首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Information Security Routing Protocol in the WSN WSN中的信息安全路由协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.260
Li Wei, Chengwu Ming, Liu Mingming
With the development and wide application of WSN (Wireless Sensor Network), the information security becomes a serious problem, especially when the WSN applied in military field. Whereas the general WSN routing protocols focus on the transmission efficiency, reliability and energy-efficiency, not on the security. This paper integrates the international popular AES encryption standard, RSA public-key encryption mechanism and digital signature technology to improve classic AODV routing protocol, and shows an SAODV routing protocol which has both energy efficiency and information security. The theoretical analysis and simulation show: when adding security mechanism to AODV in the routing layer, the system owns the defensive ability for the hidden security problem, such as the eavesdropping, coaxing, imitation, replay, denial of service and HELLO diffusion etc and the normal performance of the network almost conform to the AODV protocol.
随着无线传感器网络(WSN)的发展和广泛应用,信息安全问题日益突出,尤其是在军事领域的应用。而一般的无线传感器网络路由协议关注的是传输效率、可靠性和能效,而不是安全性。本文结合国际流行的AES加密标准、RSA公钥加密机制和数字签名技术,对经典的AODV路由协议进行改进,提出了一种既节能又安全的SAODV路由协议。理论分析和仿真结果表明:在AODV路由层加入安全机制后,系统对窃听、哄骗、模仿、重放、拒绝服务、HELLO扩散等安全隐患具有防御能力,网络的正常性能基本符合AODV协议。
{"title":"Information Security Routing Protocol in the WSN","authors":"Li Wei, Chengwu Ming, Liu Mingming","doi":"10.1109/IAS.2009.260","DOIUrl":"https://doi.org/10.1109/IAS.2009.260","url":null,"abstract":"With the development and wide application of WSN (Wireless Sensor Network), the information security becomes a serious problem, especially when the WSN applied in military field. Whereas the general WSN routing protocols focus on the transmission efficiency, reliability and energy-efficiency, not on the security. This paper integrates the international popular AES encryption standard, RSA public-key encryption mechanism and digital signature technology to improve classic AODV routing protocol, and shows an SAODV routing protocol which has both energy efficiency and information security. The theoretical analysis and simulation show: when adding security mechanism to AODV in the routing layer, the system owns the defensive ability for the hidden security problem, such as the eavesdropping, coaxing, imitation, replay, denial of service and HELLO diffusion etc and the normal performance of the network almost conform to the AODV protocol.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114135922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Paper Study of Embedded System Design Based on RFID Securities 基于RFID证券的嵌入式系统设计研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.199
Ling-feng Shi, X. Lai, Bao-Long Guo
The paper presents embedded system design project based on RFID (Radio-Frequency Identification) securities. The project adopts RFID to complete reading and writing tags, and embedded system to implement system control, communication, signal processing, showing results, human-computer interaction, and so on. Module of RFID is made of MFCR500 of Philips, AT89S52 of Atmel, and integrated antenna. The embedded system is made of S3C2410 as kernel chip from Samsung. The whole system integrates portable securities, communication, and distribution management.
本文提出了基于射频识别(RFID)证券的嵌入式系统设计方案。本项目采用RFID完成标签的读写,采用嵌入式系统实现系统控制、通信、信号处理、显示结果、人机交互等功能。RFID模块采用Philips公司的MFCR500、Atmel公司的AT89S52和集成天线组成。该嵌入式系统采用三星S3C2410作为内核芯片。整个系统集便携证券、通讯、分发管理于一体。
{"title":"Paper Study of Embedded System Design Based on RFID Securities","authors":"Ling-feng Shi, X. Lai, Bao-Long Guo","doi":"10.1109/IAS.2009.199","DOIUrl":"https://doi.org/10.1109/IAS.2009.199","url":null,"abstract":"The paper presents embedded system design project based on RFID (Radio-Frequency Identification) securities. The project adopts RFID to complete reading and writing tags, and embedded system to implement system control, communication, signal processing, showing results, human-computer interaction, and so on. Module of RFID is made of MFCR500 of Philips, AT89S52 of Atmel, and integrated antenna. The embedded system is made of S3C2410 as kernel chip from Samsung. The whole system integrates portable securities, communication, and distribution management.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114192121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
One-way Hash Function Construction Based on Conservative Chaotic Systems 基于保守混沌系统的单向哈希函数构造
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.209
Qing-hua Zhang, Han Zhang, Z. Li
An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length and each message block is iterated some times through standard map. Both the iterations results of every round and the plaintext block determine the two initial values and the steps of iterations in next round. Some items of the result in the final round are chosen to be transformed into Hash value of 128 bits. Theoretical analysis and computer simulation show that this algorithm has good effect in irreversibility, weak collision and sensitivity to initial values. The method is safer in security than the Hash function based on low- dimensional dissipative chaotic maps and it is easy to realize.
