Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60231-9
Hang DONG , Jing LI , Miao ZHANG , Shuai SU , Yi-xian YANG
The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.
{"title":"A software protection framework for mobile devices","authors":"Hang DONG , Jing LI , Miao ZHANG , Shuai SU , Yi-xian YANG","doi":"10.1016/S1005-8885(13)60231-9","DOIUrl":"10.1016/S1005-8885(13)60231-9","url":null,"abstract":"<div><p>The software protection technology is the main component of modern software security technology. Generally, confusion and encryption methods are using in software protection technology to provide traditional desktop applications. But applications based on mobile devices are also faces with threats such as piracy and tampering. The security problem in existing applications for mobile devices will do far more harm to users than traditional virus, but there is no effective software protection security framework for them. A software application framework for mobile devices is proposed in this paper, and the white box decryption algorithm involved is improved. And it is analyzed in this paper the performance and security of the framework proposed, the operational efficiency of the improved encryption algorithm is verified.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 136-140"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60231-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74351887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60259-9
Cui-huan DU , Hong ZHU , Li-ming LUO , Jie LIU , Xiang-yang HUANG
A real-time method is proposed to detect faces in videos. First it uses frame difference method to extract the motion area. Next the clustering character of skin is used to get the general face area. AdaBoost algorithm is applied to make concrete detection of human face. Finally an improved CamShift algorithm method is used to keep the tracking and improving algorithm speed. The experiments demonstrate the robustness and high speed of the proposed algorithm.
{"title":"Face detection in video based on AdaBoost algorithm and skin model","authors":"Cui-huan DU , Hong ZHU , Li-ming LUO , Jie LIU , Xiang-yang HUANG","doi":"10.1016/S1005-8885(13)60259-9","DOIUrl":"10.1016/S1005-8885(13)60259-9","url":null,"abstract":"<div><p>A real-time method is proposed to detect faces in videos. First it uses frame difference method to extract the motion area. Next the clustering character of skin is used to get the general face area. AdaBoost algorithm is applied to make concrete detection of human face. Finally an improved CamShift algorithm method is used to keep the tracking and improving algorithm speed. The experiments demonstrate the robustness and high speed of the proposed algorithm.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 6-9, 24"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60259-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77948300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60238-1
Xiao-yu LIU, Zhong-yuan YU, Yu-min LIU, Hou-jian KANG, Jin-hong MU
High recognition rate of multi-class pattern recognition is difficult to obtain, especially when the feature extraction is not ideal. So achieving a high recognition rate with nonideal feature extraction makes great sense. Based on the early study of multiple-set-compete method (MSCM) and the algorithm of result reliability, this article proposes a new recognition method named group match competition method (GMCM). The GMCM precedes the early work with a larger scope of applications. Early work which the authors did can only deal with the recognition work with the number of powers of 2 classes, while GMCM can cope with the classes of any number. This article further illustrates the MSCM, the algorithm of result reliability and their functions in the GMCM. Three sets of cases are demonstrated and formats of grouping are discussed. The recognition results show that the GMCM is a robust method and it is capable of achieving the high recognition rate of the multi-class pattern recognition.
{"title":"Multi-class pattern recognition with the group match competition method","authors":"Xiao-yu LIU, Zhong-yuan YU, Yu-min LIU, Hou-jian KANG, Jin-hong MU","doi":"10.1016/S1005-8885(13)60238-1","DOIUrl":"10.1016/S1005-8885(13)60238-1","url":null,"abstract":"<div><p>High recognition rate of multi-class pattern recognition is difficult to obtain, especially when the feature extraction is not ideal. So achieving a high recognition rate with nonideal feature extraction makes great sense. Based on the early study of multiple-set-compete method (MSCM) and the algorithm of result reliability, this article proposes a new recognition method named group match competition method (GMCM). The GMCM precedes the early work with a larger scope of applications. Early work which the authors did can only deal with the recognition work with the number of powers of 2 classes, while GMCM can cope with the classes of any number. This article further illustrates the MSCM, the algorithm of result reliability and their functions in the GMCM. Three sets of cases are demonstrated and formats of grouping are discussed. The recognition results show that the GMCM is a robust method and it is capable of achieving the high recognition rate of the multi-class pattern recognition.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 105-108"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60238-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76247528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60242-3
Yan-ling JIN , Yong-sheng DING , Kuang-rong HAO , Yan-jun LIU
With the raising challenges of the Internet of things (IoT), e.g. the giant-scale heterogeneous network elements, and the uncertainty of sensing information and the dynamic environment that the system resides, there is no complete and widely accepted theory. In this paper, a hormone-based service detection algorithm (HSDA) for detecting the service requests generated randomly in the IoT is proposed. Inspired by the endocrine mechanism in human body, the nodes in the network without centralized command or sinks can tune themselves spontaneously by exchanging information among regional neighbors through different hormones. A dynamic activation scheme is realized as the HSDA to guarantee the rapidness of the network on responding the service requests. Simulation results show that the HSDA algorithm entitles the network with intelligent decision-making and cooperative working abilities, based on which the stability of the network and the effectiveness for detecting service requests generated randomly can be guaranteed simultaneously.
