首页 > 最新文献

Future Generation Communication and Networking (FGCN 2007)最新文献

英文 中文
The Analysis of PPL Attention Effects in the Screen of  Multimedia Contents 多媒体内容屏幕中PPL注意效应分析
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.211
Young Jae Lee, Y. Lee
This research attempts to analyze the attention effects of PPL, which is being acclaimed as the new beneficiary model in multimedia, appearing on the screen of multimedia contents. For the purpose of analysis, the screen of multimedia contents was divided into 9 squares and in each of the square area a number image or a brand image was placed. 105 subjects participated in the questionnaire and their responses were analyzed to find out how the exposure types and locations of images on the screen affect attention effects. As the results of the analysis showed, the subjects reported paying the highest attention to the square 5, the center area of the screen, regardless of contents of the message. The respondents preferred moving image to stationary image and were more attentive on a certain area on which extra emphasis was put. The research results may help finding out the optimal place for the message on the screen and also the best exposure type.
PPL被誉为多媒体领域的新型受益模式,出现在多媒体内容的屏幕上,本研究试图分析PPL的注意效应。为了便于分析,我们将多媒体内容的屏幕分成9个正方形,在每个正方形区域放置一个数字图像或一个品牌图像。105名受试者参与了问卷调查,并对他们的回答进行了分析,以了解屏幕上图像的暴露类型和位置如何影响注意效果。分析结果显示,无论信息的内容如何,受试者报告对屏幕中心区域5号方框的关注度最高。受访者更喜欢运动图像而不是静止图像,并且更关注某个特别强调的区域。研究结果可能有助于找出屏幕上信息的最佳位置以及最佳暴露类型。
{"title":"The Analysis of PPL Attention Effects in the Screen of  Multimedia Contents","authors":"Young Jae Lee, Y. Lee","doi":"10.1109/FGCN.2007.211","DOIUrl":"https://doi.org/10.1109/FGCN.2007.211","url":null,"abstract":"This research attempts to analyze the attention effects of PPL, which is being acclaimed as the new beneficiary model in multimedia, appearing on the screen of multimedia contents. For the purpose of analysis, the screen of multimedia contents was divided into 9 squares and in each of the square area a number image or a brand image was placed. 105 subjects participated in the questionnaire and their responses were analyzed to find out how the exposure types and locations of images on the screen affect attention effects. As the results of the analysis showed, the subjects reported paying the highest attention to the square 5, the center area of the screen, regardless of contents of the message. The respondents preferred moving image to stationary image and were more attentive on a certain area on which extra emphasis was put. The research results may help finding out the optimal place for the message on the screen and also the best exposure type.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129631501","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Active RFID-Based Object Management System in Sensor-Embedded Environment 传感器嵌入式环境下基于rfid的有源对象管理系统
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.48
Taketoshi Mori, C. Siridanupath, H. Noguchi, Tomomasa Sato
In this paper, we proposed the object location estimation method in sensor-embedded environment using active Radio Frequency Identification (RFID) technology. Based on the proposed method, we have developed the indoor object management system, which provides users with three main functionalities: the ability to access and manage targeted objects in the environment, real-timely monitor their locations, record and later search the particular information from historical database. The estimation of object's location is based on the analysis of RF signal strength retrieved from RFID system and position tracking of a person in the room using floor-distributed pressure sensors. The experiment result has shown that the integration of sensors significantly reduce the effects from external interferences in the analysis of RF signal strength, and improve the accuracy of object location sensing.
本文提出了一种基于有源射频识别(RFID)技术的嵌入式传感器环境下目标位置估计方法。基于所提出的方法,我们开发了室内物体管理系统,该系统为用户提供了三个主要功能:能够访问和管理环境中的目标物体,实时监控其位置,记录并稍后从历史数据库中搜索特定信息。物体位置的估计是基于对从RFID系统中检索到的射频信号强度的分析和使用分布在地板上的压力传感器对室内人员的位置跟踪。实验结果表明,传感器的集成显著降低了外界干扰对射频信号强度分析的影响,提高了目标定位传感的精度。
{"title":"Active RFID-Based Object Management System in Sensor-Embedded Environment","authors":"Taketoshi Mori, C. Siridanupath, H. Noguchi, Tomomasa Sato","doi":"10.1109/FGCN.2007.48","DOIUrl":"https://doi.org/10.1109/FGCN.2007.48","url":null,"abstract":"In this paper, we proposed the object location estimation method in sensor-embedded environment using active Radio Frequency Identification (RFID) technology. Based on the proposed method, we have developed the indoor object management system, which provides users with three main functionalities: the ability to access and manage targeted objects in the environment, real-timely monitor their locations, record and later search the particular information from historical database. The estimation of object's location is based on the analysis of RF signal strength retrieved from RFID system and position tracking of a person in the room using floor-distributed pressure sensors. The experiment result has shown that the integration of sensors significantly reduce the effects from external interferences in the analysis of RF signal strength, and improve the accuracy of object location sensing.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130044210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions 网络系统跨站脚本调查收集数字证据对抗网络入侵
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.156
Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang
With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website "Wretch" and the international largest friend's community website "MySpace" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.