提出了一种基于保守混沌系统的单向哈希函数构造算法。明文按固定长度分成一组消息块,每个消息块通过标准映射迭代几次。每轮迭代的结果和明文块都决定了下一轮迭代的两个初始值和步骤。在最后一轮的结果中选择一些项目转换为128位的哈希值。理论分析和计算机仿真表明,该算法具有较好的不可逆性、弱碰撞性和对初值的敏感性。该方法比基于低维耗散混沌映射的哈希函数在安全性上更安全,且易于实现。
{"title":"One-way Hash Function Construction Based on Conservative Chaotic Systems","authors":"Qing-hua Zhang, Han Zhang, Z. Li","doi":"10.1109/IAS.2009.209","DOIUrl":"https://doi.org/10.1109/IAS.2009.209","url":null,"abstract":"An algorithm for one-way hash function construction based on conservative chaotic system is proposed. The plaintext is divided into a group of message blocks by a fixed length and each message block is iterated some times through standard map. Both the iterations results of every round and the plaintext block determine the two initial values and the steps of iterations in next round. Some items of the result in the final round are chosen to be transformed into Hash value of 128 bits. Theoretical analysis and computer simulation show that this algorithm has good effect in irreversibility, weak collision and sensitivity to initial values. The method is safer in security than the Hash function based on low- dimensional dissipative chaotic maps and it is easy to realize.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114399020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling 基于辐射源尺度的红外焦平面成像非均匀性校正算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.110
En-ke Li, Shangqian Liu, Shimin Yin, Xiao-ning Fu
Mathematical method was studied for the non-uniformity correction of IRFPA based on radiation source scaling for the engineering applications of infrared imaging system. It is indicated that the complicated engineering problem can be solved by the method of function interpolation or function fitting. Some dependent correction algorithms are derived based on this principle, such as cubic spline function interpolation, B-spline function least squares fitting and polynomial least squares fitting. These algorithms are proved by experiments that they can highly adapt to the broad dynamic range and non-linearity of IRFPA and are suitable for engineering applications with fast computing speed and high calibration precision.
针对红外成像系统的工程应用,研究了基于辐射源尺度的红外焦平面反射镜非均匀性校正的数学方法。结果表明,用函数插值或函数拟合的方法可以解决复杂的工程问题。在此基础上推导出了三次样条函数插值、b样条函数最小二乘拟合和多项式最小二乘拟合等相关校正算法。实验证明,这些算法能较好地适应红外焦平面天线的宽动态范围和非线性特性,适用于计算速度快、标定精度高的工程应用。
{"title":"Nonuniformity Correction Algorithms of IRFPA Based on Radiation Source Scaling","authors":"En-ke Li, Shangqian Liu, Shimin Yin, Xiao-ning Fu","doi":"10.1109/IAS.2009.110","DOIUrl":"https://doi.org/10.1109/IAS.2009.110","url":null,"abstract":"Mathematical method was studied for the non-uniformity correction of IRFPA based on radiation source scaling for the engineering applications of infrared imaging system. It is indicated that the complicated engineering problem can be solved by the method of function interpolation or function fitting. Some dependent correction algorithms are derived based on this principle, such as cubic spline function interpolation, B-spline function least squares fitting and polynomial least squares fitting. These algorithms are proved by experiments that they can highly adapt to the broad dynamic range and non-linearity of IRFPA and are suitable for engineering applications with fast computing speed and high calibration precision.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"291 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128591529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hierarchical Distributed Alert Correlation Model 分层分布式警报关联模型
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.26
Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang
Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurring or attempted intrusions and highly improve security expert’s work efficiency. Traditional alert correlation system adopts a centralized architecture which can be easily over flooded by the raw alarms. To address this issue, a distributed alert correlation model based on hierarchical architecture is proposed. This model greatly improves the performance of alert correlation through integrating three novel methods. The experiments show effectiveness of this alert correlation model on 2000 DARPA intrusion detection scenario specific datasets.
