首页 > 最新文献

2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing最新文献

英文 中文
Workflow and Role Based Access Control Model for Cloud Manufacturing 基于工作流和角色的云制造访问控制模型
Xianhui Lin, Xiaomei Zhang
Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the "Software as a Service" concept to "Manufacture as a Service", sharing the "manufacturing resources and manufacturing capability". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.
云制造采用了一些先进的问题,例如云计算的思想。将“软件即服务”的理念延伸到“制造即服务”,共享“制造资源和制造能力”。访问控制通过监控用户的行为,有效防止非法操作。本文提出了一种云制造环境的访问控制模型WRBAC。考虑到云制造的体系结构和特点,该模型采用分层结构实现系统级访问控制。该模型以ABAC、RBAC和TBAC为基础,引入工作流实现过程自动化。在任务和业务的映射过程中,访问权限由分布式策略条件控制。为了加强跨域合作访问保护,本文利用属性和镜像角色对授权机制进行了细化。WRBAC可以有效保障云制造跨域环境的安全性。该模型具有较强的适应性和针对性。
{"title":"Workflow and Role Based Access Control Model for Cloud Manufacturing","authors":"Xianhui Lin, Xiaomei Zhang","doi":"10.1109/DASC.2013.39","DOIUrl":"https://doi.org/10.1109/DASC.2013.39","url":null,"abstract":"Cloud manufacturing employs some progressive issues, for example, the ideas of cloud computing. It extends the \"Software as a Service\" concept to \"Manufacture as a Service\", sharing the \"manufacturing resources and manufacturing capability\". Access control prevents illegal operations effectively by monitoring the user's behavior. This paper proposes an access control model for the cloud manufacturing environment that called WRBAC. Considering the architectures and characteristics of cloud manufacturing, the model uses layered structure to achieve the system-level access control. Based on ABAC, RBAC and TBAC, the model introduces workflow to achieve the process automation. During the mapping between tasks and services, access permission is controlled by distributed policy conditions. In order to strengthen the cross-domain cooperation access protection, this paper refines the authorization mechanism by using attributes and mirror roles. WRBAC can effectively guarantee the security of cloud manufacturing cross-domain environment. The model has strong adaptability and pertinence.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127063871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis 基于指针分析的C/ c++程序内存漏洞动态检测方法
Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao
Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.
针对C/ c++程序内存漏洞动态检测中存在的内存消耗大、执行效率低的问题,提出了一种动态检测方法ISC。ISC使用指针分析技术对Safe-C进行了改进。首先,ISC定义了一个简单有效的胖指针表示,而不是safe - c中的安全指针。此外,ISC采用基于统一的单级流静态指针分析算法。这种标识减少了需要转换为胖指针的指针的数量。然后在程序运行过程中,ISC通过不断检查fat指针的属性来检测内存漏洞。实验结果表明,ISC可以检测到缓冲区溢出和悬空指针等内存漏洞。与Safe-C相比,ISC大大降低了内存消耗,并略微提高了执行效率。
{"title":"A Dynamic Detection Method to C/C++ Programs Memory Vulnerabilities Based on Pointer Analysis","authors":"Rui Ma, Lingkui Chen, Changzhen Hu, Jingfeng Xue, Xiaolin Zhao","doi":"10.1109/DASC.2013.37","DOIUrl":"https://doi.org/10.1109/DASC.2013.37","url":null,"abstract":"Aiming at the problem of higher memory consumption and lower execution efficiency during the dynamic detecting to C/C++ programs memory vulnerabilities, this paper presents a dynamic detection method called ISC. The ISC improves the Safe-C using pointer analysis technology. Firstly, the ISC defines a simple and efficient fat pointer representation instead of the safe pointer in the Safe-C. Furthermore, the ISC uses the unification-based analysis algorithm with one level flow static pointer. This identification reduces the number of pointers that need to be converted to fat pointers. Then in the process of program running, the ISC detects memory vulnerabilities through constantly inspecting the attributes of fat pointers. Experimental results indicate that the ISC could detect memory vulnerabilities such as buffer overflows and dangling pointers. Comparing with the Safe-C, the ISC dramatically reduces the memory consumption and lightly improves the execution efficiency.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124700303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Research of Motion Capture Technology Based on Inertial Measurement 基于惯性测量的运动捕捉技术研究
Bo Feng, Xianggang Zhang, Hui-yuan Zhao
The motion capture technologies have been widely used in the following areas: human movement science, human-computer interaction and control, medical analysis, film, game production, and etc. This paper presented a motion capture system based on inertial sensors. The system is mainly composed of the inertial sensor unit and real-time monitoring unit on PC. Meanwhile, Sensor units exchange data with PC through BSN (body sensor network). One sensor measurement unit contains a three-axis gyroscope, a three-axis accelerometer, a three-axis magnetometer and a network communication unit. The inertial sensor units are installed on the different parts of body. In the system, the inertial sensor data are collected, and then adaptive Kalman Filter algorithm is used to estimate the body gesture. The Experiments show that this way have some advantages such as: high precision, dynamic, and almost no drift. Furthermore, the data can be changed smoothly.
