration program for this syst...Based on CAN calibration protocol, a new calibration and monitoring system was developed for the GD-1 high pressure common rail diesel engine. CAN driver block, monitoring program and calibration program for this system were designed respectively. The inquiry mode was used in the monitoring program and the interrupt mode was used in calibration program. The calibration program was designed in structural programming model. This system provides a reliable, accurate and quick CAN bus between ECU and PC, with baud rate up to 500Kbit/s. The implementation of the compatible and universal CAN calibration protocol makes it easy to displace the system and its function modules. It also provides friendly, compatible and flexible calibration interface, and the functions of online calibration and real-time monitoring. This system was successfully used in a GD-1 high pressure common rail diesel engine and the engine performance and exhaust emissions were significantly improved.展开更多
Energy efficiency has become one of the most important issues in wireless body area network(WBAN).In this paper,an energy-efficient medium access control(MAC)protocol for WBAN is proposed based on human body posture u...Energy efficiency has become one of the most important issues in wireless body area network(WBAN).In this paper,an energy-efficient medium access control(MAC)protocol for WBAN is proposed based on human body posture under walking scenery.Due to person's movements,WBAN is a dynamic network,which means that traditional static protocols are no more suitable for it.For solving this problem,firstly,the feature of human walking at a constant speed is analyzed and we divide a spell of movements into a sequence of key frames just like a video constituted by numbers of continuous frames.As a result,the dynamic walking process is translated into several static postures,which the static MAC protocol could be used for.Secondly,concerning the performance of network lifetime,we design a posture-aware approach for lifetime maximization(PA-DPLM).With analytical and simulation results provided,we demonstrate that PA-DPLM protocol is energy-efficient and can be used under constant speed walking scenery.展开更多
Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by pr...Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by proactive routing protocol. Pre-proposals like Tree Based Routing (TBR) protocol and Root Driven Routing (RDR) protocol are so centralized that they make the gateway becorre a bottleneck which severely restricts the network performance. We proposed an Optimized Tree-based Routing (OTR) protocol that logically separated the proactive tree into pieces. Route is partly computed by the branches instead of root. We also discussed the operation of multipie Intemet gateways which is a main issue in WMN. The new proposal lightens the load in root, reduces the overhead and improves the throughput. Numerical analysis and simulation results confirm that the perforrmnce of WMN is improved and OTR is more suitable for large scale WMN.展开更多
Hybrid Distributed Coordination Function (HDCF),a modified medium access control pro-tocol of IEEE 802.11 standard,is proposed in this paper to support both smart adaptive array anten-nas and normal omni-directional a...Hybrid Distributed Coordination Function (HDCF),a modified medium access control pro-tocol of IEEE 802.11 standard,is proposed in this paper to support both smart adaptive array anten-nas and normal omni-directional antennas simultaneously in one wireless LAN. Omni-directional an-tennas follow the standard Distributed Coordination Function (DCF) and smart antennas follow the Directional DCF (DDCF). The proposed DDCF is based on Hybrid Virtual Carrier Sense (HVCS) mechanism,which includes Omni-directional Request-To-Send/Clear-To-Send (ORTS/OCTS) hand-shake mechanism and directional data transmission. HDCF is compatible with DCF. When a node transmits in a directional beam,the other nodes can multiplex the physical channel. Hence,HDCF supports Space Division Multiple Access (SDMA). Simulation results show that HDCF can support hybrid antennas effectively and provide much higher network throughput and lower delay and jitter than DCF does.展开更多
Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In...Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.展开更多
This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is impl...This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.展开更多
基金supported in part by the Natioual Natural Science Foundation of China(Grant No.60933003)the High Technical Research and Development Program of China(Grant No.2006AA01Z101)+1 种基金Shaanxi ISTC(Grant No.2008KW-02)IBM Joint Project
文摘Secure and private authentication protocol is important in Radio Frequency Identification (RFID) technology.To date,researchers have proposed many RFID authentication protocols.However,these protocols have many flaws due to lack of theoretical support in designing these protocols.In this work,first we present the security and privacy requirements in RFID authentication protocols.Then we examine related works and point out problems in designing RFID authentication protocols.To solve these problems,we propose and briefly prove three theorems.We also give necessary examples for better understanding these theorems with concrete protocols.At last,we give our suggestions on designing secure and private authentication protocols.The security and privacy requirements,theorems,and suggestions will facilitate better understanding and designing of RFID authentication protocols in the future.
基金supported by the National Natural Science Foundation of China under Grant No. 61002032the Doctoral Fund of Ministry of Education of China under Grant No. 20094307110004
文摘Existing multi-channel Medium Access Control (MAC) protocols have been demonstrated to significantly increase wireless network performance compared to single channel MAC protocols. Traditionally, the channelization structure in IEEE 802.11 based wireless networks is pre-configured, and the entire available spectrum is divided into subchannels and equal channel widths. In contrast, this paper presents a Traffic-Aware Channelization MAC (TAC-MAC) protocol for wireless ad hoc networks, where each node is equipped with a single half duplex transceiver. TAC-MAC works in a distributed, fine-grai-ned manner, which dynamically divides variable-width subchannels and allocates subchannel width based on the Orthogonal Frequency Division Multiplexing (OFDM) technique according to the traffic demands of nodes. Simulations show that the TAC-MAC can significantly improve network throughput and reduce packet delay compared with both fixed-width multi-channel MAC and single channel 802.11 protocols, which illustrates a new paradigm for high-efficient multi-channel MAC design in wireless ad hoc networks.