随着互联网的快速发展,政府机构和其他私营公司正在建立网站,提供信息和营销。然而,计算机病毒和黑客在互联网上无处不在。最近,注入攻击呈指数增长。SQL注入、ASP注入、PHP注入是常用的攻击方法。近年来,美国最大的博客网站“Wretch”和国际最大的朋友社区网站“MySpace”遭到跨站脚本(XSS)攻击。在本文中,我们提供了一种方案来了解如何在遭受来自网络系统的跨站攻击后收集证据。在此基础上,提出了防止跨站攻击的管理策略。
{"title":"Investigations in Cross-site Script on Web-systems Gathering Digital Evidence against Cyber-Intrusions","authors":"Shiuh-Jeng Wang, Yao-Han Chang, Wen-Ya Chiang, Wen-Shenq Juang","doi":"10.1109/FGCN.2007.156","DOIUrl":"https://doi.org/10.1109/FGCN.2007.156","url":null,"abstract":"With the Internet's rapid development, government agencies and other private companies are setting up websites for providing information and marketing. However, computer viruses and hackers are omnipresent on Internet. The injection attacks grew exponentially recently. SQL Injection, ASP Injection, PHP Injection are methods of attacks used. The nation's largest Blog website \"Wretch\" and the international largest friend's community website \"MySpace\" were attacked in recent years by Cross-Site Script (XSS) attacks. In this paper, we provide a scheme to know how to collect evidence after suffering XSS attacks from network systems. Furthermore, we give the management strategies to prevent XSS attacks from network intrusions.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"156 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132423691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A New Cross Layer Design of Adaptive Modulation and Coding in Finite Buffer Wireless Links 有限缓冲无线链路中自适应调制与编码的跨层设计
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.22
Abouzar Ghavami, Farid Ashtiani
In this paper, a cross-layer approach introducing new design parameters is developed for multi-rate wireless links. The novel design jointly exploits the finite-length queuing at the data link layer and the adaptation capability of the adaptive modulation and coding (AMC) scheme at the physical layer to optimize system performance for a wireless link. The analytical framework is based on discrete time Markov chain. The performance metrics such as packet drop probability, channel packet error rate and packet loss rate are derived. Using these metrics, a constrained optimization problem is solved numerically to maximize the overall system throughput.
本文针对多速率无线链路,提出了一种引入新设计参数的跨层方法。该设计结合了数据链路层的有限长度排队和物理层自适应调制编码(AMC)方案的自适应能力来优化无线链路的系统性能。分析框架基于离散时间马尔可夫链。导出了丢包概率、信道包错误率和丢包率等性能指标。利用这些指标,在数值上解决了一个约束优化问题,以最大化整个系统的吞吐量。
{"title":"A New Cross Layer Design of Adaptive Modulation and Coding in Finite Buffer Wireless Links","authors":"Abouzar Ghavami, Farid Ashtiani","doi":"10.1109/FGCN.2007.22","DOIUrl":"https://doi.org/10.1109/FGCN.2007.22","url":null,"abstract":"In this paper, a cross-layer approach introducing new design parameters is developed for multi-rate wireless links. The novel design jointly exploits the finite-length queuing at the data link layer and the adaptation capability of the adaptive modulation and coding (AMC) scheme at the physical layer to optimize system performance for a wireless link. The analytical framework is based on discrete time Markov chain. The performance metrics such as packet drop probability, channel packet error rate and packet loss rate are derived. Using these metrics, a constrained optimization problem is solved numerically to maximize the overall system throughput.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130239702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Future Application Scenarios for MANET-Based Intelligent Transportation Systems 基于manet的智能交通系统的未来应用场景
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.131
C. Toh
Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electronics, sensors, and navigation systems all help in realizing this goal of "destination-driven" and "no-hassle" driving. With the advent of wireless communications and networking technologies, the future transportation highway would be one that is "information-driven" and "wirelessly- enabled". In this paper, several potential applications of car-to-car networking are revealed and discussed.