动作捕捉技术已广泛应用于人体运动科学、人机交互与控制、医学分析、电影、游戏制作等领域。提出了一种基于惯性传感器的运动捕捉系统。该系统主要由惯性传感器单元和PC上的实时监控单元组成。同时,传感器单元通过BSN(身体传感器网络)与PC机交换数据。一个传感器测量单元包含一个三轴陀螺仪、一个三轴加速度计、一个三轴磁强计和一个网络通信单元。惯性传感器单元安装在车身的不同部位。在该系统中,首先采集惯性传感器数据,然后采用自适应卡尔曼滤波算法对人体手势进行估计。实验表明,该方法具有精度高、动态、几乎无漂移等优点。此外,数据可以平滑地更改。
{"title":"The Research of Motion Capture Technology Based on Inertial Measurement","authors":"Bo Feng, Xianggang Zhang, Hui-yuan Zhao","doi":"10.1109/DASC.2013.69","DOIUrl":"https://doi.org/10.1109/DASC.2013.69","url":null,"abstract":"The motion capture technologies have been widely used in the following areas: human movement science, human-computer interaction and control, medical analysis, film, game production, and etc. This paper presented a motion capture system based on inertial sensors. The system is mainly composed of the inertial sensor unit and real-time monitoring unit on PC. Meanwhile, Sensor units exchange data with PC through BSN (body sensor network). One sensor measurement unit contains a three-axis gyroscope, a three-axis accelerometer, a three-axis magnetometer and a network communication unit. The inertial sensor units are installed on the different parts of body. In the system, the inertial sensor data are collected, and then adaptive Kalman Filter algorithm is used to estimate the body gesture. The Experiments show that this way have some advantages such as: high precision, dynamic, and almost no drift. Furthermore, the data can be changed smoothly.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131233072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Moving Object's Detect in a Monocular Moving Camera 单目运动摄像机中运动物体的检测
Ye-gang Chen, Xiao-rong Diao
Recently, there has been increasing interest in using mobile robots within spaces where humans reside, and safe navigation by effective sensing becomes an important issue. In this paper, we describe a method to detect moving objects that exist in front of an autonomously navigating robot by analyzing images of a monocular color camera mounted on the robot. In particular, detecting humans who walk in a direction opposite to the robot's motion is studied because this increases the danger of collision between the pedestrians and the robot. Although moving object detection and obstacle avoidance have been actively studied in the fields of computer vision and intelligent robotics, respectively, analyzing the images of a moving camera is still challenging. One method presented in this paper is based on comparing the current image and a past image in order to find moving objects in the scene. Assuming that the speed of the robot is known, a correspondence between a certain part of the current image and a matching part of a past image is established. Approaching objects can then be detected for a case in which the degree of mismatch between the two corresponding image parts is high. Another method we employ is the detection of human faces. Since a human face has unique features in color and shape, we can search faces in images in order to detect approaching humans. We propose a fast and simple masking method for face detection in a small search region specified from appearance-based foot detection. These two proposed methods were combined to effectively find approaching humans in our experiments. We could get promising test results.
