A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the messag...A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states.展开更多
Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and ...Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time.展开更多
In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third...In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.展开更多
A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified sce...A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans.展开更多
Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Researc...Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Research indicates that emergency department(ED)clinician interruptions occur every 4-10 min,which is significantly more common than in other specialties.[5]This increases the cognitive load and error rates and impacts patient care and clinical effi ciency.[1,2,5]De-prioritization protocols have been introduced in certain centers in the United Kingdom(UK),removing the need for clinician ECG interpretation where ECGs have been interpreted as normal by the machine.展开更多
Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the...Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.展开更多
In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challengin...In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challenging issue of how to obtain single protocol data frames from multiprotocol data frames. It can improve accuracy and efficiency by similarity between bit-stream data frames and clusters,extract clusters in the process of clustering. Every cluster obtained contains similarity evaluation index which is helpful to evaluation. More importantly,IAGNES algorithm can automatically recognize the number of cluster. Experiments on the data set published by Lincoln Laboratory shows that the algorithm can cluster the protocol data frames with high accuracy.展开更多
为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理...为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑.展开更多
Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles ...Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles were overcome in widely used protocols.An improved algorithm was proposed to solve existing problems,such as energy source restriction,communication distance,and energy of the nodes.The optimal number of clusters was calculated by the first-order radio model of the improved algorithm to determine the percentage of the cluster heads in the network.High energy and the near sink nodes were chosen as cluster heads based on the residual energy of the nodes and the distance between the nodes to the sink node.At the same time,the K-means clustering analysis method was used for equally assigning the nodes to several clusters in the network.Both simulation and the verification results showed that the survival number of the proposed algorithm LEACH-ED increased by 66%.Moreover,the network load was high and network lifetime was longer.The mathematical model between the average voltage of nodes(y)and the running time(x)was concluded in the equation y=−0.0643x+4.3694,and the correlation coefficient was R2=0.9977.The research results can provide a foundation and method for the design and simulation of the routing algorithm in agricultural WMSNs.展开更多
Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance...Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance in improving the energy efficiency of WSNs.The proposed technique mainly analyzes the clustering problem of WSNs when huge tasks are performed.Design/methodology/approach-This proposed improved ER-WC algorithm is used for analyzing various factors such as network cluster-head(CH)energy,CH location and CH density in improved ER-WCA.The proposed study will solve the energy efficiency and improve network throughput in WSNs.Findings-This proposed work provides optimal clustering method for Fuzzy C-means(FCM)where efficiency is improved in WSNs.Empirical evaluations are conducted to find network lifespan,network throughput,total network residual energy and network stabilization.Research limitations/implications-The proposed improved ER-WC algorithm has some implications when different energy levels of node are used in WSNs.Practical implications-This research work analyzes the nodes’energy and throughput by selecting correct CHs in intra-cluster communication.It can possibly analyze the factors such as CH location,network CH energy and CH density.Originality/value-This proposed research work proves to be performing better for improving the network throughput and increases energy efficiency for WSNs.展开更多
The vehicle routing problem with time windows (VRPTW) involves assigning a fleet of limited capacity vehicles to serve a set of customers without violating the capacity and time constraints. This paper presents a mu...The vehicle routing problem with time windows (VRPTW) involves assigning a fleet of limited capacity vehicles to serve a set of customers without violating the capacity and time constraints. This paper presents a multi-agent model system for the VRPTW based on the internal behavior of agents and coordination among the agents. The system presents a formal view of coordination using the traditional contract-net protocol (CNP) that relies on the basic loop of agent behavior for order receiving, order announcement, bid calculation, and order scheduling followed by order execution. An improved CNP method based on a vehicle selection strategy is used to reduce the number of negotiations and the negotiation time. The model is validated using Solomon's benchmarks, with the results showing that the improved CNP uses only 30% as many negotiations and only 70% of the negotiation time of the traditional CNP.展开更多
石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实...石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实验结果表明,采用histolene(C1OH16)、环保透明剂van-clear、正丁醇(n-butanol)和松节油(oil of turpentine)代替二甲苯(xylene),可避免二甲苯的毒性危害;同时精简了传统石蜡切片的操作程序,缩短了实验周期并提高了制片质量。展开更多
基金The National High Technology Research and Development Program of China(863Pro-gram)(No.2005AA145110)
文摘A new efficient protocol-proving algorithm was proposed for verifying security protocols. This algorithm is based on the improved authentication tests model, which enhances the original model by formalizing the message reply attack. With exact causal dependency relations between messages in this model, the protocol-proving algorithm can avoid the state explosion caused by asynchronous. In order to get the straight proof of security protocols, three authentication theorems are exploited for evaluating the agreement and distinction properties. When the algorithm terminates, it outputs either the proof results or the potential flaws of the security protocol. The experiment shows that the protocol-proving algorithm can detect the type flaw attack on Neuman-Stubblebine protocol, and prove the correctness of NSL protocol by exploring only 10 states.