警报关联是一种很有前途的入侵检测技术。它采用入侵检测系统产生的警报,生成紧凑的报告,提供了一个更简洁和高层次的视图发生或企图入侵,并大大提高了安全专家的工作效率。传统的报警关联系统采用集中式结构,容易被原始报警淹没。针对这一问题,提出了一种基于分层结构的分布式报警关联模型。该模型通过集成三种新方法,极大地提高了警报相关的性能。实验表明,该预警关联模型在2000个DARPA入侵检测场景特定数据集上是有效的。
{"title":"Hierarchical Distributed Alert Correlation Model","authors":"Donghai Tian, Changzhen Hu, Yang Qi, Jianqiao Wang","doi":"10.1109/IAS.2009.26","DOIUrl":"https://doi.org/10.1109/IAS.2009.26","url":null,"abstract":"Alert correlation is a promising technique in intrusion detection. It takes the alerts produced by intrusion detection systems and produces compact reports which provide a more succinct and high-level view of occurring or attempted intrusions and highly improve security expert’s work efficiency. Traditional alert correlation system adopts a centralized architecture which can be easily over flooded by the raw alarms. To address this issue, a distributed alert correlation model based on hierarchical architecture is proposed. This model greatly improves the performance of alert correlation through integrating three novel methods. The experiments show effectiveness of this alert correlation model on 2000 DARPA intrusion detection scenario specific datasets.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129015063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors 一种基于正交向量的高效分层群密钥管理方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.237
Junchang Wang, X. Lin
This paper proposes a novel orthogonal algorithm and protocol of efficient group key management for secure multicast in distributed systems. In the proposed method, the sever only requires to multicast to update the group key after a subgroup or a user left and therefore bandwidth is reduced effectively. The nice features of the proposed scheme include few messages required in updating and almost instant reception of the new key information. Performance evaluation for the proposed scheme is also presented to show the superiority of the proposed method.
提出了一种新的正交算法和协议,用于分布式系统中安全组播的高效组密钥管理。该方法在子组或用户离开后,服务器只需要组播来更新组密钥,从而有效地降低了带宽。该方案的优点包括更新所需的消息很少,并且几乎可以即时接收新的密钥信息。最后对所提方案进行了性能评价,证明了所提方案的优越性。
{"title":"An Efficient Hierarchical Group Key Management Scheme Based on Orthogonal Vectors","authors":"Junchang Wang, X. Lin","doi":"10.1109/IAS.2009.237","DOIUrl":"https://doi.org/10.1109/IAS.2009.237","url":null,"abstract":"This paper proposes a novel orthogonal algorithm and protocol of efficient group key management for secure multicast in distributed systems. In the proposed method, the sever only requires to multicast to update the group key after a subgroup or a user left and therefore bandwidth is reduced effectively. The nice features of the proposed scheme include few messages required in updating and almost instant reception of the new key information. Performance evaluation for the proposed scheme is also presented to show the superiority of the proposed method.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"112 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Role and Activity Based Access Control Model for University Identity and Access Management System 基于角色和活动的大学身份与访问管理系统访问控制模型
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.43
Shuliang Zheng, D. Jiang, Qixin Liu
Although RBAC model has received broad support as a generalized access control solution, it has several innate limitations. We propose a Role and Activity Based Access Control model called R-ABAC, which extends the traditional RBAC model with the notion of participation, act and activity. An activity is an abstraction of the application environment, and organizes participations and acts as a digraph for expressing dependency of activity steps, as well as containing rich context information such as time, location and system status. An implementation of R-ABAC model has been applied to a university unified identity and access management system (UIAMS).
尽管RBAC模型作为一种通用的访问控制解决方案得到了广泛的支持,但它有一些固有的局限性。本文提出了一个基于角色和活动的访问控制模型R-ABAC,它扩展了传统的RBAC模型,引入了参与、行为和活动的概念。活动是应用程序环境的抽象,它组织参与并充当有向图,用于表示活动步骤的依赖性,以及包含丰富的上下文信息,如时间、位置和系统状态。将R-ABAC模型的实现应用于高校统一身份与访问管理系统。
{"title":"A Role and Activity Based Access Control Model for University Identity and Access Management System","authors":"Shuliang Zheng, D. Jiang, Qixin Liu","doi":"10.1109/IAS.2009.43","DOIUrl":"https://doi.org/10.1109/IAS.2009.43","url":null,"abstract":"Although RBAC model has received broad support as a generalized access control solution, it has several innate limitations. We propose a Role and Activity Based Access Control model called R-ABAC, which extends the traditional RBAC model with the notion of participation, act and activity. An activity is an abstraction of the application environment, and organizes participations and acts as a digraph for expressing dependency of activity steps, as well as containing rich context information such as time, location and system status. An implementation of R-ABAC model has been applied to a university unified identity and access management system (UIAMS).","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards 一个增强的远程用户认证方案,为智能卡提供相互认证和密钥协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.17
Chun-Ta Li
In 2005, Yoon et al. proposed a user-friendly remote user authentication scheme using smart cards. The security of their scheme is based on one-way hash function and they claimed that their scheme is secured from attacks and achievable for proving mutual authentication, freely choosing password, no verification tables, and involving very lightweight hashing operations. However, we find that Yoon et al.’s scheme suffers from the denial of service attack and performs only unilateral authentication (only user authentication). In this paper we consequently propose an enhanced version to eliminate the vulnerability. Furthermore, our enhanced scheme can also provide mutual authentication and key agreement between a remote server and login users.