道路运输系统的传统特点是如何有效地以不拥挤的方式将交通引导到目的地。汽车电子、传感器和导航系统的改进都有助于实现“目的地驱动”和“无麻烦”驾驶的目标。随着无线通信和网络技术的出现,未来的交通公路将是一条“信息驱动”和“无线驱动”的公路。本文揭示并讨论了车对车联网的几种潜在应用。
{"title":"Future Application Scenarios for MANET-Based Intelligent Transportation Systems","authors":"C. Toh","doi":"10.1109/FGCN.2007.131","DOIUrl":"https://doi.org/10.1109/FGCN.2007.131","url":null,"abstract":"Road transportation systems are traditionally characterized by how efficient they direct traffic in a non-congested manner towards their destinations. Improvement in car electronics, sensors, and navigation systems all help in realizing this goal of \"destination-driven\" and \"no-hassle\" driving. With the advent of wireless communications and networking technologies, the future transportation highway would be one that is \"information-driven\" and \"wirelessly- enabled\". In this paper, several potential applications of car-to-car networking are revealed and discussed.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125502080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 34
A Study on the Cell Sectorization Using the Wide-beam and Narrow-beam for CDMA Mobile Communication Systems CDMA移动通信系统宽波束和窄波束小区分割研究
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.42
Dong-You Choi, J. Park
Cell sectorization and improvement of the Ec/Io are technologies to offer good quality of services (QoS) and coverage for new and sophisticated power control to achieve high capacity in CDMA cellular mobile communication networks. In this paper, in order to efficient cell sector and to improve the Ec/Io of the pilot channel in CDMA mobile communication systems, I analyze and compare the wide- beam three sector cell (WTSC) with the narrow-beam three sector cell (NTSC) as a method for cell sectorization. The NTSC method was compared with the WTSC method, using the results of both a theoretical analysis and a simulation, in order to examine its effectiveness and validity. As a result, I confirm that efficient cell sector method to minimize interference from adjacent base stations and to increase cell coverage.
小区分界和Ec/Io的改进是为新的和复杂的功率控制提供良好的服务质量(QoS)和覆盖范围的技术,以实现CDMA蜂窝移动通信网络的高容量。为了有效地划分小区,提高CDMA移动通信系统导频信道的Ec/Io,本文对宽波束三扇区小区(WTSC)和窄波束三扇区小区(NTSC)作为小区划分方法进行了分析和比较。将NTSC方法与WTSC方法进行了理论分析和仿真比较,验证了NTSC方法的有效性。因此,我确认有效的小区扇区方法可以最大限度地减少相邻基站的干扰并增加小区覆盖。
{"title":"A Study on the Cell Sectorization Using the Wide-beam and Narrow-beam for CDMA Mobile Communication Systems","authors":"Dong-You Choi, J. Park","doi":"10.1109/FGCN.2007.42","DOIUrl":"https://doi.org/10.1109/FGCN.2007.42","url":null,"abstract":"Cell sectorization and improvement of the Ec/Io are technologies to offer good quality of services (QoS) and coverage for new and sophisticated power control to achieve high capacity in CDMA cellular mobile communication networks. In this paper, in order to efficient cell sector and to improve the Ec/Io of the pilot channel in CDMA mobile communication systems, I analyze and compare the wide- beam three sector cell (WTSC) with the narrow-beam three sector cell (NTSC) as a method for cell sectorization. The NTSC method was compared with the WTSC method, using the results of both a theoretical analysis and a simulation, in order to examine its effectiveness and validity. As a result, I confirm that efficient cell sector method to minimize interference from adjacent base stations and to increase cell coverage.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122192684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Delay Analysis of IEEE 802.11 DCF with Back-off Suspension 带回退悬架的IEEE 802.11 DCF延迟分析
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.95
Guolin Sun, Bo Hu
We present in this paper an analytical model that accounts for the back-off suspension in DCF mode while evaluating delay performance of IEEE 802.11 MAC layer. Our work is based on the Bianchi's model where the performance of 802.11 MAC layer is computed using a discrete time Markov chain. The contribution of this work is to take the back-off suspensions into considerations and derive a more accurate delay analysis model of the IEEE 802.11 MAC protocol based on Markov model. We evaluate our analysis model through simulation compared to P. Chatzimisios' model. Simulation result shows that without considering the back-off suspension as specified in the current standard, current major models have super-estimated the saturation delay performance of the IEEE 802.11 MAC protocol, especially when the number of stations in a basic service set is increasing.