基金This paper is supported in part by the National Natural Science Foundation of China(61701322)the Young and Middle-aged Science and Technology Innovation Talent Support Plan of Shenyang(RC190026)+1 种基金the Natural Science Foundation of Liaoning Province(2020-MS-237)the Liaoning Provincial Department of Education Science Foundation(JYT19052).
文摘Flying Ad hoc Network(FANET)has drawn significant consideration due to its rapid advancements and extensive use in civil applications.However,the characteristics of FANET including high mobility,limited resources,and distributed nature,have posed a new challenge to develop a secure and ef-ficient routing scheme for FANET.To overcome these challenges,this paper proposes a novel cluster based secure routing scheme,which aims to solve the routing and data security problem of FANET.In this scheme,the optimal cluster head selection is based on residual energy,online time,reputation,blockchain transactions,mobility,and connectivity by using Improved Artificial Bee Colony Optimization(IABC).The proposed IABC utilizes two different search equations for employee bee and onlooker bee to enhance convergence rate and exploitation abilities.Further,a lightweight blockchain consensus algorithm,AI-Proof of Witness Consensus Algorithm(AI-PoWCA)is proposed,which utilizes the optimal cluster head for mining.In AI-PoWCA,the concept of the witness for block verification is also involved to make the proposed scheme resource efficient and highly resilient against 51%attack.Simulation results demonstrate that the proposed scheme outperforms its counterparts and achieves up to 90%packet delivery ratio,lowest end-to-end delay,highest throughput,resilience against security attacks,and superior in block processing time.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61402058,61572086 and 61370203the Fund for Middle and Young Academic Leaders of Chengdu University of Information Technology under Grant No J201511+2 种基金the Science and Technology Support Project of Sichuan Province under Grant No 2013GZX0137the Fund for Young Persons Project of Sichuan Province under Grant No 12ZB017the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions under Grant No szjj2014-074
文摘In a recent work [Quantum Inf. Process 12 (2013) 1077], a multi-user protocol of quantum private comparison of equality (QPCE) is presented. Here we point out that if we relax the constraint of a semi-honest third party, the private information of the users will be totally leaked out to the third party. A special attack is demonstrated in detail. Furthermore, a possible improvement is proposed, which makes the protocol secure against this kind of attack.
基金supported by the Strategic Leading Project of the Chinese Academy of Sciences(No.XDA15014603).
文摘A reasonable parameter configuration helps improve the data transmission performance of the Licklider Transmission Protocol(LTP).Previous research has focused mainly on parameter optimization for LTP in simplified scenarios with one to two hops or multihop scenarios with a custody mechanism of the Bundle Protocol(BP).However,the research results are not applicable to communications in Complex Deep Space Networks(CDSNs)without the custody mechanism of BP that are more suitable for deep space communications with LTP.In this paper,we propose a model of file delivery time for LTP in CDSNs.Based on the model,we propose a Parameter Optimization Design Algorithm for LTP(LTP-PODA)of configuring reasonable parameters for LTP.The results show that the accuracy of the proposed model is at least 6.47%higher than that of the previously established models based on simple scenarios,and the proposed model is more suitable for CDSNs.Moreover,the LTP parameters are optimized by the LTP-PODA algorithm to obtain an optimization plan.Configuring the optimization plan for LTP improves the protocol transmission performance by at least 18.77%compared with configuring the other parameter configuration plans.
