P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved b...P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.展开更多
may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set ...may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.展开更多
The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, l...The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.展开更多
Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artifici...Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.展开更多
In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network ...In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network technology based on samsung's $3C2440 chip and some related peripheral devices to form into home gateway of the system control platform, and the home control network using the internal ZigBee wireless network technologies. Practice has proved that the system is stable, is worth promoting.展开更多
In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical proce...In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical processing which use the Data-cube as a data source directly,calculated all or part of the Data-cube in advance,and it can reduce the query response time significantly.This paper considers a class of queries,called the Partial-MAX/MIN query.We introduce Rank Decision Tree(RD-Tree) and it’s searching algorithm for efficient processing of the partial-max/min queries.Through experiments,we show our approach has an efficient processing capability for partial-max/min queries.展开更多
Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in ...Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.展开更多
A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric veh...A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric vehicles and local energy storage will be widely deployed. Internet technology will be utilized to transform the power grid into an energysharing inter-grid. To prepare for the future, a smart grid with intelligent periphery, or smart GRIP, is proposed. The building blocks of GRIP architecture are called clusters and include an energy-management system (EMS)-controlled transmission grid in the core and distribution grids, micro-grids, and smart buildings and homes on the periphery; all of which are hierarchically structured. The layered architecture of GRIP allows a seamless transition from the present to the future and plug-and-play interoperability. The basic functions of a cluster consist of (1) dispatch, (2) smoothing, and (3) mitigation. A risk-limiting dispatch methodology is presented; a new device, called the electric spring, is developed for smoothing out fluctuations in periphery clusters; and means to mitigate failures are discussed.展开更多
In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicas...In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicast path composition, for dynamic multicast routing. The TEA uses a novel link-duplicate-degree encoding, which can encode a multicast path in the link-duplicate-degree and decode the path as a link vector easily. A dynamic algorithm for adding nodes to or removing nodes from a multicast group and a repairing algorithm are also covered in this paper. As the TEA is based on global evaluation, the quality of the multicast path remains stabilized without degradation when multicast members change over time. Therefore, it is not necessary to rearrange the multicast path during the life cycle of the multicast sessions. Simulation results show that the TEA is efficient and convergent.展开更多
In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the col...In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture.展开更多
The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.T...The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.展开更多
基金supported in part by National Basic Research Program of China ("973 Program") under contract No.2007CB311106in part by the Special Funds for Key Program of National Standardization Committee of China No.TC260-JCYJ-W1-2008042
文摘P2P is a complex system.Many researches on P2P architecture have been done.These researches have provided valuable references for the standardization of P2P technology.However,the standardization can not be achieved because there are still some problems in existing studies.This paper proposes a 5-layer reference model which clearly defines the functionalities of each layer,and distinctly describes the interface and the relationship between layers.This model is able to clearly show the internal structure of P2P system and the working process of data flow in P2P system.Validation shows that this model is general and rational.
基金Project supported by the National Natural Science Foundation of China (No. 60221120145) and Science & Technology Committee of Shanghai Municipality Key Project (No. 02DJ14045), China
文摘may incur significant bandwidth for executing more com- plicated search queries such as multiple-attribute queries. In order to reduce query overhead, KSS (keyword-set search) by Gnawali partitions the index by a set of keywords. However, a KSS index is considerably larger than a standard inverted index, since there are more word sets than there are individual words. And the insert overhead and storage overhead are obviously un- acceptable for full-text search on a collection of documents even if KSS uses the distance window technology. In this paper, we extract the relationship information between query keywords from websites’ queries logs to improve performance of KSS system. Experiments results clearly demonstrated that the improved keyword-set search system based on keywords relationship (KRBKSS) is more efficient than KSS index in insert overhead and storage overhead, and a standard inverted index in terms of communication costs for query.
基金supported by the Natural Science Foundation of Beijing under Grant No.4132048,NSFC(61472047),and NSFC(61202435)
文摘The new era of the Internet of Things is driving the evolution of conventional Vehicle Ad-hoc Networks into the lnternet of Vehicles (IoV). With the rapid development of computation and communication technologies, loV promises huge commercial interest and research value, thereby attracting a large number of companies and researchers. This paper proposes an abstract network model of the IoV, discusses the technologies required to create the IoV, presents different applications based on certain currently existing technologies, provides several open research challenges and describes essential future research in the area of loV.
基金supported in part by the National High Technology Research and Development Program of China ("863" Program) (No.2007AA010502)
文摘Since the frequency of network security incidents is nonlinear,traditional prediction methods such as ARMA,Gray systems are difficult to deal with the problem.When the size of sample is small,methods based on artificial neural network may not reach a high degree of preciseness.Least Squares Support Vector Machines (LSSVM) is a kind of machine learning methods based on the statistics learning theory,it can be applied to solve small sample and non-linear problems very well.This paper applied LSSVM to predict the occur frequency of network security incidents.To improve the accuracy,it used an improved genetic algorithm to optimize the parameters of LSSVM.Verified by real data sets,the improved genetic algorithm (IGA) converges faster than the simple genetic algorithm (SGA),and has a higher efficiency in the optimization procedure.Specially,the optimized LSSVM model worked very well on the prediction of frequency of network security incidents.
文摘In order to achieve the smart home system for remote management and wireless transmission function in the smart home networking system design, the article will combined with ARM technology and ZigBee wireless network technology based on samsung's $3C2440 chip and some related peripheral devices to form into home gateway of the system control platform, and the home control network using the internal ZigBee wireless network technologies. Practice has proved that the system is stable, is worth promoting.
