Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For...Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.展开更多
Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background o...Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network.展开更多
Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and i...Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.展开更多
A novel specific type of worm drive, so-called end face engagement worm gear(EFEWD), is originally presented to minimize or overcome the gear backlash. Different factors, including the three different types, contact...A novel specific type of worm drive, so-called end face engagement worm gear(EFEWD), is originally presented to minimize or overcome the gear backlash. Different factors, including the three different types, contact curves, tooth profile, lubrication angle and the induced normal curvature are taken into account to investigate the meshing characteristics and create the profile of a novel specific type of worm drive through mathematical models and theoretical analysis. The tooth of the worm wheel is very specific with the sine-shaped tooth which is located at the alveolus of the worm and the tooth profile of a worm is generated by the meshing movement of the worm wheel with the sine-shaped tooth, but just the end face of the worm(with three different typical meshing types) is adapted to meshing, and therefore an extraordinary manufacturing methods is used to generate the profile of the end face engagement worm. The research results indicates that the bearing contacts of the generated conjugate hourglass worm gear set are in line contacts, with certain advantages of no-backlash, high precision and high operating efficiency over other gears and gear systems besides the end face engagement worm gear drive may improve bearing contact, reduce the level of transmission errors and lessen the sensitivity to errors of alignment. Also, the end face engagement worm can be easily made with superior meshing and lubrication performance compared with the conventional techniques. In particular, the meshing and lubrication performance of the end face engagement worm gear by using the end face to meshing can be increased over 10% and 7%, respectively. This investigate is expect to provide a new insight on the design of the future no-backlash worm drive for industry.展开更多
To solve the problem for lacking a special mechanical transmission that could provide multiple outputs with high transmission efficiency and good lubrication in the modem industrial, a novel worm gear, named end face ...To solve the problem for lacking a special mechanical transmission that could provide multiple outputs with high transmission efficiency and good lubrication in the modem industrial, a novel worm gear, named end face engagement worm gear, with multiple worm-wheel meshing is proposed for the first time. The essential parameters for the worm gear are optimized to enhance lubrication and meshing properties. Moreover, analysis of variance(ANOVA) is applied to determine the optimum levels and to determine the influence of parameters. The ANOVA results show that the novel end face engagement worm gear with multiple worm wheels provides high lubrication(the lubrication angle is more than 89~) and meshing performance(the induce normal curvature is less than 0.0002 mm '). The interaction between center distance and roller slant distance most strongly influences the lubrication angle(contributed 51.6%), followed by the parameters of center distance(contributed 25.0%), roller slant distance(contributed 16.4%), tooth angle of gear, gear ratio, and roller radius. In addition, roller radius most strongly influences the induced normal curvature(contributed 39.4%), followed by roller slant distance(contributed 15.2%), tooth angle of the gear(contributed 9.0%), center distance, and gear ratio. The proposed worm gear helps to enrich the no-backlash high precision worm drive and the optimal design method can provide a useful reference on performance improvement of other worm gear.展开更多
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in...Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.展开更多
Worm grinding has been applied to manufacture gears to pursue high accuracy and fine surface finish.When the worm used to grind face gears is manufactured with multi-axis computer numerical control(CNC)machining,the m...Worm grinding has been applied to manufacture gears to pursue high accuracy and fine surface finish.When the worm used to grind face gears is manufactured with multi-axis computer numerical control(CNC)machining,the machining accuracy is usually improved by increasing the number of tool paths with more time cost.Differently,this work proposes a generated method to improve the efficiency by dressing the worm surface with only one path,and a closed-loop manufacturing process is applied to ensure the machining accuracy.According to an advanced geometric analysis,the worm surface is practically approximated as a swept surface generated by a planar curve.Meanwhile,this curve is applied as the profile of a dressing wheel,which is used to dress the worm surface.The practical machining is carried out in a CNC machine tool,which was originally used to grind helical gears.Finally,a closed-loop manufacturing process including machining,measurement,and modification is proposed to compensate the machining errors.The proposed method is validated with simulations and practical experiments.展开更多
[ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extrac...[ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extracts of A. fiavum extracted from five polar solvents including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water; leaf dish method was adopted to determine the antifeedant activities of five solvent ex- tracts including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water against cabbage worm, [ Result] Extracts of A. flavum had high contact toxicity against cabbage worm. When the concentration was 100.00 mg/ml, the corrected mortality at 48 h roached 97.24%, and the insec- ticidal activities of five solvent extracts against cabbage worm in sequence were water 〉 n-butanol 〉 ethyl acetate 〉 ether 〉 petroleum ether, the cor- rected mortality of water extract at 48 h was 95.87% ; the antifeedant activities of five solvent extracts in sequence were water 〉 n-butanol 〉 ethyl ac- etate 〉 ether 〉 petroleum ether. [ Conclusion] Extracts of A. flavum had strong contact toxicity and antifeedant activity against cabbage worm, and the active ingredients with contact toxicity and antifeedant activity might be a kind of polar compound.展开更多
Worm and worm gear are modeled under development environment in AutoCAD based on the principle of ordinary cylindrical worm drive. The drawing commands available in AutoCAD are used to develop worm blank and cutter mo...Worm and worm gear are modeled under development environment in AutoCAD based on the principle of ordinary cylindrical worm drive. The drawing commands available in AutoCAD are used to develop worm blank and cutter models. The solid models of worm and worm gear are obtained through the use of the commands, move, rotate and subtract, to simulate the generating cutting movement on the gear cutting machine. Autolisp language is utilized in programming for parametric modeling of worm and worm gear. The developed program can automatically draw worm and worm gear when users load the wlwg program, input the modulus and the number of threads, handedness, and other parameters. The operation is simple and accurate, providing potentials to speed up product design process and improve efficiency.展开更多
Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation a...Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance.展开更多
With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as ...With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.展开更多
The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering maliciou...The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW.展开更多
In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange termina...In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead.展开更多
基金supported by the Natural Science Foundation under Grant No.61962009Major Scientific and Technological Special Project of Guizhou Province under Grant No.20183001Foundation of Guizhou Provincial Key Laboratory of Public Big Data under Grant No.2018BDKFJJ003,2018BDKFJJ005 and 2019BDKFJJ009.
文摘Wireless Sensor Network(WSN)is a distributed sensor network composed a large number of nodes with low cost,low performance and self-management.The special structure of WSN brings both convenience and vulnerability.For example,a malicious participant can launch attacks by capturing a physical device.Therefore,node authentication that can resist malicious attacks is very important to network security.Recently,blockchain technology has shown the potential to enhance the security of the Internet of Things(IoT).In this paper,we propose a Blockchain-empowered Authentication Scheme(BAS)for WSN.In our scheme,all nodes are managed by utilizing the identity information stored on the blockchain.Besides,the simulation experiment about worm detection is executed on BAS,and the security is evaluated from detection and infection rate.The experiment results indicate that the proposed scheme can effectively inhibit the spread and infection of worms in the network.
基金supported by the National Natural Science Foundation of China under Grant No. 60873075
文摘Greedy propagation policy for unstructured P2P worms employs the neighboring node list of each node in peer-to-peer (P2P) network to speed up the propagation of P2P worms. After describing the technique background of P2P worms, the algorithm of greedy propagation is addressed. Simulating design for this novel propagation policy is also described. Then, the effects of the greedy propagation policy on spreading speed, convergence speed, and attacking traffic in static P2P worms are simulated and discussed. The primary experimental results show that the greedy propagation is harmful and can bring severe damages to P2P network.
基金supported by Fundamental Research Funds of the Central Universities under Grant no. N120317001 and N100704001Program for New Century Excellent Talents in University (NCET13-0113)+1 种基金Natural Science Foundation of Liaoning Province of China under Grant no. 201202059Program for Liaoning Excellent Talents in University under LR2013011
文摘Along with the rapid development of social networks, social network worms have constituted one of the major internet security problems. The root of worm is the inevitable software vulnerability during the design and implementation process of software. So it is hard to completely avoid worms in the existing software engineering systems. Due to lots of bandwidth consumption, the patch cannot be transmitted simultaneously by the network administrator to all hosts. This paper studies how to prevent the propagation of social network worms through the immunization of key nodes. Unlike existing containment models for worm propagation, a novel immunization strategy is proposed based on network vertex influence. The strategy selects the critical vertices in the whole network. Then the immunization is applied on the selected vertices to achieve the maximal effect of worm containment with minimal cost. Different algorithms are implemented to select vertices. Simulation experiments are presented to analyze and evaluate the performance of different algorithms.
