The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initiall...The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.展开更多
As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure ...As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.展开更多
A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is adde...A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is added to the operation system kerneland twooperation interface modes are provided for the sake of self-protection. The security kernel isdivided into two parts and trusted mechanism Is separated from security functionality. Ihe TCBmodule implements the trusted mechanism such as measurement and attestation, while the othercomponents of security kernel provide security functionality based on these mechanisms. Thisarchitecture takes full advantage of functions provided by trusted platform and clearly defines thesecurity perimeter of TCB so as to assure stlf-securily from architcetmal vision. We also presentfunction description of TCB and discuss the strengths and limitations comparing with other relatedresearches.展开更多
Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networ...Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.展开更多
The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members' participation in management and investment, and preclude the generatio...The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members' participation in management and investment, and preclude the generation of members' will and behavior of breach of contract so as to guarantee the stable development of farmers' cooperatives; the decreasing degree of trust can put sand in the wheels of farmers' cooperatives. Based on these, we conduct survey of questionnaire on 197 rural households of 10 farmers' cooperatives in Yanliang, Xi'an, Lintong and Yanglin . By analyzing the generation of trust mechanism and survey data, some suggestions are put forward as follows: promote inner communication; remodel the trust culture of informal system; hew to contractual system; perfect the system of motivation and punishment; establish the system of equal property right and investment; implement management and supervision by job rotation so as to promote the trust degree among the members of farmers' cooperatives and keep the benign recycle of "trust-cooperation".展开更多
Given the booming of internet usage in its domain, Chinese on-line shopping business is not growing proportionately. The absence of a market mechanism based on trust among suppliers and customers is to blame, although...Given the booming of internet usage in its domain, Chinese on-line shopping business is not growing proportionately. The absence of a market mechanism based on trust among suppliers and customers is to blame, although other factors as well holding the responsibility. Beginning with an introduction to the theory of "lemons", this paper reviews the status quo of trust in the Chinese cyber market, from the perspective of legislation, regulation and institution. It also prescribes several possible micro-solutions.展开更多
Satellite constellations are promising in enabling the global Internet.However,the increasing constellation size also complicates tracking,telemetry and command(TT&C)systems.Traditional groundbased and space-based...Satellite constellations are promising in enabling the global Internet.However,the increasing constellation size also complicates tracking,telemetry and command(TT&C)systems.Traditional groundbased and space-based approaches have encountered significant obstacles due to,e.g.,the limited satellite visible arc and long transmission delay.Considering the fast development of intersatellite communications,synergy among multiple connected satellites can be exploited to facilitate TT&C system designs.This leads to networked TT&C,which requires much less predeployed infrastructures and even performs better than traditional TT&C systems.In this paper,we elaborate system characteristics of networked TT&C compared with traditional ground-based and spacebased TT&C,and propose the unique security challenges and opportunities for networked TT&C,which includes secure routing and trust mechanisms.Furthermore,since networked TT&C is a novel scenario with few relevant researches,we first investigate the current researches on secure routing and trust mechanisms for traditional terrestrial and satellite networks,and then accordingly deliver our security perspectives considering the system characteristics and security requirements of networked TT&C.展开更多
As one of the ways to localize foods,community supported agriculture can strengthen food safety and should be reasonably guided and developed.Based on the analysis of the spatial layout of the community supported agri...As one of the ways to localize foods,community supported agriculture can strengthen food safety and should be reasonably guided and developed.Based on the analysis of the spatial layout of the community supported agriculture organizations in Beijing,this paper described the development framework and course of community supported agriculture in Beijing.Combining 3 differentiated cases with the consumer's participation in community supported agriculture and the trust mechanism,it was found that the drive type has a very significant impact on the characteristics of these organizations.展开更多
Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UA...Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.展开更多
As cross-chain technologies enable interactions among different blockchains(hereinafter“chains”),multi-chain consensus is becoming increasingly important in blockchain networks.However,more attention has been paid t...As cross-chain technologies enable interactions among different blockchains(hereinafter“chains”),multi-chain consensus is becoming increasingly important in blockchain networks.However,more attention has been paid to single-chain consensus schemes.Multi-chain consensus schemes with trusted miner participation have not been considered,thus offering opportunities for malicious users to launch diverse miner behavior(DMB)attacks on different chains.DMB attackers can be friendly in the consensus process on some chains,called mask chains,to enhance their trust value,while on others,called kill chains,they engage in destructive behaviors on the network.In this paper,we propose a multi-chain consensus scheme named Proof-of-DiscTrust(PoDT)to defend against DMB attacks.The idea of distinctive trust(DiscTrust)is introduced to evaluate the trust value of each user across different chains.The trustworthiness of a user is split into local and global trust values.A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain.Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners,chain miners,and chain miner leaders,separately.Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.展开更多
The Strategic and Economic Dialogue facilitates better understanding between the United States and China After a year of ups and downs in the Sino-American relations hip, the second round of the Strategic and Economi...The Strategic and Economic Dialogue facilitates better understanding between the United States and China After a year of ups and downs in the Sino-American relations hip, the second round of the Strategic and Economic Dialogue (S&ED) was held in Beijing from May 24-25.展开更多
基金supported by the National Key Research and Development Program of China(grant number 2019YFE0123600)。
文摘The power Internet of Things(IoT)is a significant trend in technology and a requirement for national strategic development.With the deepening digital transformation of the power grid,China’s power system has initially built a power IoT architecture comprising a perception,network,and platform application layer.However,owing to the structural complexity of the power system,the construction of the power IoT continues to face problems such as complex access management of massive heterogeneous equipment,diverse IoT protocol access methods,high concurrency of network communications,and weak data security protection.To address these issues,this study optimizes the existing architecture of the power IoT and designs an integrated management framework for the access of multi-source heterogeneous data in the power IoT,comprising cloud,pipe,edge,and terminal parts.It further reviews and analyzes the key technologies involved in the power IoT,such as the unified management of the physical model,high concurrent access,multi-protocol access,multi-source heterogeneous data storage management,and data security control,to provide a more flexible,efficient,secure,and easy-to-use solution for multi-source heterogeneous data access in the power IoT.
