首页 > 最新文献

2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control最新文献

英文 中文
Research on the Modification of Departure Angle Detection for Free Space Optical Communications 自由空间光通信出发角检测改进方法研究
Shiqi Jiang, Jing Ma, L. Tan
Atmospheric turbulence leads to a stochastic process of optical intensity and phase of beam. Thus, errors of departure angle detection are induced. In the paper, a new method to modify of departure angle detection is introduced to Free Space Optical Communications. Based on the phase retrieval, the new method only needs the intensity of the image on the focal plane to calculate the revising phase. The complexity of the algorithm is reduced. The performance and its validity have been simulated in the paper. The results show that the errors of departure angle induced by the atmospheric turbulence become smaller.
大气湍流导致光束光强和相位的随机过程。这样就会产生偏离角检测的误差。本文介绍了一种对自由空间光通信中出发角检测进行修正的新方法。该方法在相位检索的基础上,只需要图像在焦平面上的强度就可以计算出修正相位。降低了算法的复杂度。本文对该算法的性能和有效性进行了仿真。结果表明,大气湍流引起的出发角误差变小。
{"title":"Research on the Modification of Departure Angle Detection for Free Space Optical Communications","authors":"Shiqi Jiang, Jing Ma, L. Tan","doi":"10.1109/IMCCC.2011.168","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.168","url":null,"abstract":"Atmospheric turbulence leads to a stochastic process of optical intensity and phase of beam. Thus, errors of departure angle detection are induced. In the paper, a new method to modify of departure angle detection is introduced to Free Space Optical Communications. Based on the phase retrieval, the new method only needs the intensity of the image on the focal plane to calculate the revising phase. The complexity of the algorithm is reduced. The performance and its validity have been simulated in the paper. The results show that the errors of departure angle induced by the atmospheric turbulence become smaller.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"87 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122953780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fully Homomorphic Encryption Scheme Extended to Large Message Space 扩展到大消息空间的全同态加密方案
Han Jing-li, Yang Ming, Wang Zhao-Li
Gentry's fully homomorphic encryption scheme can only applied to single bit message, since the recrypt algorithm for full size message is relatively complicated. Based on Gentry's fully homomorphic encryption scheme, we provides a improvement and present a fully homomorphic encryption scheme which can encryption on n-bit message, and the asymptotic complexity is equal to Gentry's.
Gentry的全同态加密方案只能应用于单比特消息,因为全尺寸消息的加密算法相对复杂。在Gentry的全同态加密方案的基础上,提出了一种改进的全同态加密方案,该方案可以对n位消息进行加密,且其渐近复杂度等于Gentry的。
{"title":"Fully Homomorphic Encryption Scheme Extended to Large Message Space","authors":"Han Jing-li, Yang Ming, Wang Zhao-Li","doi":"10.1109/IMCCC.2011.138","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.138","url":null,"abstract":"Gentry's fully homomorphic encryption scheme can only applied to single bit message, since the recrypt algorithm for full size message is relatively complicated. Based on Gentry's fully homomorphic encryption scheme, we provides a improvement and present a fully homomorphic encryption scheme which can encryption on n-bit message, and the asymptotic complexity is equal to Gentry's.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Distance Bounding Protocol Using Error State and Punishment 使用错误状态和惩罚的距离边界协议
Wei Xin, Tao Yang, Cong Tang, Jian-bin Hu, Zhong Chen
This Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attack is a hot topic recently. A relay attack is a type of attack related to man-in-the-middle and replay attacks, in which an attacker relays verbatim a message from the sender to a valid receiver of the message. The sender may not be aware of even sending the message to the attacker. The main countermeasure against relay attack is the use of distance bounding protocols measuring the round-trip time between the reader and the tag. In this paper, we consider a modification of these protocols using `error state' which stands for the number of response bit errors that have already occurred. We set a maximal error number to prevent adversary from malicious queries, we also apply a punishment mechanism for error responding, which to my best knowledge is proposed at the first time in distance bounding protocols, if the tag sends one error bit, it should respond one more challenge bit to successfully finish the protocol. By using error state and punishment mechanism, the success probability for an adversary to access to the system decreases. Finally, we use the Hancke and Kuhn's protocol as a comparison, to show the improvements achieved when different cases are analyzed.
