A digital data-acquisition system based on XIA LLC products was used in a complex nuclear reaction experiment using radioactive ion beams.A flexible trigger system based on a field-programmable gate array(FPGA)paramet...A digital data-acquisition system based on XIA LLC products was used in a complex nuclear reaction experiment using radioactive ion beams.A flexible trigger system based on a field-programmable gate array(FPGA)parametrization was developed to adapt to different experimental sizes.A user-friendly interface was implemented,which allows converting script language expressions into FPGA internal control parameters.The proposed digital system can be combined with a conventional analog data acquisition system to provide more flexibility.The performance of the combined system was veri-fied using experimental data.展开更多
End hopping is an active and effective technology for defending against adversaries in the network warfare.Synchronization is a key technology of end hopping.However,the common synchronization methods are insufficient...End hopping is an active and effective technology for defending against adversaries in the network warfare.Synchronization is a key technology of end hopping.However,the common synchronization methods are insufficient for end hopping.Based on timestamp synchronization,this paper proposes a novel method of Distributed Timestamp Synchronization(DTS)to improve the capacity of synchronization.DTS uses a list of timestamp servers which are located all over the Internet to synchronize timestamp,and a list of clock offsets to adjust the synchronized timestamp.DTS can overcome the main deficiencies(request overwhelming and boundary failure)of timestamp synchronization.Experiments show that DTS is a feasible synchronization technology for end hopping.展开更多
A measurement method of optical fiber length using timestamp technique is demonstrated. Based on IEEE1588 precise clock synchronization protocol, the principle that time delay asymmetry on two path results in synchr...A measurement method of optical fiber length using timestamp technique is demonstrated. Based on IEEE1588 precise clock synchronization protocol, the principle that time delay asymmetry on two path results in synchronization time deviation is used, and the difference between two-path delays could be deduced by measuring the synchronization time deviation reversely. Then the length of optical fiber on one path could be calculated if that on the other path is known Due to the fact that the path of Sync and Delay_Req message is symmetric, the optical pulse dispersion and the asymmetry of photoelectric detector performance on two paths are averaged by exchanging two optical fibers. The time difference between master and slave clocks is eliminated by sharing the same time base. At last, the lengths of two single-mode optical fibers are measured with the uncertainty of 0. 578 m for 3 227. 722 m and 0. 758 m for 25 491. 522 m, respectively. Thus this method has high precision and long range.展开更多
In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most i...In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most important issues in network data communication.Because the timestamp is the most impor-tant way to authenticate data in information interaction,it is very necessary to pro-vide timestamp service in the data communication system.However,the existing centralized timestamp mechanism is difficult to provide credible timestamp ser-vice,and users can conspire with timestamping servers to forge timestamps.Therefore,this paper designs a distributed timestamp mechanism based on contin-uous verifiable delay functions.It utilizes multiple independent timestamp servers to provide timestamp services in a distributed model and appends the timestamp to the data once the data is generated.Thus,it can prove that the data already exists at a certain time and ensure the accuracy of the timestamp.Moreover,a digital blind signature based on elliptic curve cryptography is utilized to solve the problem of timestamp forgery in timestamp service.Finally,the security ana-lysis of the scheme ensures the data security of data communication system and the concurrency rate of timestamp.The experimental results also show that the scheme greatly improves the efficiency of digital signatures.展开更多
The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult ...The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult problem.This paper proposes an improved time-stamped blockchain technology biometric fuzzy feature for electrical equipment maintenance.Compared with previous blockchain transactions,the time-stamped fuzzy biometric signature proposed in this paper overcomes the difficulty that the key is easy to be stolen by hackers and can protect the security of information during operation and maintenance.Finally,the effectiveness of the proposed method is verified by experiments.展开更多
The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)...The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)criterion,enabled by the properties of random fluctuations and intra-grid consistency.In essence,this is a task of matching a short random sequence within a long reference,whose accuracy is mainly concerned with whether this match could be uniquely correct.In this paper,we comprehensively analyze the factors affecting the reliability of ENF matching,including the length of test recording,length of reference,temporal resolution,and Signal-to-Noise Ratio(SNR).For synthetic analysis,we incorporate the first-order AutoRegressive(AR)ENF model and propose an efficient Time-Frequency Domain noisy ENF synthesis method.Then,the reliability analysis schemes for both synthetic and real-world data are respectively proposed.Through a comprehensive study,we quantitatively reveal that while the SNR is an important external factor to determine whether timestamp verification is viable,the length of test recording is the most important inherent factor,followed by the length of reference.However,the temporal resolution has little impact on performance.Finally,a practical workflow of the ENF-based audio timestamp verification system is proposed,incorporating the discovered results.展开更多
基金This work was supported by the National Key R&D Program of China(Nos.2023YFA1606403 and 2023YFE0101600)the National Natural Science Foundation of China(Nos.12027809,11961141003,U1967201,11875073 and 11875074).
文摘A digital data-acquisition system based on XIA LLC products was used in a complex nuclear reaction experiment using radioactive ion beams.A flexible trigger system based on a field-programmable gate array(FPGA)parametrization was developed to adapt to different experimental sizes.A user-friendly interface was implemented,which allows converting script language expressions into FPGA internal control parameters.The proposed digital system can be combined with a conventional analog data acquisition system to provide more flexibility.The performance of the combined system was veri-fied using experimental data.