近年来,人们对在人类居住的空间内使用移动机器人越来越感兴趣,通过有效的传感来实现安全导航成为一个重要问题。在本文中,我们描述了一种通过分析安装在机器人上的单目彩色摄像机的图像来检测自主导航机器人前方存在的运动物体的方法。特别是,检测行走方向与机器人运动方向相反的人类,因为这增加了行人与机器人碰撞的危险。尽管运动目标检测和避障在计算机视觉和智能机器人领域已经得到了积极的研究,但分析运动摄像机的图像仍然是一个挑战。本文提出的一种方法是通过对比当前图像和过去图像来发现场景中的运动物体。假设机器人的速度已知,则建立当前图像的某一部分与过去图像的匹配部分之间的对应关系。然后,在两个相应图像部分之间的不匹配程度很高的情况下,可以检测到接近的物体。我们采用的另一种方法是人脸检测。由于人脸在颜色和形状上具有独特的特征,我们可以在图像中搜索人脸,以检测接近的人类。我们提出了一种快速、简单的掩蔽方法,用于在基于外观的足部检测指定的小搜索区域内进行人脸检测。在我们的实验中,将这两种方法结合起来,有效地发现了接近的人。我们可以得到有希望的测试结果。
{"title":"Moving Object's Detect in a Monocular Moving Camera","authors":"Ye-gang Chen, Xiao-rong Diao","doi":"10.1109/DASC.2013.96","DOIUrl":"https://doi.org/10.1109/DASC.2013.96","url":null,"abstract":"Recently, there has been increasing interest in using mobile robots within spaces where humans reside, and safe navigation by effective sensing becomes an important issue. In this paper, we describe a method to detect moving objects that exist in front of an autonomously navigating robot by analyzing images of a monocular color camera mounted on the robot. In particular, detecting humans who walk in a direction opposite to the robot's motion is studied because this increases the danger of collision between the pedestrians and the robot. Although moving object detection and obstacle avoidance have been actively studied in the fields of computer vision and intelligent robotics, respectively, analyzing the images of a moving camera is still challenging. One method presented in this paper is based on comparing the current image and a past image in order to find moving objects in the scene. Assuming that the speed of the robot is known, a correspondence between a certain part of the current image and a matching part of a past image is established. Approaching objects can then be detected for a case in which the degree of mismatch between the two corresponding image parts is high. Another method we employ is the detection of human faces. Since a human face has unique features in color and shape, we can search faces in images in order to detect approaching humans. We propose a fast and simple masking method for face detection in a small search region specified from appearance-based foot detection. These two proposed methods were combined to effectively find approaching humans in our experiments. We could get promising test results.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116118370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Clock Based Framework for Specifying and Modeling the Time Constraints of Cyber Physical Systems 基于时钟的网络物理系统时间约束描述与建模框架
Bingqing Xu, Lichen Zhang
Though there is still a heated discussion on what is cyber-physical systems, CPS is complex system which combines continuous dynamics and discrete dynamics. Among all the unsolved problems, time constraints are critical issues for CPS especially the time-security issues. The interaction of continuous and discrete dynamics in CPS must be specified correctly due to this reason. Unfortunately, the existed methods for modeling CPS can't fullfill the requirements. Clock Theory, which is proposed by Jifeng He, can be used to specify the time constraints for dynamics of CPS. In this paper, we introduced Clock Theory and proposed case studies for specifying and modeling the time constraints of CPS with Clock Theory.