射频识别(RFID)系统面临着各种安全性和隐私性问题,其中中继攻击是近年来研究的热点问题。中继攻击是一种与中间人攻击和重放攻击相关的攻击类型,攻击者将消息从发送者逐字转发给消息的有效接收者。发送方甚至可能不知道将消息发送给攻击者。针对中继攻击的主要对策是使用距离边界协议来测量阅读器和标签之间的往返时间。在本文中,我们考虑使用“错误状态”来修改这些协议,它代表已经发生的响应位错误的数量。我们设置了最大错误数来防止对手恶意查询,我们还应用了错误响应的惩罚机制,据我所知,这是距离边界协议中第一次提出的,如果标签发送一个错误比特,它应该再响应一个挑战比特来成功完成协议。通过使用错误状态和惩罚机制,降低了攻击者成功访问系统的概率。最后,我们使用hanke和Kuhn协议作为比较,以显示在不同情况下分析所取得的改进。
{"title":"A Distance Bounding Protocol Using Error State and Punishment","authors":"Wei Xin, Tao Yang, Cong Tang, Jian-bin Hu, Zhong Chen","doi":"10.1109/IMCCC.2011.115","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.115","url":null,"abstract":"This Radio Frequency Identification (RFID) systems suffer from different security and privacy problems, among which relay attack is a hot topic recently. A relay attack is a type of attack related to man-in-the-middle and replay attacks, in which an attacker relays verbatim a message from the sender to a valid receiver of the message. The sender may not be aware of even sending the message to the attacker. The main countermeasure against relay attack is the use of distance bounding protocols measuring the round-trip time between the reader and the tag. In this paper, we consider a modification of these protocols using `error state' which stands for the number of response bit errors that have already occurred. We set a maximal error number to prevent adversary from malicious queries, we also apply a punishment mechanism for error responding, which to my best knowledge is proposed at the first time in distance bounding protocols, if the tag sends one error bit, it should respond one more challenge bit to successfully finish the protocol. By using error state and punishment mechanism, the success probability for an adversary to access to the system decreases. Finally, we use the Hancke and Kuhn's protocol as a comparison, to show the improvements achieved when different cases are analyzed.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127663392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Design and Implementation of the BPSK Modem Based on Software Defined Radio 基于软件无线电的BPSK调制解调器的设计与实现
Zhongjun Zhao, Yongliang Shen, Yuan Bai
The BPSK modulation and demodulation algorithm is designed and implemented of software defined radio (SDR) transceiver system in this paper. The paper uses a Costas loop to achieve carrier synchronization when the BPSK demodulator is designed. And the loop realize the purpose of phase detection using the more accurate and fewer hardware resources occupy arc tangent phase detector. Firstly, the BPSK modulation and demodulation algorithm is simulated on the plat of MATLAB, in order to prove the feasibility and superiority of the proposed design. Then the design is implemented and tested using field programmable gate arrays (FPGA). The test result indicates the system has strong versatility, interchangeability and portability. It overcomes the system shortcomings of traditional analog circuit, such as circuit complex, bulky, high cost and poor stability and so on. Therefore, the system has a high value.
本文设计并实现了软件定义无线电(SDR)收发系统的BPSK调制解调算法。在设计BPSK解调器时,采用Costas环实现载波同步。并且该环路实现了相位检测的目的,采用了精度更高、占用硬件资源更少的弧切鉴相器。首先,在MATLAB平台上对BPSK调制解调算法进行了仿真,以证明所提设计的可行性和优越性。然后利用现场可编程门阵列(FPGA)对该设计进行了实现和测试。测试结果表明,该系统具有较强的通用性、互换性和可移植性。它克服了传统模拟电路系统电路复杂、体积庞大、成本高、稳定性差等缺点。因此,该系统具有很高的价值。
{"title":"Design and Implementation of the BPSK Modem Based on Software Defined Radio","authors":"Zhongjun Zhao, Yongliang Shen, Yuan Bai","doi":"10.1109/IMCCC.2011.198","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.198","url":null,"abstract":"The BPSK modulation and demodulation algorithm is designed and implemented of software defined radio (SDR) transceiver system in this paper. The paper uses a Costas loop to achieve carrier synchronization when the BPSK demodulator is designed. And the loop realize the purpose of phase detection using the more accurate and fewer hardware resources occupy arc tangent phase detector. Firstly, the BPSK modulation and demodulation algorithm is simulated on the plat of MATLAB, in order to prove the feasibility and superiority of the proposed design. Then the design is implemented and tested using field programmable gate arrays (FPGA). The test result indicates the system has strong versatility, interchangeability and portability. It overcomes the system shortcomings of traditional analog circuit, such as circuit complex, bulky, high cost and poor stability and so on. Therefore, the system has a high value.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Research on Chaos Character for a Classification Raley System 分类谷系统混沌特性研究
Runsheng Yang, C. Hou
The paper is based on chaos theory, the system is described with differential inclusion method for the over-potontial relay a non-smooth system. The discontinuous special points are disposed, and the dynamical character is pledged. The analytic arithmetic is given to relay system with hysterresis, combined system parameter with chaos character affect, changing process of system is analyzed. The restrain relation between chaos system parameter is been studied. The system is simulated, the result shows that method is feasible and right.