随着物联网(Internet of things, IoT)面临的挑战越来越大,如庞大的异构网络元素、传感信息的不确定性以及系统所处的动态环境,目前还没有一个完整的、被广泛接受的理论。本文提出了一种基于激素的服务检测算法(HSDA),用于检测物联网中随机产生的服务请求。受人体内分泌机制的启发,网络中的节点不需要集中指挥或汇聚,通过不同的激素在区域邻居之间交换信息,自发地进行自我调节。为了保证网络对业务请求的快速响应,实现了一种动态激活方案作为HSDA。仿真结果表明,HSDA算法使网络具有智能决策和协同工作能力,同时保证了网络的稳定性和对随机产生的业务请求的检测有效性。
{"title":"Efficient service request detection algorithm based on hormone regulation mechanism in the Internet of things","authors":"Yan-ling JIN , Yong-sheng DING , Kuang-rong HAO , Yan-jun LIU","doi":"10.1016/S1005-8885(13)60242-3","DOIUrl":"10.1016/S1005-8885(13)60242-3","url":null,"abstract":"<div><p>With the raising challenges of the Internet of things (IoT), e.g. the giant-scale heterogeneous network elements, and the uncertainty of sensing information and the dynamic environment that the system resides, there is no complete and widely accepted theory. In this paper, a hormone-based service detection algorithm (HSDA) for detecting the service requests generated randomly in the IoT is proposed. Inspired by the endocrine mechanism in human body, the nodes in the network without centralized command or sinks can tune themselves spontaneously by exchanging information among regional neighbors through different hormones. A dynamic activation scheme is realized as the HSDA to guarantee the rapidness of the network on responding the service requests. Simulation results show that the HSDA algorithm entitles the network with intelligent decision-making and cooperative working abilities, based on which the stability of the network and the effectiveness for detecting service requests generated randomly can be guaranteed simultaneously.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 86-90"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60242-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78300690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60233-2
Jun-xue LIANG , Zhao-wen LIN , Yan MA , Yu-ning WANG , Can ZHANG , Zheng MI , Jian LI
During recently years, several OpenFlow-enabled testbeds have been deployed in world-wide research community. Typically, these OpenFlow-enabled testbeds need to stitch to other testbeds to link to virtual servers and immit experimentation traffic. From the view point of researchers, these OpenFlow-enabled testbeds only provide OpenFlow networking resource, and they have to resort to other experiment infrastructure to provide computing and storage resource. Due to the OpenFlow networking and other resource belongs to different infrastructure provider and is managed by their own control software, it is difficult to coordinate these partners to provide a full programmable experiment environment. Meanwhile, the control software of these testbeds are tight coupling with their substrate resources, which means that these substrate resources, together with virtualization technologies, are permanently dedicated to the control software and difficult to be used by other services. In this paper, a new future Internet testbed architecture based on the open Infrastructure-as-a-service cloud and software defined network (SDN) paradigm is proposed. It extends the current virtual network service by adding programmable virtual switch and controller resources that can be controlled by the researcher. Its loose coupling model allows the testbed operator decouple the experiment service from the infrastructure provider, which is a more flexible way to build the testbed. The initial prototype implementation in this paper shows that this new testbed architecture built on IaaS cloud and SDN is feasible and flexible to provide programmable virtual network service.