本文在评估IEEE 802.11 MAC层延迟性能的同时,提出了一个考虑DCF模式下的回退悬的分析模型。我们的工作基于Bianchi的模型,其中802.11 MAC层的性能是使用离散时间马尔可夫链计算的。本文的贡献在于考虑了回退时延的影响,推导出了一个基于马尔可夫模型的更精确的IEEE 802.11 MAC协议时延分析模型。我们通过仿真与P. Chatzimisios的模型进行了比较。仿真结果表明,在不考虑当前标准中规定的回退悬架的情况下,当前主要模型过高估计了IEEE 802.11 MAC协议的饱和延迟性能,特别是当基本服务集中的站点数量增加时。
{"title":"Delay Analysis of IEEE 802.11 DCF with Back-off Suspension","authors":"Guolin Sun, Bo Hu","doi":"10.1109/FGCN.2007.95","DOIUrl":"https://doi.org/10.1109/FGCN.2007.95","url":null,"abstract":"We present in this paper an analytical model that accounts for the back-off suspension in DCF mode while evaluating delay performance of IEEE 802.11 MAC layer. Our work is based on the Bianchi's model where the performance of 802.11 MAC layer is computed using a discrete time Markov chain. The contribution of this work is to take the back-off suspensions into considerations and derive a more accurate delay analysis model of the IEEE 802.11 MAC protocol based on Markov model. We evaluate our analysis model through simulation compared to P. Chatzimisios' model. Simulation result shows that without considering the back-off suspension as specified in the current standard, current major models have super-estimated the saturation delay performance of the IEEE 802.11 MAC protocol, especially when the number of stations in a basic service set is increasing.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"35 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116536226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6 IPv6下基于链路签名的DDoS攻击者跟踪算法
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.15
Xinyu Yang, Ting Ma
The ipv6 security architecture, IPSec, plays a positive role in the protection of IPv6 networks. To some special attacks, especially DDoS attacks, IPSec appears relatively weak, because IPSec can only defend against DDoS attacks that spoof their source addresses. In cases where attackers launch DDoS attacks with their real identity, IPSec is helpless. This paper proposes a link signature based DDoS attacker tracing algorithm. It can immediately reconstruct the entire attack path after suffering a DDoS attack whether or not the source addresses are spoofed. To verify the validity of our algorithm, we implemented it under a simulated IPv6 environment with the OMNeT++ IPv6Suite.
ipv6安全架构IPSec对ipv6网络的保护起到了积极的作用。对于一些特殊的攻击,尤其是DDoS攻击,IPSec的防御能力相对较弱,因为IPSec只能防御伪装源地址的DDoS攻击。当攻击者以真实身份发起DDoS攻击时,IPSec是无能为力的。提出了一种基于链接签名的DDoS攻击者跟踪算法。它可以在遭受DDoS攻击后立即重建整个攻击路径,无论源地址是否被欺骗。为了验证算法的有效性,我们使用omnet++ IPv6Suite在模拟IPv6环境下实现了该算法。
{"title":"A Link Signature Based DDoS Attacker Tracing Algorithm under IPv6","authors":"Xinyu Yang, Ting Ma","doi":"10.1109/FGCN.2007.15","DOIUrl":"https://doi.org/10.1109/FGCN.2007.15","url":null,"abstract":"The ipv6 security architecture, IPSec, plays a positive role in the protection of IPv6 networks. To some special attacks, especially DDoS attacks, IPSec appears relatively weak, because IPSec can only defend against DDoS attacks that spoof their source addresses. In cases where attackers launch DDoS attacks with their real identity, IPSec is helpless. This paper proposes a link signature based DDoS attacker tracing algorithm. It can immediately reconstruct the entire attack path after suffering a DDoS attack whether or not the source addresses are spoofed. To verify the validity of our algorithm, we implemented it under a simulated IPv6 environment with the OMNeT++ IPv6Suite.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121813886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Lightweight Session Key Management Scheme in Sensor Networks 传感器网络中的轻量级会话密钥管理方案
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.159
Huishang Jin, Haiguang Chen
The necessity to secure the communication between wireless sensor networks nodes becomes important with the system nodes are being deployed for a wide variety of applications. In this paper, we propose a new approach for session key management among group sensor nodes. We use initial trust node to build a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links. Each shared key used only once after the set of shared keys are built. Our session scheme exhibits a nice power efficient and excellent updating communications keys. At the same time our scheme updating keys go with exchanging message. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed management schemes can achieve a good level of security.