本文以混沌理论为基础,用微分包含法对过电位继电器非光滑系统进行了系统描述。处理了不连续的特殊点,保证了系统的动态特性。给出了含迟滞继电器系统的解析算法,结合系统参数与混沌特性的影响,分析了系统的变化过程。研究了混沌系统参数之间的约束关系。对系统进行了仿真,结果表明该方法是可行和正确的。
{"title":"Research on Chaos Character for a Classification Raley System","authors":"Runsheng Yang, C. Hou","doi":"10.1109/IMCCC.2011.230","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.230","url":null,"abstract":"The paper is based on chaos theory, the system is described with differential inclusion method for the over-potontial relay a non-smooth system. The discontinuous special points are disposed, and the dynamical character is pledged. The analytic arithmetic is given to relay system with hysterresis, combined system parameter with chaos character affect, changing process of system is analyzed. The restrain relation between chaos system parameter is been studied. The system is simulated, the result shows that method is feasible and right.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115547362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Study of Security Routing Protocol for Wireless Sensor Network 无线传感器网络安全路由协议研究
Jiang Du, Jingyi Li
The primary goal of current routing protocols for wireless sensor network (WSN) is to improve the energy efficiency while guarantee the required communication. Therefore, Most protocols do not take security into consideration. As a result, many potential security problems exist in such protocols that they may be vulnerable to various attacks and cannot be applied to many fields. An illustration of various attacks on routing protocols is presented first. Then the current research status of security routing protocol was summarized. Finally, possible directions in future research were presented.
当前无线传感器网络路由协议的主要目标是在保证通信性能的同时提高网络的能量利用率。因此,大多数协议没有考虑安全性。因此,这种协议存在许多潜在的安全问题,容易受到各种攻击,不能应用于很多领域。首先给出了对路由协议的各种攻击的说明。然后对安全路由协议的研究现状进行了总结。最后,提出了今后可能的研究方向。
{"title":"A Study of Security Routing Protocol for Wireless Sensor Network","authors":"Jiang Du, Jingyi Li","doi":"10.1109/IMCCC.2011.68","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.68","url":null,"abstract":"The primary goal of current routing protocols for wireless sensor network (WSN) is to improve the energy efficiency while guarantee the required communication. Therefore, Most protocols do not take security into consideration. As a result, many potential security problems exist in such protocols that they may be vulnerable to various attacks and cannot be applied to many fields. An illustration of various attacks on routing protocols is presented first. Then the current research status of security routing protocol was summarized. Finally, possible directions in future research were presented.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114817827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
CryptoMiniSAT Solver Based Algebraic Side-Channel Attack on PRESENT 基于CryptoMiniSAT求解器的代数侧信道攻击
Wu Kehui, Wang Tao, Zhao Xinjie, L. Huiying
Algebraic Side-Channel Attack (ASCA) is a very generic and effective cryptanalysis technique combined Algebraic Cryptanalysis and Side-Channel Attack (SCA). How to apply new solver and utilize the leakage information maximizly are hot spots. In this paper, we introduce a new SAT solver-CryptoMiniSAT into ASCA, and propose an effective method to represent Hamming weight leakages into Boolean equations. Experiment results demonstrate that: CryptoMiniSAT solver has better performance than traditional Minis at Solver, the proposed Hamming weight representing method can make full use of the leakages, only 9 rounds randomly leakages are enough to obtain the full key of PRESENT-80 with unknown plaintext/cipher text, which is better than 26 rounds of previous works.