虽然目前关于什么是信息物理系统的讨论还很激烈,但CPS是一个集连续动力学和离散动力学于一体的复杂系统。在所有尚未解决的问题中,时间约束是CPS面临的关键问题,尤其是时间安全问题。因此,必须正确规定连续动力学和离散动力学在CPS中的相互作用。遗憾的是,现有的CPS建模方法不能满足需求。何继峰提出的时钟理论可以用来确定CPS动力学的时间约束。在本文中,我们介绍了时钟理论,并提出了用时钟理论来指定和建模CPS时间约束的案例研究。
{"title":"A Clock Based Framework for Specifying and Modeling the Time Constraints of Cyber Physical Systems","authors":"Bingqing Xu, Lichen Zhang","doi":"10.1109/DASC.2013.77","DOIUrl":"https://doi.org/10.1109/DASC.2013.77","url":null,"abstract":"Though there is still a heated discussion on what is cyber-physical systems, CPS is complex system which combines continuous dynamics and discrete dynamics. Among all the unsolved problems, time constraints are critical issues for CPS especially the time-security issues. The interaction of continuous and discrete dynamics in CPS must be specified correctly due to this reason. Unfortunately, the existed methods for modeling CPS can't fullfill the requirements. Clock Theory, which is proposed by Jifeng He, can be used to specify the time constraints for dynamics of CPS. In this paper, we introduced Clock Theory and proposed case studies for specifying and modeling the time constraints of CPS with Clock Theory.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Gesture-Based NUI Application for Real-Time Path Modification 基于手势的NUI实时路径修改应用
Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho
Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.
自自然用户界面(NUI)概念诞生以来,NUI得到了广泛的应用。基于ui的应用程序发展迅速,特别是那些使用手势的应用程序,它们已经在技术中占据了关键地位。广受欢迎的智能手机就是最好的例子之一。最近,视频会议也开始采用基于手势的ui和增强现实(AR)技术。NUI和AR极大地丰富和促进了人类的经验。此外,路径规划一直是研究领域的热门课题。传统的路径规划采用自动导航来解决问题,无法实现与人的实际交互。其算法计算复杂,而且在某些特殊情况下,自动实时处理的效率远低于人工路径修改。因此,考虑到这种情有可减的情况,我们提出了一种采用NUI技术实时修改3D路径的解决方案。在我们提出的解决方案中,用户可以手动操作和编辑他们自己的路径。该方法的核心是基于三维点检测来改变路径。我们做了一个城市道路改造的模拟实验。实验结果表明,计算机能够准确识别有效的手势。通过使用手势可以有效地改变路径。在其他应用中,该解决方案可用于虚拟军事地图和汽车导航。
{"title":"Gesture-Based NUI Application for Real-Time Path Modification","authors":"Hongzhe Liu, Yulong Xi, Wei Song, Kyhyun Um, Kyungeun Cho","doi":"10.1109/DASC.2013.104","DOIUrl":"https://doi.org/10.1109/DASC.2013.104","url":null,"abstract":"Since the birth of Natural User Interface (NUI) concept, the NUI has become widely used. NUI-based applications have grown rapidly, particularly those using gestures, which have come to occupy a pivotal place in technology. The ever-popular Smartphone is one of the best examples. Recently, video conferencing has also begun adopting gesture-based NUIs with augmented reality (AR) technology. The NUI and AR have greatly enriched and facilitated human experience. In addition, path planning has been a popular topic in research area. Traditional path planning uses automatic navigation to solve problems, it cannot practically interact with people. Its algorithm calculates complexly, moreover, in certain extenuating circumstances, automatic real-time processing is much less efficient than human path modification. Therefore, considering such extenuating circumstances, we present a solution that employs NUI technology for 3D path modification in real time. In our proposed solution, users can manually operate and edit their own paths. The core method is based on 3D point detection to change paths. We did a simulation experiment about city path modification. Experiment resulted that computer can accurately identify a valid gesture. By using gesture it can effectively change the path. Among other applications, this solution can be used in virtual military maps and car navigation.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"253 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126720363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Emulation of Network Path Quality Indicators 网络路径质量指标仿真
Ruijie Ou, Wenyu Chen, WeiShun Li, LinLi Guo
The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a "Transparent Bridge" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.
