Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several securi...Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several security problems,e.g.key leakage,impersonation attack,MitM attack and single point of failure.In this paper,a blockchain based asymmetric authentication and key agreement protocol(BC-AKA)is proposed for distributed 5G core network.In particular,the key used in the authentication process is replaced from a symmetric key to an asymmetric key,and the database used to store keys in conventional 5G core network is replaced with a blockchain network.A proof of concept system for distributed 5G core network is built based on Ethereum and ECC-Secp256 k1,and the efficiency and effectiveness of the proposed scheme are verified by the experiment results.展开更多
Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types ...Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types of articles. Proceeding from writing strategies and linguistic features, the authors intend to share their experience with fellow researchers.展开更多
Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil a...Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil attacks, a new key distribution scheme for wireless sensor networks is presented. In this scheme, the key inforrmtion and node ID are associated, and then the attacker is dif-ficult to forge identity ID and the key inforrmtion corresponding to ID can not be forged. This scheme can use low-power to resist the Syhil attack and give full play to the resource advantages of the cluster head. The computing, storage and corrn^ni- cation is rminly undertaken by the cluster head o- verhead to achieve the lowest energy consumption and resist against nodes capture attack. Theoretical analysis and experimental results show that com- pared with the traditional scheme presented in Ref. [14], the capture rate of general nodes of cluster re-duces 40%, and the capture rate of cluster heads reduces 50%. So the scheme presented in this pa-per can improve resilience against nodes capture at- tack and reduce node power consumption.展开更多
In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital ec...In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital economy,sharing economy, online and offline consumption, Internet+education and soon.Keywords No.1:Internet+Work Report:1. Internet+was advanced across the board and new technologies and models were used to transform traditional industries. 2. We will speed up efforts to pursue Internet+in all industries and sectors.展开更多
Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We ...Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We suggest that knowledge that regards both literature and oral material as the major resources should be respected. These knowledge interrelates and completes each other.展开更多
expressions like "socialism with Chinese character- istics" and "comprehensively deepening reform?" Then help is at hand with a program launched in December to enable foreigners understand politi- cal and cultura...expressions like "socialism with Chinese character- istics" and "comprehensively deepening reform?" Then help is at hand with a program launched in December to enable foreigners understand politi- cal and cultural phrases,展开更多
基金supported by National Key Research and Development Program of China under Grant 2021YFE0205300Tianjin Natural Science Foundation(19JCYBJC15700)。
文摘Secure authentication between user equipment and 5G core network is a critical issue for 5G system.However,the traditional authentication protocol 5 G-AKA and the centralized key database are at risk of several security problems,e.g.key leakage,impersonation attack,MitM attack and single point of failure.In this paper,a blockchain based asymmetric authentication and key agreement protocol(BC-AKA)is proposed for distributed 5G core network.In particular,the key used in the authentication process is replaced from a symmetric key to an asymmetric key,and the database used to store keys in conventional 5G core network is replaced with a blockchain network.A proof of concept system for distributed 5G core network is built based on Ethereum and ECC-Secp256 k1,and the efficiency and effectiveness of the proposed scheme are verified by the experiment results.
文摘Folklore research entails field trips, serve as secondary role. Writing of title, abstract and while textual study and circumstantial investigation merely keywords for folklore papers differs from that of other types of articles. Proceeding from writing strategies and linguistic features, the authors intend to share their experience with fellow researchers.
基金This paper was supported by the National Science Foundation for Young Scholars of China under Crant No.61001091 .
文摘Wireless sensor network nodes (WSN nodes) have limited computing power, storage ca-pacity, conmmunication capabilities and energy and WSN nodes are easy to be paralyzed by Sybil at- tack. In order to prevent Sybil attacks, a new key distribution scheme for wireless sensor networks is presented. In this scheme, the key inforrmtion and node ID are associated, and then the attacker is dif-ficult to forge identity ID and the key inforrmtion corresponding to ID can not be forged. This scheme can use low-power to resist the Syhil attack and give full play to the resource advantages of the cluster head. The computing, storage and corrn^ni- cation is rminly undertaken by the cluster head o- verhead to achieve the lowest energy consumption and resist against nodes capture attack. Theoretical analysis and experimental results show that com- pared with the traditional scheme presented in Ref. [14], the capture rate of general nodes of cluster re-duces 40%, and the capture rate of cluster heads reduces 50%. So the scheme presented in this pa-per can improve resilience against nodes capture at- tack and reduce node power consumption.
文摘In the government work report for Two Sessions 2019, key words about E-commerce and internet were mentioned lots of times. This included terms such as Internet+, cross-border E-commerce,industrial internet, digital economy,sharing economy, online and offline consumption, Internet+education and soon.Keywords No.1:Internet+Work Report:1. Internet+was advanced across the board and new technologies and models were used to transform traditional industries. 2. We will speed up efforts to pursue Internet+in all industries and sectors.
文摘Titles、Abstracts and Key Words(1 th) Lu Guoyao A Brief Comment on "Documentary Linguistics"Abstract: Two thousand and five hundred years ago, Confucius attached great importance to "Document". We suggest that knowledge that regards both literature and oral material as the major resources should be respected. These knowledge interrelates and completes each other.
文摘expressions like "socialism with Chinese character- istics" and "comprehensively deepening reform?" Then help is at hand with a program launched in December to enable foreigners understand politi- cal and cultural phrases,