文摘Computer analysis of electrocardiograms(ECGs)was introduced more than 50 years ago,with the aim to improve efficiency and clinical workflow.[1,2]However,inaccuracies have been documented in the literature.[3,4]Research indicates that emergency department(ED)clinician interruptions occur every 4-10 min,which is significantly more common than in other specialties.[5]This increases the cognitive load and error rates and impacts patient care and clinical effi ciency.[1,2,5]De-prioritization protocols have been introduced in certain centers in the United Kingdom(UK),removing the need for clinician ECG interpretation where ECGs have been interpreted as normal by the machine.
文摘Quantitative security metrics are desirable for measuring the performance of information security controls. Security metrics help to make functional and business decisions for improving the performance and cost of the security controls. However, defining enterprise-level security metrics has already been listed as one of the hard problems in the Info Sec Research Council's hard problems list. Almost all the efforts in defining absolute security metrics for the enterprise security have not been proved fruitful. At the same time, with the maturity of the security industry, there has been a continuous emphasis from the regulatory bodies on establishing measurable security metrics. This paper addresses this need and proposes a relative security metric model that derives three quantitative security metrics named Attack Resiliency Measure(ARM), Performance Improvement Factor(PIF), and Cost/Benefit Measure(CBM) for measuring the performance of the security controls. For the effectiveness evaluation of the proposed security metrics, we took the secure virtual machine(VM) migration protocol as the target of assessment. The virtual-ization technologies are rapidly changing the landscape of the computing world. Devising security metrics for virtualized environment is even more challenging. As secure virtual machine migration is an evolving area and no standard protocol is available specifically for secure VM migration. This paper took the secure virtual machine migration protocol as the target of assessment and applied the proposed relative security metric model for measuring the Attack Resiliency Measure, Performance Improvement Factor, and Cost/Benefit Measure of the secure VM migration protocol.
基金Supported by the National Natural Science Foundation of China(No.F020704)
文摘In the process of protected protocol recognition,an improved AGglomerative NESting algorithm( IAGNES) with high adaptability is proposed,which is based on the AGglomerative NESting algorithm( AGNES),for the challenging issue of how to obtain single protocol data frames from multiprotocol data frames. It can improve accuracy and efficiency by similarity between bit-stream data frames and clusters,extract clusters in the process of clustering. Every cluster obtained contains similarity evaluation index which is helpful to evaluation. More importantly,IAGNES algorithm can automatically recognize the number of cluster. Experiments on the data set published by Lincoln Laboratory shows that the algorithm can cluster the protocol data frames with high accuracy.
文摘为解决石油行业大数据高效安全传输难题,将图像转化为三通道矩阵数据并对矩阵进行奇异值分解,综合考虑Laplace算子、灰度方差函数、离散余弦变换系数、图像相关系数、熵函数、图像结构相似度和图像信噪比等7个评价因素,利用熵权逼近理想解排序(technique for order preference by similarity to an ideal solution,TOPSIS)法对分解后的奇异值进行优选,在确保数据真实性的前提下用少量奇异值表征原始图像,进行图像压缩,降低数据大小,提高传输效率;提出多通道猫脸分割加密方法,分别对每个颜色通道的图像进行随机分割、随机加密和随机排序,解决了传统猫脸加密算法颜色通道线性相关度高,整体置乱度低的问题.结果表明:改进奇异值压缩技术在保证图像清晰的情况下仅利用15%的奇异值数据完成对图像的压缩,最大图像压缩比可达4.43,平均压缩后所占用的存储空间仅为原空间的26.29%,数据传输控制协议通信平均传输效率提高86.39%.在加密图像达到0相关的前提下,多通道猫脸分割加密算法加密图像在像素点处三通道颜色值完全不同,新方法颜色通道相关系数分别为0.20、0.22和0.25,对比传统猫脸加密方法,分别降低0.78、0.75和0.71.新方法加密效果好、难破解,可为石油行业数字化转型提供理论和技术支撑.