{"title":"Programmable virtual network as a service: towards a future Internet testbed based on IaaS cloud","authors":"Jun-xue LIANG , Zhao-wen LIN , Yan MA , Yu-ning WANG , Can ZHANG , Zheng MI , Jian LI","doi":"10.1016/S1005-8885(13)60233-2","DOIUrl":"10.1016/S1005-8885(13)60233-2","url":null,"abstract":"<div><p>During recently years, several OpenFlow-enabled testbeds have been deployed in world-wide research community. Typically, these OpenFlow-enabled testbeds need to stitch to other testbeds to link to virtual servers and immit experimentation traffic. From the view point of researchers, these OpenFlow-enabled testbeds only provide OpenFlow networking resource, and they have to resort to other experiment infrastructure to provide computing and storage resource. Due to the OpenFlow networking and other resource belongs to different infrastructure provider and is managed by their own control software, it is difficult to coordinate these partners to provide a full programmable experiment environment. Meanwhile, the control software of these testbeds are tight coupling with their substrate resources, which means that these substrate resources, together with virtualization technologies, are permanently dedicated to the control software and difficult to be used by other services. In this paper, a new future Internet testbed architecture based on the open Infrastructure-as-a-service cloud and software defined network (SDN) paradigm is proposed. It extends the current virtual network service by adding programmable virtual switch and controller resources that can be controlled by the researcher. Its loose coupling model allows the testbed operator decouple the experiment service from the infrastructure provider, which is a more flexible way to build the testbed. The initial prototype implementation in this paper shows that this new testbed architecture built on IaaS cloud and SDN is feasible and flexible to provide programmable virtual network service.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 126-130"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60233-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90403540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60234-4
Yong-juan WU , Jun-xue LIANG , Hua ZHANG , Zhao-wen LIN , Yan MA , Zhong TIAN
A possible approach to cope with the diversity of future networks is to set up multiple isolated virtual networks on top of a single shared physical substrate, and each virtual network is customized to some specific purposes. However, in the current realization of virtualized infrastructure, the OpenStack infrastructure as a service (IaaS) cloud, whose isolation and programmability are limited in terms of scalability and performance. To overcome these limitations, we propose a solution based on software defined networking (SDN) which is composed of a centralized server and distributed agents. The server has complete view of the whole network substrate, and is responsible for the installation and management of virtual network through the distributed agents. Each agent has the local view of the substrate node. They can manage the local resources, dispatch and filter the inner- programmable virtual network (PVN) traffic based on MAC isolation which is more scalable than virtual local area network (VLAN) and more efficient than GRE. Our prototype implementation shows that this architecture is feasible and provides a better compromise between flexibility and performance than the solo centralized and distributed solutions.
应对未来网络多样性的一种可能方法是在单个共享物理基板上建立多个隔离的虚拟网络,并且每个虚拟网络都针对某些特定目的进行定制。然而,在目前虚拟化基础设施的实现中,OpenStack的IaaS (infrastructure as a service)云,其隔离性和可编程性在可扩展性和性能方面受到限制。为了克服这些限制,我们提出了一种基于软件定义网络(SDN)的解决方案,该解决方案由集中式服务器和分布式代理组成。服务器具有整个网络底层的完整视图,并通过分布式代理负责虚拟网络的安装和管理。每个代理都有基板节点的本地视图。基于MAC隔离的内部可编程虚拟网络(PVN)流量调度和过滤,具有比VLAN (virtual local area network)更强的可扩展性和比GRE更高效的优点。我们的原型实现表明,这种架构是可行的,并且比单独的集中式和分布式解决方案在灵活性和性能之间提供了更好的折衷。
{"title":"Programmable virtual network instantiation in IaaS cloud based on SDN","authors":"Yong-juan WU , Jun-xue LIANG , Hua ZHANG , Zhao-wen LIN , Yan MA , Zhong TIAN","doi":"10.1016/S1005-8885(13)60234-4","DOIUrl":"10.1016/S1005-8885(13)60234-4","url":null,"abstract":"<div><p>A possible approach to cope with the diversity of future networks is to set up multiple isolated virtual networks on top of a single shared physical substrate, and each virtual network is customized to some specific purposes. However, in the current realization of virtualized infrastructure, the OpenStack infrastructure as a service (IaaS) cloud, whose isolation and programmability are limited in terms of scalability and performance. To overcome these limitations, we propose a solution based on software defined networking (SDN) which is composed of a centralized server and distributed agents. The server has complete view of the whole network substrate, and is responsible for the installation and management of virtual network through the distributed agents. Each agent has the local view of the substrate node. They can manage the local resources, dispatch and filter the inner- programmable virtual network (PVN) traffic based on MAC isolation which is more scalable than virtual local area network (VLAN) and more efficient than GRE. Our prototype implementation shows that this architecture is feasible and provides a better compromise between flexibility and performance than the solo centralized and distributed solutions.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 121-125"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60234-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87292212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60235-6
Hong-kun QIU , Ya-jie WANG , Fu-xiang GAO , Quan QIU
Computer game (CG) is one of the most challenging research directions in the fields of computer science and artificial intelligence (AI). Relational techniques of computer game are discussed in this article. The main work is listed below as three aspects: First of all, we analyzed the characteristics of Surakarta and modeled the game process of Surakarta. Next then, we discussed the techniques of search engine, which include game state evaluation and game tree search. Lastly, a series of experiments for the search engine were done. And then, combined with the experiments we get the empirical equation. These techniques made the evaluation of the game state more accurate, and the performance of the search engine was more effective and intelligent. The results and conclusions of these experiments have some reference values to other computer game procedures. And they have been proved by a series of experiments and competitions.