代数侧信道攻击(ASCA)是将代数密码分析与侧信道攻击(SCA)相结合的一种非常通用和有效的密码分析技术。如何应用新的求解器,最大限度地利用泄漏信息是研究的热点。本文在ASCA中引入了一种新的SAT求解器——cryptominisat,并提出了一种将汉明权泄漏表示为布尔方程的有效方法。实验结果表明:CryptoMiniSAT求解器在求解器上的性能优于传统的Minis,所提出的Hamming权值表示方法可以充分利用泄漏,只需9轮随机泄漏就足以获得未知明文/密文的PRESENT-80的完整密钥,优于以往26轮的工作。
{"title":"CryptoMiniSAT Solver Based Algebraic Side-Channel Attack on PRESENT","authors":"Wu Kehui, Wang Tao, Zhao Xinjie, L. Huiying","doi":"10.1109/IMCCC.2011.145","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.145","url":null,"abstract":"Algebraic Side-Channel Attack (ASCA) is a very generic and effective cryptanalysis technique combined Algebraic Cryptanalysis and Side-Channel Attack (SCA). How to apply new solver and utilize the leakage information maximizly are hot spots. In this paper, we introduce a new SAT solver-CryptoMiniSAT into ASCA, and propose an effective method to represent Hamming weight leakages into Boolean equations. Experiment results demonstrate that: CryptoMiniSAT solver has better performance than traditional Minis at Solver, the proposed Hamming weight representing method can make full use of the leakages, only 9 rounds randomly leakages are enough to obtain the full key of PRESENT-80 with unknown plaintext/cipher text, which is better than 26 rounds of previous works.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127565027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
VLSP: Enabling Location Privacy in Vehicular Location Based Services VLSP:在车载位置服务中启用位置隐私
Tao Yang, Cong Tang, Liangwen Yu, Wei Xin, Yong Deng, Jian-bin Hu, Zhong Chen
In this paper, we present VLSP, a Vehicular Location based Service with Privacy grantees. In VLSP, we assume the service provider is untrusted and users do not have pre-established social relationships with each other, we use standard cryptographic primitives, Broadcast Encryption (BE) and Attribute-based Encryption (ABE) to provide privacy guarantees. By using VLSP, we are able to protect users' location privacy in vehicular location sharing social services. VLSP is mainly composed with three parts: OBUs, RSUs, and vehicular location sharing service provider. RSUs use RFID readers to communicate with users' OBUs to log users' locations, and uses standard cryptographic primitives and BE-based mechanism to establish trust and protect privacy for users who share their location information. We leverage ABE-based mechanism on service provider to control who can see users' location information. We evaluate VLSP using protocol, security and system implementation analysis, and find VLSP is both privacy-preserving and feasible.
