Wireless Sensor networks will play an important role in the next generation pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures are different from conventional network security management methods. This paper proposed a security management model for self-organizing wireless sensor networks based on intrusion detection. It can prevent most of attacks. Then an analysis of each layer of networks in our security model is discussed and the security management measures in the data link layer and network layer are described in detail especially.
{"title":"Study on Security Management Architecture for Sensor Network Based on Intrusion Detection","authors":"Xiong-qing Peng, Zheng Wu, Debao Xiao, Yang Yu","doi":"10.1109/NSWCTC.2009.210","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.210","url":null,"abstract":"Wireless Sensor networks will play an important role in the next generation pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures are different from conventional network security management methods. This paper proposed a security management model for self-organizing wireless sensor networks based on intrusion detection. It can prevent most of attacks. Then an analysis of each layer of networks in our security model is discussed and the security management measures in the data link layer and network layer are described in detail especially.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yong-Min Liu, Xin-hua Jiang, X. Nian, Wu-Yi Lu, Sheng Yang
With the rapid development of Internet applications and the fast increasing number of users, the traditional network protocol layered only by the basic communication functions can create barriers rather than stimulants to its further development. This paper analyzes the problems and challenges of the classic Internet communication protocol, explicit the important features that NGI (Next Generation Internet) of vitality architecture possess under the current networks environment, proposed trustworthy network model. So it establishes the fundament of theory for further research and development the NGI in the future.
{"title":"A Trustworthy Next Generation Internet Protocol Model","authors":"Yong-Min Liu, Xin-hua Jiang, X. Nian, Wu-Yi Lu, Sheng Yang","doi":"10.1109/NSWCTC.2009.241","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.241","url":null,"abstract":"With the rapid development of Internet applications and the fast increasing number of users, the traditional network protocol layered only by the basic communication functions can create barriers rather than stimulants to its further development. This paper analyzes the problems and challenges of the classic Internet communication protocol, explicit the important features that NGI (Next Generation Internet) of vitality architecture possess under the current networks environment, proposed trustworthy network model. So it establishes the fundament of theory for further research and development the NGI in the future.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xingqiao Liu, Yiying Liu, Chengchun Li, Guohai Liu
a new multi-parameter monitoring system based on wireless sensor network is introduced in the paper. The system synthetically applies the technology of modern senor, circle system and wireless data transmission. Multi-parameter collection, transmission and display of the water environment, such as salinity, temperature, are realized by the system, and the fast and accurate transmission of the data between senor detecting nodes and sink nodes is achieved by wireless network. Then the system realizes the real time remote supervisory for the multi-parameter of water environment. Because of its simple structure, fast data transmission and easily function extended, the system is suitable for many fields such as intelligent greenhouse, storage monitoring, industrial production and so on.
{"title":"A New Multi-parameter Monitoring System Based on Wireless Sensor Network","authors":"Xingqiao Liu, Yiying Liu, Chengchun Li, Guohai Liu","doi":"10.1109/NSWCTC.2009.147","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.147","url":null,"abstract":"a new multi-parameter monitoring system based on wireless sensor network is introduced in the paper. The system synthetically applies the technology of modern senor, circle system and wireless data transmission. Multi-parameter collection, transmission and display of the water environment, such as salinity, temperature, are realized by the system, and the fast and accurate transmission of the data between senor detecting nodes and sink nodes is achieved by wireless network. Then the system realizes the real time remote supervisory for the multi-parameter of water environment. Because of its simple structure, fast data transmission and easily function extended, the system is suitable for many fields such as intelligent greenhouse, storage monitoring, industrial production and so on.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the era of network, B2B electronic commerce (EC) has become new bright spot to accelerate economy and trend of future business development gradually and it also becomes one of major reasons to economic gaps between developing countries and developed countries. However, there are lacks of research on Chinese B2B EC at present; especially it is lack of research on coordinate control among enterprises in Chinese B2B EC. Therefore, the paper analyzes the modeling of coordinate control among enterprises in B2B EC, and suggests realizing coordinate control among enterprises in B2B EC by case-based reasoning (CBR). Then, the paper designs case expression, case index, case adjustment and so on in coordinate control among enterprises in B2B EC. At last, the paper puts forward the lack of the research and points out the orientation of future research
{"title":"Coordinate Control Modeling among Enterprises in B2B EC Based on CBR","authors":"Shibin Su, Zhenyu Liu, Zhengbing Hu","doi":"10.1109/NSWCTC.2009.71","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.71","url":null,"abstract":"In the era of network, B2B electronic commerce (EC) has become new bright spot to accelerate economy and trend of future business development gradually and it also becomes one of major reasons to economic gaps between developing countries and developed countries. However, there are lacks of research on Chinese B2B EC at present; especially it is lack of research on coordinate control among enterprises in Chinese B2B EC. Therefore, the paper analyzes the modeling of coordinate control among enterprises in B2B EC, and suggests realizing coordinate control among enterprises in B2B EC by case-based reasoning (CBR). Then, the paper designs case expression, case index, case adjustment and so on in coordinate control among enterprises in B2B EC. At last, the paper puts forward the lack of the research and points out the orientation of future research","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A wide-bandwidth low-noise VCO used in PLL system was investigated, including a harmonic filtering resistor and source damping resistors to reduce the phase noise and power dissipation. The back-to-back varactor topology is identified as a suitable solution to linearize the tank capacitance. The amplitude to phase noise conversion is greatly attenuated. The circuit was simulated using 0.35um CMOS technology in Mentor Graphics Eldo-RF environment, the simulation results show that the phase noise of the oscillator can reach -119.5dBc/Hz@1MHz, the power dissipation is 3.0mw at 2.4GHz.