随着系统节点被部署到各种各样的应用中,确保无线传感器网络节点之间通信安全的必要性变得非常重要。本文提出了一种组传感器节点间会话密钥管理的新方法。我们使用初始信任节点建立一个小的共享密钥集,低成本协议使相邻传感器能够进行身份验证并建立安全的本地链路。每个共享密钥仅在构建共享密钥集后使用一次。我们的会话方案具有良好的功率效率和出色的更新通信密钥。同时,我们的方案在更新密钥的同时进行消息交换。对所提出的管理方案进行了广泛的分析和仿真,结果表明所提出的管理方案能够达到良好的安全水平。
{"title":"Lightweight Session Key Management Scheme in Sensor Networks","authors":"Huishang Jin, Haiguang Chen","doi":"10.1109/FGCN.2007.159","DOIUrl":"https://doi.org/10.1109/FGCN.2007.159","url":null,"abstract":"The necessity to secure the communication between wireless sensor networks nodes becomes important with the system nodes are being deployed for a wide variety of applications. In this paper, we propose a new approach for session key management among group sensor nodes. We use initial trust node to build a small set of shared keys, low-cost protocols enable neighboring sensors to authenticate and establish secure local links. Each shared key used only once after the set of shared keys are built. Our session scheme exhibits a nice power efficient and excellent updating communications keys. At the same time our scheme updating keys go with exchanging message. Extensive analyses and simulations are conducted to evaluate the proposed schemes, and the results show that the proposed management schemes can achieve a good level of security.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124940097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Parameter Estimation of Noisy Passive Telemetry Sensor System Using Unscented Kalman Filter 无嗅卡尔曼滤波的噪声无源遥测系统参数估计
Pub Date : 2007-12-06 DOI: 10.1109/FGCN.2007.176
Kyung-Yup Kim, John-Tark Lee, Dong-Kuk Yu, Young-Sik Park
In this paper, a noisy passive telemetry sensor system using Unscented Kalman Filter (UKF) is proposed. To overcome these trouble problems such as a power limitation and a estimation complexity that the general passive telemetry sensor system including IC chip has, the principle of inductive coupling was applied to the modelling of a passive telemetry sensor system (PTSS) and its noisy capacitive parameter was estimated by the UKF algorithm. Specially, to show the effective tracking performance of the UKF, we compared with the tracking performance of Recursive Least Square Estimation (RLSE) using linearization.
本文提出了一种基于无气味卡尔曼滤波(UKF)的噪声无源遥测系统。为了克服一般含IC芯片的无源遥测系统存在的功率限制和估计复杂性等问题,将电感耦合原理应用于无源遥测系统的建模中,并采用UKF算法对其电容参数进行估计。特别地,为了证明UKF的有效跟踪性能,我们将其与线性化的递推最小二乘估计(RLSE)的跟踪性能进行了比较。
{"title":"Parameter Estimation of Noisy Passive Telemetry Sensor System Using Unscented Kalman Filter","authors":"Kyung-Yup Kim, John-Tark Lee, Dong-Kuk Yu, Young-Sik Park","doi":"10.1109/FGCN.2007.176","DOIUrl":"https://doi.org/10.1109/FGCN.2007.176","url":null,"abstract":"In this paper, a noisy passive telemetry sensor system using Unscented Kalman Filter (UKF) is proposed. To overcome these trouble problems such as a power limitation and a estimation complexity that the general passive telemetry sensor system including IC chip has, the principle of inductive coupling was applied to the modelling of a passive telemetry sensor system (PTSS) and its noisy capacitive parameter was estimated by the UKF algorithm. Specially, to show the effective tracking performance of the UKF, we compared with the tracking performance of Recursive Least Square Estimation (RLSE) using linearization.","PeriodicalId":254368,"journal":{"name":"Future Generation Communication and Networking (FGCN 2007)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122493845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Future Generation Communication and Networking (FGCN 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1