{"title":"Research on search engine techniques of Surakarta game","authors":"Hong-kun QIU , Ya-jie WANG , Fu-xiang GAO , Quan QIU","doi":"10.1016/S1005-8885(13)60235-6","DOIUrl":"10.1016/S1005-8885(13)60235-6","url":null,"abstract":"<div><p>Computer game (CG) is one of the most challenging research directions in the fields of computer science and artificial intelligence (AI). Relational techniques of computer game are discussed in this article. The main work is listed below as three aspects: First of all, we analyzed the characteristics of Surakarta and modeled the game process of Surakarta. Next then, we discussed the techniques of search engine, which include game state evaluation and game tree search. Lastly, a series of experiments for the search engine were done. And then, combined with the experiments we get the empirical equation. These techniques made the evaluation of the game state more accurate, and the performance of the search engine was more effective and intelligent. The results and conclusions of these experiments have some reference values to other computer game procedures. And they have been proved by a series of experiments and competitions.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 117-120"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60235-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75594097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60240-X
Kun-kun DU , Zhi-liang WANG , Mi HONG
Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.
{"title":"Human machine interactive system on smart home of IoT","authors":"Kun-kun DU , Zhi-liang WANG , Mi HONG","doi":"10.1016/S1005-8885(13)60240-X","DOIUrl":"10.1016/S1005-8885(13)60240-X","url":null,"abstract":"<div><p>Along with the development of human-computer interaction technology and improvement of people's living standards, study of Internet of things (IoT) has become the focus for years. Meanwhile, smart home system has drawn more and more attention in IoT. In correlative research, artificial psychology theory and the harmony of human-computer interaction play an important role in smart home of IoT. In this study, software platform of the management system in smart home is designed, and users are Chinese. So the language in the system is Chinese. To analyze the basic interaction between users and computer, calendar, weather forecast, internet browsing, several electrical models are designed. To deal with the humanized interaction between human and computers, some features are implemented such as: analysis of emotional models, creation of the emotional models, text emotion recognition, and other basic functions in human-computer interaction.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 96-99"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60240-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74443617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60247-2
Xiao-yu WANG , yuan-an LIU , Gang XIE
This article proposes a novel dynamic spectrum sharing scheme in distributed multi-band cognitive radio networks. A non-cooperative game has been utilized to model the spectrum sharing among secondary base stations (SBSs). A distributed joint spectrum detection and power allocation algorithm is designed for maximizing the downlink throughput of secondary networks. Simulation results demonstrate that the proposed algorithm converges fast and achieves a better throughput performance than uniform threshold case. Meanwhile, the convergence of algorithm is proved by Nikaido-Isoda (N-I) function method.
{"title":"Distributed joint spectrum detection and power allocation in multi-band cognitive radio networks","authors":"Xiao-yu WANG , yuan-an LIU , Gang XIE","doi":"10.1016/S1005-8885(13)60247-2","DOIUrl":"10.1016/S1005-8885(13)60247-2","url":null,"abstract":"<div><p>This article proposes a novel dynamic spectrum sharing scheme in distributed multi-band cognitive radio networks. A non-cooperative game has been utilized to model the spectrum sharing among secondary base stations (SBSs). A distributed joint spectrum detection and power allocation algorithm is designed for maximizing the downlink throughput of secondary networks. Simulation results demonstrate that the proposed algorithm converges fast and achieves a better throughput performance than uniform threshold case. Meanwhile, the convergence of algorithm is proved by Nikaido-Isoda (N-I) function method.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 59-63"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60247-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80497913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-08-01DOI: 10.1016/S1005-8885(13)60254-X
Li ZHANG, Qing WANG, Bin TIAN
Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.
{"title":"Security threats and measures for the cyber-physical systems","authors":"Li ZHANG, Qing WANG, Bin TIAN","doi":"10.1016/S1005-8885(13)60254-X","DOIUrl":"10.1016/S1005-8885(13)60254-X","url":null,"abstract":"<div><p>Governments, companies and research institutions are pressuring research and development of the cyber-physical systems. However, the development of cyber-physical systems is constrained by security and privacy threats. This paper summarizes security threats to cyber-physical systems to provide a theoretical reference for study of cyber-physical systems as well as useful security measures. The architecture of cyber-physical systems is used to classify threats for the perception-execution layer, transport layer and application-control layer. The perception-execution layer threats include security threats for the nodes such as sensors and actuators. Transport layer threats include data leakage or damage and security issues during massive data integration. Application-control layer threats include the loss of user privacy, incorrect access control policies and inadequate security standards. Finally, this paper gives security measures and recommendations for all types of security threats.</p></div>","PeriodicalId":35359,"journal":{"name":"Journal of China Universities of Posts and Telecommunications","volume":"20 ","pages":"Pages 25-29"},"PeriodicalIF":0.0,"publicationDate":"2013-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S1005-8885(13)60254-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88129761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}