{"title":"Design and Analysis of VCO in PLL System","authors":"Xiu-long Wu, Jun-ning Chen, Meng Jian","doi":"10.1109/NSWCTC.2009.392","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.392","url":null,"abstract":"A wide-bandwidth low-noise VCO used in PLL system was investigated, including a harmonic filtering resistor and source damping resistors to reduce the phase noise and power dissipation. The back-to-back varactor topology is identified as a suitable solution to linearize the tank capacitance. The amplitude to phase noise conversion is greatly attenuated. The circuit was simulated using 0.35um CMOS technology in Mentor Graphics Eldo-RF environment, the simulation results show that the phase noise of the oscillator can reach -119.5dBc/Hz@1MHz, the power dissipation is 3.0mw at 2.4GHz.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, the Rough Sets theory was introduced, then on the basis of analyzing and creating the index system of certain weapon system’s shooting targets, RS was used to impersonally distribute weight vectors. It overcame the problems of subjectivist empower rules The RS comprehensive evaluation model of the targets system was given out according to the practical cases. The sequence of threatening degree and evaluation grade of the targets were educed last. This practical model offers reference for the commanders of the antiaircraft forces.
{"title":"Comprehensive Evaluation of Shooting Goals Based on Rough Sets","authors":"Xiao-quan Li, Qunsong Zhu, Jian-bo Ren","doi":"10.1109/NSWCTC.2009.227","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.227","url":null,"abstract":"In this paper, the Rough Sets theory was introduced, then on the basis of analyzing and creating the index system of certain weapon system’s shooting targets, RS was used to impersonally distribute weight vectors. It overcame the problems of subjectivist empower rules The RS comprehensive evaluation model of the targets system was given out according to the practical cases. The sequence of threatening degree and evaluation grade of the targets were educed last. This practical model offers reference for the commanders of the antiaircraft forces.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key management schemes. With the lower cost of computation and communication, our scheme is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.
{"title":"An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks","authors":"Hua Sun, Xue-feng Zheng, Zhongjun Deng","doi":"10.1109/NSWCTC.2009.291","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.291","url":null,"abstract":"This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key management schemes. With the lower cost of computation and communication, our scheme is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper proposes a new simple efficient electronic voting scheme based on quadratic residue. Through analysis, the scheme satisfies the basic security requirements for a electronic voting system.
{"title":"An Efficient Electronic Voting Scheme Based on Quadratic Residue","authors":"Wen Chen, Yun Wu, Feng Pan, Feiyu Lei","doi":"10.1109/NSWCTC.2009.223","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.223","url":null,"abstract":"This paper proposes a new simple efficient electronic voting scheme based on quadratic residue. Through analysis, the scheme satisfies the basic security requirements for a electronic voting system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remote control network is a research focus in the application domain of wireless communication technology. Zigbee technology makes up for the vacancy of wireless communication market in the low-cost and low-power equipment domain. This paper presents the design and application of wirless sensor network web server based on S3C2410 and Zigbee protocol. This server can realize real-time motoring and control for the remote object. With B/S structures and modular design method, hardware and software design is introduced, and key implementation techniques are described. It has been proved that the server runs stability and has good scalability, which can be widely used in smart home, monitoring systems, industrial control, and other fields
{"title":"Design and Application of Wirless Sensor Network Web Server Based on S3C2410 and Zigbee Protocol","authors":"J. Yongping, Feng Zehao, Xu Du","doi":"10.1109/NSWCTC.2009.404","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.404","url":null,"abstract":"Remote control network is a research focus in the application domain of wireless communication technology. Zigbee technology makes up for the vacancy of wireless communication market in the low-cost and low-power equipment domain. This paper presents the design and application of wirless sensor network web server based on S3C2410 and Zigbee protocol. This server can realize real-time motoring and control for the remote object. With B/S structures and modular design method, hardware and software design is introduced, and key implementation techniques are described. It has been proved that the server runs stability and has good scalability, which can be widely used in smart home, monitoring systems, industrial control, and other fields","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The estimation of carrier frequency of communication signals with high estimation precision and wide estimation range is required in lots of applications. A carrier frequency estimation algorithm based on Maximum-likelihood principle and iterative process with high precision and wide estimation range is proposed in this paper. The performance of the iterative algorithm is compared with the other two widely used classic carrier frequency estimation algorithms by computer simulations. In simulation results, the iterative algorithm has better performance than the others’.
{"title":"A Simple Iterative Carrier Frequency Estimation Algorithm","authors":"Hua Xu, Dongmei Zhang","doi":"10.1109/NSWCTC.2009.178","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.178","url":null,"abstract":"The estimation of carrier frequency of communication signals with high estimation precision and wide estimation range is required in lots of applications. A carrier frequency estimation algorithm based on Maximum-likelihood principle and iterative process with high precision and wide estimation range is proposed in this paper. The performance of the iterative algorithm is compared with the other two widely used classic carrier frequency estimation algorithms by computer simulations. In simulation results, the iterative algorithm has better performance than the others’.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}