基金Supported by National Natural Science Foundation of China(Grant No.51305356)Spring Sunshine Plan of Ministry of Education of China(Grant No.14202505)Talent Introduction of Xihua University,China(Grant No.Z1220217)
文摘A novel specific type of worm drive, so-called end face engagement worm gear(EFEWD), is originally presented to minimize or overcome the gear backlash. Different factors, including the three different types, contact curves, tooth profile, lubrication angle and the induced normal curvature are taken into account to investigate the meshing characteristics and create the profile of a novel specific type of worm drive through mathematical models and theoretical analysis. The tooth of the worm wheel is very specific with the sine-shaped tooth which is located at the alveolus of the worm and the tooth profile of a worm is generated by the meshing movement of the worm wheel with the sine-shaped tooth, but just the end face of the worm(with three different typical meshing types) is adapted to meshing, and therefore an extraordinary manufacturing methods is used to generate the profile of the end face engagement worm. The research results indicates that the bearing contacts of the generated conjugate hourglass worm gear set are in line contacts, with certain advantages of no-backlash, high precision and high operating efficiency over other gears and gear systems besides the end face engagement worm gear drive may improve bearing contact, reduce the level of transmission errors and lessen the sensitivity to errors of alignment. Also, the end face engagement worm can be easily made with superior meshing and lubrication performance compared with the conventional techniques. In particular, the meshing and lubrication performance of the end face engagement worm gear by using the end face to meshing can be increased over 10% and 7%, respectively. This investigate is expect to provide a new insight on the design of the future no-backlash worm drive for industry.
基金Supported by National Natural Science Foundation of China(Grant Nos.51305356,51575456)Spring Sunshine Plan of Ministry of Education of China(Grant No.14202505)Talent Introduction of Xihua University,China(Grant No.Z1220217)
文摘To solve the problem for lacking a special mechanical transmission that could provide multiple outputs with high transmission efficiency and good lubrication in the modem industrial, a novel worm gear, named end face engagement worm gear, with multiple worm-wheel meshing is proposed for the first time. The essential parameters for the worm gear are optimized to enhance lubrication and meshing properties. Moreover, analysis of variance(ANOVA) is applied to determine the optimum levels and to determine the influence of parameters. The ANOVA results show that the novel end face engagement worm gear with multiple worm wheels provides high lubrication(the lubrication angle is more than 89~) and meshing performance(the induce normal curvature is less than 0.0002 mm '). The interaction between center distance and roller slant distance most strongly influences the lubrication angle(contributed 51.6%), followed by the parameters of center distance(contributed 25.0%), roller slant distance(contributed 16.4%), tooth angle of gear, gear ratio, and roller radius. In addition, roller radius most strongly influences the induced normal curvature(contributed 39.4%), followed by roller slant distance(contributed 15.2%), tooth angle of the gear(contributed 9.0%), center distance, and gear ratio. The proposed worm gear helps to enrich the no-backlash high precision worm drive and the optimal design method can provide a useful reference on performance improvement of other worm gear.
基金Supported by the National Natural Science Foundation of China (60573136)
文摘Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation.
基金Project(2019 YFB 2004700)supported by the National Key R&D Project of ChinaProject(HTL-O-19 K 02)supported by National Key Laboratory of Science and Technology on Helicopter Transmission,Nanjing University of Aeronautics and Astronautics,China。
文摘Worm grinding has been applied to manufacture gears to pursue high accuracy and fine surface finish.When the worm used to grind face gears is manufactured with multi-axis computer numerical control(CNC)machining,the machining accuracy is usually improved by increasing the number of tool paths with more time cost.Differently,this work proposes a generated method to improve the efficiency by dressing the worm surface with only one path,and a closed-loop manufacturing process is applied to ensure the machining accuracy.According to an advanced geometric analysis,the worm surface is practically approximated as a swept surface generated by a planar curve.Meanwhile,this curve is applied as the profile of a dressing wheel,which is used to dress the worm surface.The practical machining is carried out in a CNC machine tool,which was originally used to grind helical gears.Finally,a closed-loop manufacturing process including machining,measurement,and modification is proposed to compensate the machining errors.The proposed method is validated with simulations and practical experiments.