文摘In the process of analyzing the large-scale network security situation,the data we faced are always flooded and messy,and the information is difficult to obtain with respond to the query timely.Online analytical processing which use the Data-cube as a data source directly,calculated all or part of the Data-cube in advance,and it can reduce the query response time significantly.This paper considers a class of queries,called the Partial-MAX/MIN query.We introduce Rank Decision Tree(RD-Tree) and it’s searching algorithm for efficient processing of the partial-max/min queries.Through experiments,we show our approach has an efficient processing capability for partial-max/min queries.
基金This work is supported by National Natural Science Foundation of China under contract 60902008.
文摘Denial of Service Distributed Denial of Service (DOS) attack, especially (DDoS) attack, is one of the greatest threats to Internet. Much research has been done for it by now, however, it is always concentrated in the behaviors of the network and can not deal with the problem exactly. In this paper, we start from the security of the protocol, then we propose a novel theory for security protocol analysis of Denial of Service in order to deal with the DoS attack. We first introduce the conception of weighted graph to extend the strand space model, then we extend the penetrator model and define the goal of anti-DoS attack through the conception of the DoS-stop protocol, finally we propose two kinds of DoS test model and erect the novel formal theory for security protocol analysis of Denial of Service. Our new formal theory is applied in two example protocols. It is proved that the Internet key exchange (IKE) easily suffers from the DoS attacks, and the efficient DoS- resistant secure key exchange protocol (JFK) is resistant against DoS attack for the server, respectively.
基金sponsored by National Key Basic Research Program of China (973 Program) (2012CB215102) for WuUS National Science Foundation Award (1135872) for VaraiyaHong Kong RGC Theme-based Research Project (T23-701/14-N) for Hui
文摘A future smart grid must fulfill the vision of the Energy Internet in which millions of people produce their own energy from renewables in their homes, offices, and factories and share it with each other. Electric vehicles and local energy storage will be widely deployed. Internet technology will be utilized to transform the power grid into an energysharing inter-grid. To prepare for the future, a smart grid with intelligent periphery, or smart GRIP, is proposed. The building blocks of GRIP architecture are called clusters and include an energy-management system (EMS)-controlled transmission grid in the core and distribution grids, micro-grids, and smart buildings and homes on the periphery; all of which are hierarchically structured. The layered architecture of GRIP allows a seamless transition from the present to the future and plug-and-play interoperability. The basic functions of a cluster consist of (1) dispatch, (2) smoothing, and (3) mitigation. A risk-limiting dispatch methodology is presented; a new device, called the electric spring, is developed for smoothing out fluctuations in periphery clusters; and means to mitigate failures are discussed.
文摘In order to share multimedia transmissions in mesh networks and optimize the utilization of network resources, this paper presents a Two-stage Evolutionary Algorithm (TEA), i.e., unicast routing evolution and multicast path composition, for dynamic multicast routing. The TEA uses a novel link-duplicate-degree encoding, which can encode a multicast path in the link-duplicate-degree and decode the path as a link vector easily. A dynamic algorithm for adding nodes to or removing nodes from a multicast group and a repairing algorithm are also covered in this paper. As the TEA is based on global evaluation, the quality of the multicast path remains stabilized without degradation when multicast members change over time. Therefore, it is not necessary to rearrange the multicast path during the life cycle of the multicast sessions. Simulation results show that the TEA is efficient and convergent.
基金supported by the national 973 project of China under Grants 2013CB329104the Natural Science Foundation of China under Grants 61372124, 61427801+1 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions (Grant No.13KJB520029)the Jiangsu Province colleges and universities graduate students scientific research and innovation program CXZZ13_0477,NUPTSF(Grant No.NY214033)
文摘In Internet of Things(IoT), the devices or terminals are connected with each other, which can be very diverse over the wireless networks. Unfortunately, the current devices are not designed to communicate with the collocated devices which employ different communication technologies. Consequently, the communication between these devices will be realized only by using the gateway nodes. This will cause the inefficient use of wireless resources. Therefore, in this paper, a smart service system(SSS) architecture is proposed, which consists of smart service terminal(SST), and smart service network(SSN), to realize the Io T in a general environment with diverse communication networks, devices, and services. The proposed architecture has the following advantages: i) the devices in this architecture cover multiple types of terminals and sensor-actuator devices; ii) the communications network therein is a converged network, and will coordinate multiple kinds of existing and emerging networks. This converged network offers ubiquitous access for various sensors and terminals; iii) the architecture has services and applications covering all smart service areas. It also provides theadaptability to new services and applications. A SSS architecture-based smart campus system was developed and deployed. Evaluation experiments of the proposed smart campus system demonstrate the SSS's advantages over the existing counterparts, and verify the effectiveness of the proposed architecture.
基金supported by the National Natural Science Foundation of China(Project No.61472338,61332010)Guangdong Natural Science Foundation(Project No. 2014A030313151)+1 种基金the Fundamental Research Funds for the Central Universitiesthe Research Grants Council of the Hong Kong Special Administrative Region,China (No.415113)
文摘The open and dynamic environment of Internet computing demands new software reliability technologies.How to efficiently and effectively build highly reliable Internet applications becomes a critical research problem.This paper proposes a research framework for predicting reliability of individual software entities as well as the whole Internet application.Characteristics of the Internet environment are comprehensively analyzed and several reliability prediction approaches are proposed.A prototype is implemented and practical use of the proposed framework is also demonstrated.