文摘Based on CAN calibration protocol, a new calibration and monitoring system was developed for the GD-1 high pressure common rail diesel engine. CAN driver block, monitoring program and calibration program for this system were designed respectively. The inquiry mode was used in the monitoring program and the interrupt mode was used in calibration program. The calibration program was designed in structural programming model. This system provides a reliable, accurate and quick CAN bus between ECU and PC, with baud rate up to 500Kbit/s. The implementation of the compatible and universal CAN calibration protocol makes it easy to displace the system and its function modules. It also provides friendly, compatible and flexible calibration interface, and the functions of online calibration and real-time monitoring. This system was successfully used in a GD-1 high pressure common rail diesel engine and the engine performance and exhaust emissions were significantly improved.
基金supported by the National Natural Science Foundation of China(No.61074165 and No.61273064)Jilin Provincial Science & Technology Department Key Scientific and Technological Project(No.20140204034GX)Jilin Province Development and Reform Commission Project(No.2015Y043)
文摘Energy efficiency has become one of the most important issues in wireless body area network(WBAN).In this paper,an energy-efficient medium access control(MAC)protocol for WBAN is proposed based on human body posture under walking scenery.Due to person's movements,WBAN is a dynamic network,which means that traditional static protocols are no more suitable for it.For solving this problem,firstly,the feature of human walking at a constant speed is analyzed and we divide a spell of movements into a sequence of key frames just like a video constituted by numbers of continuous frames.As a result,the dynamic walking process is translated into several static postures,which the static MAC protocol could be used for.Secondly,concerning the performance of network lifetime,we design a posture-aware approach for lifetime maximization(PA-DPLM).With analytical and simulation results provided,we demonstrate that PA-DPLM protocol is energy-efficient and can be used under constant speed walking scenery.
基金Acknowledgements This paper was supported by the Major National Science and Technology program under Grant No. 2011ZX03005-002 the National Natural Science Foundation of China under Grant No. 61100233 the Fundamental Universities under Grant No Research Funds for the Central K50510030010.
文摘Wireless Mesh Network (WMN) is seen as an effective Intemet access solution for dynamic wireless applications. For the low mobility of mesh routers in WMN, the backbone topography can be effectively maintained by proactive routing protocol. Pre-proposals like Tree Based Routing (TBR) protocol and Root Driven Routing (RDR) protocol are so centralized that they make the gateway becorre a bottleneck which severely restricts the network performance. We proposed an Optimized Tree-based Routing (OTR) protocol that logically separated the proactive tree into pieces. Route is partly computed by the branches instead of root. We also discussed the operation of multipie Intemet gateways which is a main issue in WMN. The new proposal lightens the load in root, reduces the overhead and improves the throughput. Numerical analysis and simulation results confirm that the perforrmnce of WMN is improved and OTR is more suitable for large scale WMN.
文摘Hybrid Distributed Coordination Function (HDCF),a modified medium access control pro-tocol of IEEE 802.11 standard,is proposed in this paper to support both smart adaptive array anten-nas and normal omni-directional antennas simultaneously in one wireless LAN. Omni-directional an-tennas follow the standard Distributed Coordination Function (DCF) and smart antennas follow the Directional DCF (DDCF). The proposed DDCF is based on Hybrid Virtual Carrier Sense (HVCS) mechanism,which includes Omni-directional Request-To-Send/Clear-To-Send (ORTS/OCTS) hand-shake mechanism and directional data transmission. HDCF is compatible with DCF. When a node transmits in a directional beam,the other nodes can multiplex the physical channel. Hence,HDCF supports Space Division Multiple Access (SDMA). Simulation results show that HDCF can support hybrid antennas effectively and provide much higher network throughput and lower delay and jitter than DCF does.
基金Supported by the Priority Academic Program Development of Jiangsu Higher Education Institutions (PAPD)the National Natural Science Foundation of China (No.60903181)Nanjing University of Posts and Telecommunications Funds (No.NY208072)
文摘Most of the Radio Frequency IDentification (RFID) authentication protocols, proposed to preserve security and privacy, are analysed to show that they can not provide security against some passive or active attacks. In this paper, the security of two matrix-based protocols, proposed by Karthikeyan and Nesterenko (KN protocol) and Ramachandra et al. (RRS protocol) that conform to Electronic Product Code Class-1 Generation-2 (EPC Class-1 Gen-2) standard, are investigated. Using the linear relationship of multiplication of matrix and vector, we point out that both protocols can not provide scalability, and they are vulnerable to passive impersonation attack. In addition, both protocols are totally insecure if the adversary can compromise one tag to extract the secrets. A modified lightweight matrix-based authentication protocol is presented, which can resist mainly common attacks on an RFID authentication system including eavesdropping, relay attack, desynchronization attack, impersonation attack and tag tracking attack. The new protocol also has the desirable scalability property and can keep secure under compromising attack.
基金Supported by the"863"project under contract 2001 A A 123016
文摘This letter presents the design and performance of a multi-channel MAC protocol that supports multiple traffics for IEEE 802.11 mobile ad-hoc networks. The dynamic channel selection scheme by receiver decision is implemented and the number of the data channel is independent of the network topology. The priority for real-time traffic is assured by the proposed adaptive back off algorithm and different IFS. The protocol is evaluated by simulation and the results have shown that it can support multiple traffics and the performance is better than the performance that IEEE 802.11 standard provides.