基金Supported by Scientific and Technological Projects of Ningxia Hui Autonomous Region(2008220)~~
文摘[ Objective] The paper was to study the contact toxicity and antifeedant activity of Aconitum flavum against cabbage worm. [ Method ] In- sect dipping method was adopted to determine the contact toxicity of the extracts of A. fiavum extracted from five polar solvents including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water; leaf dish method was adopted to determine the antifeedant activities of five solvent ex- tracts including ethanol, petroleum ether, ether, ethyl acetate, n-butanol and water against cabbage worm, [ Result] Extracts of A. flavum had high contact toxicity against cabbage worm. When the concentration was 100.00 mg/ml, the corrected mortality at 48 h roached 97.24%, and the insec- ticidal activities of five solvent extracts against cabbage worm in sequence were water 〉 n-butanol 〉 ethyl acetate 〉 ether 〉 petroleum ether, the cor- rected mortality of water extract at 48 h was 95.87% ; the antifeedant activities of five solvent extracts in sequence were water 〉 n-butanol 〉 ethyl ac- etate 〉 ether 〉 petroleum ether. [ Conclusion] Extracts of A. flavum had strong contact toxicity and antifeedant activity against cabbage worm, and the active ingredients with contact toxicity and antifeedant activity might be a kind of polar compound.
文摘Worm and worm gear are modeled under development environment in AutoCAD based on the principle of ordinary cylindrical worm drive. The drawing commands available in AutoCAD are used to develop worm blank and cutter models. The solid models of worm and worm gear are obtained through the use of the commands, move, rotate and subtract, to simulate the generating cutting movement on the gear cutting machine. Autolisp language is utilized in programming for parametric modeling of worm and worm gear. The developed program can automatically draw worm and worm gear when users load the wlwg program, input the modulus and the number of threads, handedness, and other parameters. The operation is simple and accurate, providing potentials to speed up product design process and improve efficiency.
基金Supported by the National Natural Science Foun-dation of China (60473073)
文摘Various kinds of active worms have been plunging into the network flows, which make the Internet security problem more serious. Our research on a potential propagation approach of active worms, P2P-based propagation approach, is given in this paper. To measure the propagating performance of our approach, the SEI (Susceptible-Exposed-Infected) propagation model is presented. It proves that with the idea of pure P2P architecture, worms can be hidden in the early stage of propagation, and then infect most of the hosts in a shorter period. By comparing our SEI propagation model with the Simple Epidemic Model, we observe that the size of a worm is a significant parameter which can affect the propagating performance. When the size of the worm becomes large, our approach can still show an excellent propagating performance.
基金supported by the National Natural Science Foundation of China under Grant No. 60873075
文摘With the development and the application of many popular peer-to-peer (P2P) systems such as eMule and BitTorrent, worms probably employ the features of these P2P networks to put them at risk. Some features, such as the local routing table and the application routing mechanism, are helpful to quickly distribute the P2P worms into the networks. This paper aims to give a comprehensive survey of P2P worms. The definition and the classification of P2P worms are discussed firstly. Then, the research and development of P2P worms, including experimental analysis, propagation modeling, and defensive approaches, are addressed and analyzed in detail.
基金Project(61070194) supported by the National Natural Science Foundation of ChinaProject([2009]1886) supported by the Information Security Industrialization Fund from NDRC of China in 2009+1 种基金Project(CJ[2010]341) supported by the Major Achievements Transfer Projects of MOF and MIIT of China in 2010Project(2011FJ2003) supported by the Natural Science Foundation of Hunan Province, China
文摘The gradual hybrid anti-worm (GHAW) was presented. percentage of vulnerable hosts present in the network. For GHAW It changed its confrontation scheme in real time according to the its process of countering malicious internet worms was modeled. The performance of GHAW on two factors was also estimated: confronting validity against worms and consumption of network resources. Factors governing its performance, specifically the transformation threshold and the transformation rate, were analyzed. The simulation experiments show that GHAW has dynamical adaptability to changes of network conditions and offers the same level of effectiveness on confronting internet worms as the divide-and-rule hybrid anti-worm, with significantly less cost to network resources. The experiments also indicate that the transformation threshold is the key factor affecting the performance of GHAW.
基金Project(61005008) supported by the National Natural Science Foundation of ChinaProject(JI300D004) supported by the COSTIND Application Foundation of China
文摘In order to take precaution and cure against intemet of vehicles (IOV) worm propagation in expressway, the IOV worm propagation and its corresponding anti-worm strategy were studied in expressway interchange terminal. According to omnirange driving in expressway interchange terminal and vehicular mobile communication environment, an IOV worm propagation model is constructed; and then according to the dynamic propagation law and destructiveness of IOV worm in this environment, a novel hybrid anti-worm strategy for confrontation is designed. This worm propagation model can factually simulates the IOV worm propagation in this interchange terminal environment; and this hybrid anti-worm strategy can effectively control IOV worm propagation in the environment, moreover, it can reduce the influence on network resource overhead.