基金Project on the Integration of Industry,Education and Research of Henan Province(Grant No.142107000055,162107000026)Scientific and Technological Project of Henan Province(Grant No.152102210190,162102210202)+2 种基金Natural Science Foundation of Henan Educational Committee(Grant No.14B416004,14A416002 and 13A416264)Key Project of Henan Tobacco Company(HYKJ201316)Innovation Ability Foundation of Natural Science(Grant No.2013ZCX002)of Henan University of Science and Technology.
文摘Low Energy Adaptive Clustering Hierarchy(LEACH)is a routing algorithm in agricultural wireless multimedia sensor networks(WMSNs)that includes two kinds of improved protocol,LEACH_D and LEACH_E.In this study,obstacles were overcome in widely used protocols.An improved algorithm was proposed to solve existing problems,such as energy source restriction,communication distance,and energy of the nodes.The optimal number of clusters was calculated by the first-order radio model of the improved algorithm to determine the percentage of the cluster heads in the network.High energy and the near sink nodes were chosen as cluster heads based on the residual energy of the nodes and the distance between the nodes to the sink node.At the same time,the K-means clustering analysis method was used for equally assigning the nodes to several clusters in the network.Both simulation and the verification results showed that the survival number of the proposed algorithm LEACH-ED increased by 66%.Moreover,the network load was high and network lifetime was longer.The mathematical model between the average voltage of nodes(y)and the running time(x)was concluded in the equation y=−0.0643x+4.3694,and the correlation coefficient was R2=0.9977.The research results can provide a foundation and method for the design and simulation of the routing algorithm in agricultural WMSNs.
文摘Purpose-The paper aims to introduce an efficient routing algorithm for wireless sensor networks(WSNs).It proposes an improved evaporation rate water cycle(improved ER-WC)algorithm and outlining the systems performance in improving the energy efficiency of WSNs.The proposed technique mainly analyzes the clustering problem of WSNs when huge tasks are performed.Design/methodology/approach-This proposed improved ER-WC algorithm is used for analyzing various factors such as network cluster-head(CH)energy,CH location and CH density in improved ER-WCA.The proposed study will solve the energy efficiency and improve network throughput in WSNs.Findings-This proposed work provides optimal clustering method for Fuzzy C-means(FCM)where efficiency is improved in WSNs.Empirical evaluations are conducted to find network lifespan,network throughput,total network residual energy and network stabilization.Research limitations/implications-The proposed improved ER-WC algorithm has some implications when different energy levels of node are used in WSNs.Practical implications-This research work analyzes the nodes’energy and throughput by selecting correct CHs in intra-cluster communication.It can possibly analyze the factors such as CH location,network CH energy and CH density.Originality/value-This proposed research work proves to be performing better for improving the network throughput and increases energy efficiency for WSNs.
文摘The vehicle routing problem with time windows (VRPTW) involves assigning a fleet of limited capacity vehicles to serve a set of customers without violating the capacity and time constraints. This paper presents a multi-agent model system for the VRPTW based on the internal behavior of agents and coordination among the agents. The system presents a formal view of coordination using the traditional contract-net protocol (CNP) that relies on the basic loop of agent behavior for order receiving, order announcement, bid calculation, and order scheduling followed by order execution. An improved CNP method based on a vehicle selection strategy is used to reduce the number of negotiations and the negotiation time. The model is validated using Solomon's benchmarks, with the results showing that the improved CNP uses only 30% as many negotiations and only 70% of the negotiation time of the traditional CNP.
文摘石蜡切片是植物科学研究领域中一项重要的实验技术,为组织学的发展做出了卓越贡献。制片过程中采用不同试剂和处理程序对切片质量有较大的影响。该文针对常规石蜡切片方法在操作步骤上存在的繁琐及试剂安全性等问题,摸索出改进方法。实验结果表明,采用histolene(C1OH16)、环保透明剂van-clear、正丁醇(n-butanol)和松节油(oil of turpentine)代替二甲苯(xylene),可避免二甲苯的毒性危害;同时精简了传统石蜡切片的操作程序,缩短了实验周期并提高了制片质量。