基金ACKNOWLEDGEMENT This paper is supported by the Opening Project of State Key Laboratory for Novel Software Technology of Nanjing University, China (Grant No.KFKT2012B25) and National Science Foundation of China (Grant No.61303263).
文摘As a new computing mode,cloud computing can provide users with virtualized and scalable web services,which faced with serious security challenges,however.Access control is one of the most important measures to ensure the security of cloud computing.But applying traditional access control model into the Cloud directly could not solve the uncertainty and vulnerability caused by the open conditions of cloud computing.In cloud computing environment,only when the security and reliability of both interaction parties are ensured,data security can be effectively guaranteed during interactions between users and the Cloud.Therefore,building a mutual trust relationship between users and cloud platform is the key to implement new kinds of access control method in cloud computing environment.Combining with Trust Management(TM),a mutual trust based access control(MTBAC) model is proposed in this paper.MTBAC model take both user's behavior trust and cloud services node's credibility into consideration.Trust relationships between users and cloud service nodes are established by mutual trust mechanism.Security problems of access control are solved by implementing MTBAC model into cloud computing environment.Simulation experiments show that MTBAC model can guarantee the interaction between users and cloud service nodes.
基金Supported by the National Basic Research Programof China (G1999035801)
文摘A security kernel architeclrne built on trusted computing platform in thelight of thinking about trusted computing is presented According to this architecture, a newsecurity module TCB (Trusted Computing Base) is added to the operation system kerneland twooperation interface modes are provided for the sake of self-protection. The security kernel isdivided into two parts and trusted mechanism Is separated from security functionality. Ihe TCBmodule implements the trusted mechanism such as measurement and attestation, while the othercomponents of security kernel provide security functionality based on these mechanisms. Thisarchitecture takes full advantage of functions provided by trusted platform and clearly defines thesecurity perimeter of TCB so as to assure stlf-securily from architcetmal vision. We also presentfunction description of TCB and discuss the strengths and limitations comparing with other relatedresearches.
基金Supported by the National High Technology Research and Development Program (No. 2009AA011504)
文摘Cognitive Wireless Mesh Networks(CWMN) is a novel wireless network which combines the advantage of Cognitive Radio(CR) and wireless mesh networks.CWMN can realize seamless in-tegration of heterogeneous wireless networks and achieve better radio resource utilization.However,it is particularly vulnerable due to its features of open medium,dynamic spectrum,dynamic topology,and multi-top routing,etc..Being a dynamic positive security strategy,intrusion detection can provide powerful safeguard to CWMN.In this paper,we introduce trust mechanism into CWMN with intrusion detection and present a trust establishment model based on intrusion detection.Node trust degree and the trust degree of data transmission channels between nodes are defined and an algorithm of calcu-lating trust degree is given based on distributed detection of attack to networks.A channel assignment and routing scheme is proposed,in which selects the trusted nodes and allocates data channel with high trust degree for the transmission between neighbor nodes to establish a trusted route.Simulation re-sults indicate that the scheme can vary channel allocation and routing dynamically according to network security state so as to avoid suspect nodes and unsafe channels,and improve the packet safe delivery fraction effectively.
基金Supported by Youth Project of National Social Science Program(10CJY043)Decision-making and Bid Inviting Subject of Government of Henan Province in 2010 (B600)
文摘The thesis introduces the generation and mechanism of action of trust during cooperation, which indicates that trust can activate the members' participation in management and investment, and preclude the generation of members' will and behavior of breach of contract so as to guarantee the stable development of farmers' cooperatives; the decreasing degree of trust can put sand in the wheels of farmers' cooperatives. Based on these, we conduct survey of questionnaire on 197 rural households of 10 farmers' cooperatives in Yanliang, Xi'an, Lintong and Yanglin . By analyzing the generation of trust mechanism and survey data, some suggestions are put forward as follows: promote inner communication; remodel the trust culture of informal system; hew to contractual system; perfect the system of motivation and punishment; establish the system of equal property right and investment; implement management and supervision by job rotation so as to promote the trust degree among the members of farmers' cooperatives and keep the benign recycle of "trust-cooperation".