目前的网络仿真器通用性差,仿真逼真度不高。本文基于网络仿真原理,设计并实现了一个网络路径质量指标仿真系统,该系统可以透明地串行部署在某条网络路径上,并改变该路径的性能。主要任务是:利用WinPcap包捕获器在Windows平台上实现一个“透明网桥”,给出了质量指标的仿真算法和模型,研究了网络质量指标与仿真算法之间的关系,并在此基础上对仿真算法进行了改进和优化,设计、实现并验证了仿真系统。仿真系统具有良好的跨平台特性,在链路层实现帧级仿真,具有较高的保真度。
{"title":"Emulation of Network Path Quality Indicators","authors":"Ruijie Ou, Wenyu Chen, WeiShun Li, LinLi Guo","doi":"10.1109/DASC.2013.91","DOIUrl":"https://doi.org/10.1109/DASC.2013.91","url":null,"abstract":"The current network emulators commonly have bad versatility and their emulation fidelity is not high. Based on the principle of network emulation, this essay designs and implements a network path quality indicators emulation system, which can be transparently series deployed on a network path and change the performance of this path. The main tasks are: achieves a \"Transparent Bridge\" on Windows platform, using WinPcap packet capturer, gives the quality indicators emulation algorithms and models, studies the relationships between the indicators of network quality and the emulation algorithms has been improved and optimized based on this, designs, implements and verifies the emulation system. The emulation system has good cross-platform features, it achieves the frame-level emulation in the link layer, so it has a high fidelity.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125883400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distributed Real-Time Operating System with Distributed Shared Memory for Embedded Control Systems 嵌入式控制系统中分布式共享内存的分布式实时操作系统
Takahiro Chiba, Myungryun Yoo, T. Yokoyama
The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.
提出了一种为分布式控制系统提供分布式共享内存服务的分布式实时操作系统(DRTOS)。基于模型的设计已经成为嵌入式控制软件设计的主流,软件模块的源代码可以从控制器模型中生成。生成的软件模块通过共享变量交换输入和输出值。我们开发了一个具有实时DSM服务的DRTOS,以提供一个位置透明的环境,其中分布式软件模块可以通过DSM交换输入和输出值。DRTOS是OSEK操作系统的扩展。我们使用一种叫做FlexRay的实时网络,它基于TDMA(时分多址)协议。DSM的一致性是根据FlexRay传输数据的顺序来保持的,而不是使用节点间同步。如果FlexRay通信配置良好,则DSM的最坏情况响应时间是可以预测的。
{"title":"A Distributed Real-Time Operating System with Distributed Shared Memory for Embedded Control Systems","authors":"Takahiro Chiba, Myungryun Yoo, T. Yokoyama","doi":"10.1109/DASC.2013.71","DOIUrl":"https://doi.org/10.1109/DASC.2013.71","url":null,"abstract":"The paper presents a distributed real-time operating system (DRTOS) that provides a distributed shared memory (DSM) service for distributed control systems. Model-based design has become popular in embedded control software design and the source code of software modules can be generated from a controller model. The generated software modules exchange their input and output values through shared variables. We develop a DRTOS with a real-time DSM service to provide a location-transparent environment, in which distributed software modules can exchange input and output values through the DSM. The DRTOS is an extension to OSEK OS. We use a real-time network called FlexRay, which is based on a TDMA (Time Division Multiple Access) protocol. The consistency of the DSM is maintained according to the order of data transfer through FlexRay, not using inter-node synchronization. The worst case response time of the DSM is predictable if the FlexRay communication is well configured.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114965596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
ADS-B Data Authentication Based on AH Protocol 基于AH协议的ADS-B数据认证
Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang
With the evolution of traditional civil aviation into "e-enabled" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.