在本文中,我们提出了一种基于车辆位置的隐私授权服务VLSP。在VLSP中,我们假设服务提供者是不可信的,用户之间没有预先建立的社会关系,我们使用标准的加密原语,广播加密(BE)和基于属性的加密(ABE)来提供隐私保证。通过使用VLSP,我们可以在车辆位置共享社交服务中保护用户的位置隐私。VLSP主要由OBUs、rsu和车载位置共享服务提供商三部分组成。rsu使用RFID读写器与用户的OBUs通信记录用户的位置信息,并使用标准的加密原语和基于be的机制为共享位置信息的用户建立信任和保护隐私。我们利用基于abe的服务提供商机制来控制谁可以看到用户的位置信息。从协议分析、安全性分析和系统实现分析三个方面对VLSP进行了评价,发现VLSP具有良好的保密性和可行性。
{"title":"VLSP: Enabling Location Privacy in Vehicular Location Based Services","authors":"Tao Yang, Cong Tang, Liangwen Yu, Wei Xin, Yong Deng, Jian-bin Hu, Zhong Chen","doi":"10.1109/IMCCC.2011.121","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.121","url":null,"abstract":"In this paper, we present VLSP, a Vehicular Location based Service with Privacy grantees. In VLSP, we assume the service provider is untrusted and users do not have pre-established social relationships with each other, we use standard cryptographic primitives, Broadcast Encryption (BE) and Attribute-based Encryption (ABE) to provide privacy guarantees. By using VLSP, we are able to protect users' location privacy in vehicular location sharing social services. VLSP is mainly composed with three parts: OBUs, RSUs, and vehicular location sharing service provider. RSUs use RFID readers to communicate with users' OBUs to log users' locations, and uses standard cryptographic primitives and BE-based mechanism to establish trust and protect privacy for users who share their location information. We leverage ABE-based mechanism on service provider to control who can see users' location information. We evaluate VLSP using protocol, security and system implementation analysis, and find VLSP is both privacy-preserving and feasible.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"4 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126138513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Embedded Ethernet Remote Monitoring System Based on DSP 基于DSP的嵌入式以太网远程监控系统
Dong Wenjie, Zhang Chunxia, Z. Chunmei, Zhang Jun, Lin Jin-yong
This paper brings out the architecture of an embedded Ethernet remote monitoring system, gives the hardware implement method on data collector based on TMS320C6747 and RTL8306. On the basis of TI's NDK, we achieve the data communication between data collector and remote sensors. Sensors in this monitoring system have auto-enumeration function, by shaking with data collector, the monitoring system can auto-recognize the sensor accessing into the system, then configure it and manage it. Monitoring center computer accesses data stored in data collector via USB or PCI, then processes the data, and achieves the monitoring to surveyed environment.
提出了一种嵌入式以太网远程监控系统的体系结构,给出了基于TMS320C6747和RTL8306的数据采集器的硬件实现方法。在TI的NDK基础上,实现了数据采集器与遥测器之间的数据通信。本监控系统中的传感器具有自动枚举功能,通过与数据采集器的联动,监控系统可以自动识别进入系统的传感器,并对其进行配置和管理。监控中心计算机通过USB或PCI接口访问存储在数据采集器中的数据,对数据进行处理,实现对被测环境的监控。
{"title":"Embedded Ethernet Remote Monitoring System Based on DSP","authors":"Dong Wenjie, Zhang Chunxia, Z. Chunmei, Zhang Jun, Lin Jin-yong","doi":"10.1109/IMCCC.2011.163","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.163","url":null,"abstract":"This paper brings out the architecture of an embedded Ethernet remote monitoring system, gives the hardware implement method on data collector based on TMS320C6747 and RTL8306. On the basis of TI's NDK, we achieve the data communication between data collector and remote sensors. Sensors in this monitoring system have auto-enumeration function, by shaking with data collector, the monitoring system can auto-recognize the sensor accessing into the system, then configure it and manage it. Monitoring center computer accesses data stored in data collector via USB or PCI, then processes the data, and achieves the monitoring to surveyed environment.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125983619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Taint Analysis with Control Flow Graph for Vulnerability Analysis 基于控制流图的脆弱性动态污点分析
Z. Chen, Xiao Juan Wang, X. Zhang
In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed to show the correctness of the proposed methods.
近年来,软件漏洞是计算机系统安全事故的主要原因之一。动态污点分析是软漏洞挖掘中跟踪敏感信息流动的有效方法。本文提出了一种控制相关的动态污染分析方法,即跟踪敏感信息。最后给出了仿真结果,验证了所提方法的正确性。
{"title":"Dynamic Taint Analysis with Control Flow Graph for Vulnerability Analysis","authors":"Z. Chen, Xiao Juan Wang, X. Zhang","doi":"10.1109/IMCCC.2011.66","DOIUrl":"https://doi.org/10.1109/IMCCC.2011.66","url":null,"abstract":"In recent years, software vulnerabilities are one of the main causes of security incidents in computer systems. Dynamic taint analysis is an efficient method to track the flow of sensitive information for soft vulnerability mining. In this paper, we present the method for dynamic taint analysis with control dependent is to tracking sensitive information. And finally, the simulation results are proposed to show the correctness of the proposed methods.","PeriodicalId":446508,"journal":{"name":"2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123166775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2011 First International Conference on Instrumentation, Measurement, Computer, Communication and Control
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1