2005年,Yoon等人提出了一种使用智能卡的用户友好的远程用户认证方案。他们的方案的安全性是基于单向哈希函数的,他们声称他们的方案是安全的,不受攻击,可以证明相互认证,自由选择密码,不需要验证表,并且涉及非常轻量的哈希操作。然而,我们发现Yoon等人的方案遭受拒绝服务攻击,并且只执行单边认证(仅用户认证)。因此,在本文中,我们提出了一个增强版本来消除该漏洞。此外,我们的改进方案还可以在远程服务器和登录用户之间提供相互认证和密钥协议。
{"title":"An Enhanced Remote User Authentication Scheme Providing Mutual Authentication and Key Agreement with Smart Cards","authors":"Chun-Ta Li","doi":"10.1109/IAS.2009.17","DOIUrl":"https://doi.org/10.1109/IAS.2009.17","url":null,"abstract":"In 2005, Yoon et al. proposed a user-friendly remote user authentication scheme using smart cards. The security of their scheme is based on one-way hash function and they claimed that their scheme is secured from attacks and achievable for proving mutual authentication, freely choosing password, no verification tables, and involving very lightweight hashing operations. However, we find that Yoon et al.’s scheme suffers from the denial of service attack and performs only unilateral authentication (only user authentication). In this paper we consequently propose an enhanced version to eliminate the vulnerability. Furthermore, our enhanced scheme can also provide mutual authentication and key agreement between a remote server and login users.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127029992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Certificateless One-Way Authenticated Two-Party Key Agreement Protocol 无证书单向认证双方密钥协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.183
Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang
Key agreement is one of the fundamental cryptographic primitives in public key cryptography. It plays an important role for securing systems in practice. In this paper, we present the first certificateless One-Way authenticated Two-Party key agreement protocol. The security of the proposed protocol is analyzed based on the intractability of the standard discrete logarithm (DL) and bilinear Diffie-Hellman (BDH) problems. For efficiency, our protocol enjoys low complexity in both communication and computation.
密钥协议是公钥密码学中最基本的密码原语之一。在实际应用中,它对系统的安全起着重要的作用。在本文中,我们提出了第一个无证书的单向认证双方密钥协议。基于标准离散对数(DL)和双线性Diffie-Hellman (BDH)问题的难解性,分析了该协议的安全性。为了提高效率,我们的协议在通信和计算方面都具有较低的复杂度。
{"title":"Certificateless One-Way Authenticated Two-Party Key Agreement Protocol","authors":"Wuping Chen, Lei Zhang, Bo Qin, Qianhong Wu, Huanguo Zhang","doi":"10.1109/IAS.2009.183","DOIUrl":"https://doi.org/10.1109/IAS.2009.183","url":null,"abstract":"Key agreement is one of the fundamental cryptographic primitives in public key cryptography. It plays an important role for securing systems in practice. In this paper, we present the first certificateless One-Way authenticated Two-Party key agreement protocol. The security of the proposed protocol is analyzed based on the intractability of the standard discrete logarithm (DL) and bilinear Diffie-Hellman (BDH) problems. For efficiency, our protocol enjoys low complexity in both communication and computation.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123929003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Testability Analysis of Grounding Grids Using Network Transformation 基于网络变换的接地网可测试性分析
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.238
Tao Niu, Yingjia Zhang, D. Zhang, Liqiang Liu, Xianjue Luo
A novel topology analysis method is presented to analyze the testability of grounding grids, and creditability is firstly proposed as an important index to evaluate the results. In this method, inaccessible nodes are eliminated by wye-delta transformation, followed by the calculation of testability and creditability index in the reverse direction. Simulation results are provided to prove this method.
提出了一种新的拓扑分析方法来分析接地网的可测试性,并首次提出了可信性作为评价结果的重要指标。该方法首先通过眼- δ变换消除不可达节点,然后反向计算可测性和可信性指标。仿真结果验证了该方法的有效性。
{"title":"Testability Analysis of Grounding Grids Using Network Transformation","authors":"Tao Niu, Yingjia Zhang, D. Zhang, Liqiang Liu, Xianjue Luo","doi":"10.1109/IAS.2009.238","DOIUrl":"https://doi.org/10.1109/IAS.2009.238","url":null,"abstract":"A novel topology analysis method is presented to analyze the testability of grounding grids, and creditability is firstly proposed as an important index to evaluate the results. In this method, inaccessible nodes are eliminated by wye-delta transformation, followed by the calculation of testability and creditability index in the reverse direction. Simulation results are provided to prove this method.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124214182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1