随着传统民用航空向“e-enabled”航空发展,ADS-B自动相关监视广播(ADS-B)系统将取代雷达成为下一代空中交通管理的基石。然而,ADS-B系统是广播型数据链,ADS-B信号未经验证,因此很容易将假飞机插入ADS-B系统。为了过滤欺骗目标,本文提出了一种基于AH协议的ADS-B数据认证方案。安全性分析表明,该方案能够实现ADS-B报文的完整性、数据源的真实性和抗重放攻击。
{"title":"ADS-B Data Authentication Based on AH Protocol","authors":"Rui-dong Chen, Chengxiang Si, Haomiao Yang, Xiaosong Zhang","doi":"10.1109/DASC.2013.32","DOIUrl":"https://doi.org/10.1109/DASC.2013.32","url":null,"abstract":"With the evolution of traditional civil aviation into \"e-enabled\" aviation, automatic dependent surveillance-broadcast (ADS-B) system plays an important role to replace radar to become the cornerstone of the next generation air traffic management. However, ADS-B system is a broadcast-type data link and ADS-B signals are unauthenticated, thus inserting a false aircraft into the ADS-B system is easy. In this paper, to filter spoofed targets, we present ADS-B data authentication scheme based on AH protocol. Security analysis demonstrates that the proposed scheme can achieve integrity of ADS-B messages, authenticity of data origin sources and resistance against replay attacks.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130094733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
MIMO DAS Solutions in LTE Indoor System LTE室内系统中的MIMO DAS解决方案
Youxiang Wang, Fuchang Li
Multiple input multiple output (MIMO) technology has been considered as one of the essential technologies to enhance the performance of Long Term Evolution (LTE) system with the limited bandwidth and transmit power. For indoor coverage, it is difficult to implement MIMO technology since the challenges of engineering and cost in doubling the number of installed antennas and feeders. Therefore, two indoor MIMO distributed antenna system (DAS) solutions are proposed by using frequency converting and signal comibing and separating by upgrading the existing indoor DASs. Frequency converting is employed to decrease the carrier frequency of LTE system when it is higher than 2500MHz since most of the existing feeders can only support the frequency of the transmit signals from 800MHz to 2500MHz. In the proposed schemes, two branches' MIMO signals can be loaded into the feeder of the existing DAS by combining them together after converting the original LTE frequency into two different lower frequency bands, and a dual-polarized indoor antenna is used at remote site to reduce the number of antenna locations. Some simulations show the effect of difference on transmit power and time delay between two LTE MIMO branches. Our field measurement results reveal that the proposed schemes can provide the comparable level of performance but more simpler and pratical to be deployed.
多输入多输出(MIMO)技术被认为是在带宽和发射功率有限的情况下提高长期演进(LTE)系统性能的关键技术之一。对于室内覆盖,MIMO技术很难实现,因为工程和成本的挑战是安装天线和馈线的数量增加一倍。为此,本文提出了两种室内MIMO分布式天线系统(DAS)方案,通过对现有室内DAS进行升级改造,采用变频技术和信号合集分离技术。LTE系统的载波频率高于2500MHz时,由于现有的馈线大多只能支持发射信号在800MHz到2500MHz之间的频率,因此采用变频技术降低载波频率。在该方案中,将原有LTE频率转换为两个不同的较低频段后,将两个支路的MIMO信号合并到现有DAS馈线中,并在远程站点使用双极化室内天线以减少天线位置数量。仿真结果显示了两个LTE MIMO分支之间的传输功率和时延差异的影响。我们的现场测量结果表明,所提出的方案可以提供相当水平的性能,但更简单和实用的部署。
{"title":"MIMO DAS Solutions in LTE Indoor System","authors":"Youxiang Wang, Fuchang Li","doi":"10.1109/DASC.2013.112","DOIUrl":"https://doi.org/10.1109/DASC.2013.112","url":null,"abstract":"Multiple input multiple output (MIMO) technology has been considered as one of the essential technologies to enhance the performance of Long Term Evolution (LTE) system with the limited bandwidth and transmit power. For indoor coverage, it is difficult to implement MIMO technology since the challenges of engineering and cost in doubling the number of installed antennas and feeders. Therefore, two indoor MIMO distributed antenna system (DAS) solutions are proposed by using frequency converting and signal comibing and separating by upgrading the existing indoor DASs. Frequency converting is employed to decrease the carrier frequency of LTE system when it is higher than 2500MHz since most of the existing feeders can only support the frequency of the transmit signals from 800MHz to 2500MHz. In the proposed schemes, two branches' MIMO signals can be loaded into the feeder of the existing DAS by combining them together after converting the original LTE frequency into two different lower frequency bands, and a dual-polarized indoor antenna is used at remote site to reduce the number of antenna locations. Some simulations show the effect of difference on transmit power and time delay between two LTE MIMO branches. Our field measurement results reveal that the proposed schemes can provide the comparable level of performance but more simpler and pratical to be deployed.","PeriodicalId":179557,"journal":{"name":"2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129433551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2013 IEEE 11th International Conference on Dependable, Autonomic and Secure Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1