基金National Natural Science Foundation of China under Grant No. 60973141Natural Science Foundation of Tianjin under Grant No. 09JCYBJ00300Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20100031110030
文摘End hopping is an active and effective technology for defending against adversaries in the network warfare.Synchronization is a key technology of end hopping.However,the common synchronization methods are insufficient for end hopping.Based on timestamp synchronization,this paper proposes a novel method of Distributed Timestamp Synchronization(DTS)to improve the capacity of synchronization.DTS uses a list of timestamp servers which are located all over the Internet to synchronize timestamp,and a list of clock offsets to adjust the synchronized timestamp.DTS can overcome the main deficiencies(request overwhelming and boundary failure)of timestamp synchronization.Experiments show that DTS is a feasible synchronization technology for end hopping.
基金National Natural Science Foundation of China(No.61271120/F010508)National Science and Technology Support Program(No.2014BAK02BO2,No.2014BAK02BO5)National Science and Technology Major Projects(broadband wireless2015ZX03001011-002)
文摘A measurement method of optical fiber length using timestamp technique is demonstrated. Based on IEEE1588 precise clock synchronization protocol, the principle that time delay asymmetry on two path results in synchronization time deviation is used, and the difference between two-path delays could be deduced by measuring the synchronization time deviation reversely. Then the length of optical fiber on one path could be calculated if that on the other path is known Due to the fact that the path of Sync and Delay_Req message is symmetric, the optical pulse dispersion and the asymmetry of photoelectric detector performance on two paths are averaged by exchanging two optical fibers. The time difference between master and slave clocks is eliminated by sharing the same time base. At last, the lengths of two single-mode optical fibers are measured with the uncertainty of 0. 578 m for 3 227. 722 m and 0. 758 m for 25 491. 522 m, respectively. Thus this method has high precision and long range.
基金supported by National Key R&D Program of China(Grant Nos.2021YF B2700503,2020YF B1005900)supported by the National Natural Science Foundation of China(No.62072249)。
文摘In the data communication system,the real-time information interaction of communication device increases the risk of privacy sensitive data being tam-pered with.Therefore,maintaining data security is one of the most important issues in network data communication.Because the timestamp is the most impor-tant way to authenticate data in information interaction,it is very necessary to pro-vide timestamp service in the data communication system.However,the existing centralized timestamp mechanism is difficult to provide credible timestamp ser-vice,and users can conspire with timestamping servers to forge timestamps.Therefore,this paper designs a distributed timestamp mechanism based on contin-uous verifiable delay functions.It utilizes multiple independent timestamp servers to provide timestamp services in a distributed model and appends the timestamp to the data once the data is generated.Thus,it can prove that the data already exists at a certain time and ensure the accuracy of the timestamp.Moreover,a digital blind signature based on elliptic curve cryptography is utilized to solve the problem of timestamp forgery in timestamp service.Finally,the security ana-lysis of the scheme ensures the data security of data communication system and the concurrency rate of timestamp.The experimental results also show that the scheme greatly improves the efficiency of digital signatures.
基金This research was funded by science and technology project of State Grid JiangSu Electric Power Co.,Ltd.(Research on Key Technologies of power network security digital identity authentication and management and control based on blockchain,Grant No.is J2021021).
文摘The power infrastructure of the power system is massive in size and dispersed throughout the system.Therefore,how to protect the information security in the operation and maintenance of power equipment is a difficult problem.This paper proposes an improved time-stamped blockchain technology biometric fuzzy feature for electrical equipment maintenance.Compared with previous blockchain transactions,the time-stamped fuzzy biometric signature proposed in this paper overcomes the difficulty that the key is easy to be stolen by hackers and can protect the security of information during operation and maintenance.Finally,the effectiveness of the proposed method is verified by experiments.
基金funded by National Natural Science Foundation of China(No.62272347,62072343,and 61802284)National Key Research Development Program of China(No.2019QY(Y)0206).
文摘The power system frequency fluctuations could be captured by digital recordings and extracted to compare with a reference database for forensic timestamp verification.It is known as the Electric Network Frequency(ENF)criterion,enabled by the properties of random fluctuations and intra-grid consistency.In essence,this is a task of matching a short random sequence within a long reference,whose accuracy is mainly concerned with whether this match could be uniquely correct.In this paper,we comprehensively analyze the factors affecting the reliability of ENF matching,including the length of test recording,length of reference,temporal resolution,and Signal-to-Noise Ratio(SNR).For synthetic analysis,we incorporate the first-order AutoRegressive(AR)ENF model and propose an efficient Time-Frequency Domain noisy ENF synthesis method.Then,the reliability analysis schemes for both synthetic and real-world data are respectively proposed.Through a comprehensive study,we quantitatively reveal that while the SNR is an important external factor to determine whether timestamp verification is viable,the length of test recording is the most important inherent factor,followed by the length of reference.However,the temporal resolution has little impact on performance.Finally,a practical workflow of the ENF-based audio timestamp verification system is proposed,incorporating the discovered results.