This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti...This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.展开更多
In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed ...In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed with characteristics as follows: Model 1 possesses overall uniform stiffness and is expected to collapse in the strength failure mode as some members become plastic; Model 2 possesses six man-made weak parts located on six radial main rib zones and is expected to collapse in the dynamic in- stability mode with all members still in the elastic stage; Model 3 strengthens the six weak zones of Model 2, and therefore, its stiffness is uniform. Model 3 is proposed to collapse in the strength failure mode when the members are still in the elastic stage By increasing the peak ground accelerations of seismic waves gradually, the shaking table tests were carried out until all three models collapsed (or locally collapsed). On the basis of form vulnerability theory, topological hierarchy models of the test models were established through a clustering process, and various failure scenarios, including overall collapse scenarios and partial collapse scenarios, were identified by unzipping corresponding hierarchical models. By comparison of the failure scenarios based on theoretical analysis and experiments, it was found that vulnerability theory could effectively reflect the weak- ness zones in topological relations of the structures from the perspective of internal causes. The intemal mechanisms of the distinct failure characteristics of reticulated shells subjected to seismic excitations were also revealed in this process. The well-formedness of structural clusters, Q, is closely related to the collapse modes, i.e., uniform changes of Q indicate a uniform distribution of overall structural stiffness, which indicates that strength failure is likely to happen; conversely, non-uniform changes of Q indicate that weak zones exist in the structure, and dynamic instability is likely to occur.展开更多
基金supported by key special project of National Key Research and Development Program (2017YFC0803900)
文摘This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.
基金supported by the National Natural Science Foundation of China (Grant No. 90715005)the New Century Excellent Talent of Ministry of Education of China (Grant No. NCET-07-0186)the Doctoral Fund of Ministry of China (Grant No. 200802860007)
文摘In this paper, form vulnerability theory was applied to the analysis of the failure mechanisms of single-layer latticed spherical shells subjected to seismic excitations. Three 1/10 scale testing models were designed with characteristics as follows: Model 1 possesses overall uniform stiffness and is expected to collapse in the strength failure mode as some members become plastic; Model 2 possesses six man-made weak parts located on six radial main rib zones and is expected to collapse in the dynamic in- stability mode with all members still in the elastic stage; Model 3 strengthens the six weak zones of Model 2, and therefore, its stiffness is uniform. Model 3 is proposed to collapse in the strength failure mode when the members are still in the elastic stage By increasing the peak ground accelerations of seismic waves gradually, the shaking table tests were carried out until all three models collapsed (or locally collapsed). On the basis of form vulnerability theory, topological hierarchy models of the test models were established through a clustering process, and various failure scenarios, including overall collapse scenarios and partial collapse scenarios, were identified by unzipping corresponding hierarchical models. By comparison of the failure scenarios based on theoretical analysis and experiments, it was found that vulnerability theory could effectively reflect the weak- ness zones in topological relations of the structures from the perspective of internal causes. The intemal mechanisms of the distinct failure characteristics of reticulated shells subjected to seismic excitations were also revealed in this process. The well-formedness of structural clusters, Q, is closely related to the collapse modes, i.e., uniform changes of Q indicate a uniform distribution of overall structural stiffness, which indicates that strength failure is likely to happen; conversely, non-uniform changes of Q indicate that weak zones exist in the structure, and dynamic instability is likely to occur.