文摘Given the booming of internet usage in its domain, Chinese on-line shopping business is not growing proportionately. The absence of a market mechanism based on trust among suppliers and customers is to blame, although other factors as well holding the responsibility. Beginning with an introduction to the theory of "lemons", this paper reviews the status quo of trust in the Chinese cyber market, from the perspective of legislation, regulation and institution. It also prescribes several possible micro-solutions.
基金supported by the National Natural Science Foundation of China under Grant 61971261/62131012Technology Project of the State Grid Corporation of China under Grant 5400202255158A-1-1-ZN。
文摘Satellite constellations are promising in enabling the global Internet.However,the increasing constellation size also complicates tracking,telemetry and command(TT&C)systems.Traditional groundbased and space-based approaches have encountered significant obstacles due to,e.g.,the limited satellite visible arc and long transmission delay.Considering the fast development of intersatellite communications,synergy among multiple connected satellites can be exploited to facilitate TT&C system designs.This leads to networked TT&C,which requires much less predeployed infrastructures and even performs better than traditional TT&C systems.In this paper,we elaborate system characteristics of networked TT&C compared with traditional ground-based and spacebased TT&C,and propose the unique security challenges and opportunities for networked TT&C,which includes secure routing and trust mechanisms.Furthermore,since networked TT&C is a novel scenario with few relevant researches,we first investigate the current researches on secure routing and trust mechanisms for traditional terrestrial and satellite networks,and then accordingly deliver our security perspectives considering the system characteristics and security requirements of networked TT&C.
文摘As one of the ways to localize foods,community supported agriculture can strengthen food safety and should be reasonably guided and developed.Based on the analysis of the spatial layout of the community supported agriculture organizations in Beijing,this paper described the development framework and course of community supported agriculture in Beijing.Combining 3 differentiated cases with the consumer's participation in community supported agriculture and the trust mechanism,it was found that the drive type has a very significant impact on the characteristics of these organizations.
基金Supported by the National Natural Science Foundation of China under Grant No.62171310the Marine Defense Innovation Fund JJ-2020-701-09Lanzhou Jiaotong University-Tianjin University Co-Funding under Grant No.2022064。
文摘Cooperative jamming(CJ)is one of the important methods to solve security problems of underwater acoustic sensor networks(UASNs).In this paper,we propose a Cooperative Jamming Scheme based on Node Authentication for UASNs to improve the effect of CJ by selecting suitable jamming source for found illegal nodes.In the node authentication,all nodes will be identified by their trust value(TV).TV is calculated according to three types of evidence:channel-based trust evidence,behavior-based trust evidence and energy-based trust evidence.Besides,to deal with cases where legal nodes may be suspected,the historical TV and trust redemption will be considered when calculating TV.In cooperative jamming,according to the link quality,several nodes are selected to jam illegal nodes.Both simulation and field experiment show that the proposed scheme can accurately find the illegal nodes in the time-vary channel and improve the security of the network.
基金supported by the Natural Science Basic Research Program of Shaanxi Province,China(No.2023-JC-YB-561)。
文摘As cross-chain technologies enable interactions among different blockchains(hereinafter“chains”),multi-chain consensus is becoming increasingly important in blockchain networks.However,more attention has been paid to single-chain consensus schemes.Multi-chain consensus schemes with trusted miner participation have not been considered,thus offering opportunities for malicious users to launch diverse miner behavior(DMB)attacks on different chains.DMB attackers can be friendly in the consensus process on some chains,called mask chains,to enhance their trust value,while on others,called kill chains,they engage in destructive behaviors on the network.In this paper,we propose a multi-chain consensus scheme named Proof-of-DiscTrust(PoDT)to defend against DMB attacks.The idea of distinctive trust(DiscTrust)is introduced to evaluate the trust value of each user across different chains.The trustworthiness of a user is split into local and global trust values.A dynamic behavior prediction scheme is designed to enforce DiscTrust to prevent an intensive DMB attacker from maintaining strong trust by alternately creating true or false blocks on the kill chain.Three trusted miner selection algorithms for multi-chain environments can be implemented to select network miners,chain miners,and chain miner leaders,separately.Simulation results show that PoDT is secure against DMB attacks and more effective than traditional consensus schemes in multi-chain environments.
文摘The Strategic and Economic Dialogue facilitates better understanding between the United States and China After a year of ups and downs in the Sino-American relations hip, the second round of the Strategic and Economic Dialogue (S&ED) was held in Beijing from May 24-25.