Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of energy constrained systems.The system gains are usually optimized by designing resource all...Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of energy constrained systems.The system gains are usually optimized by designing resource allocation algorithm appropriately.However,few works focus on the interaction that channel’s time-vary characters make the energy transfer inefficiently.To address this,we propose a novel system operation sequence for sensor-cloud system where the Sinks provide SWIPT for sensor nodes opportunistically during downlink phase and collect the data transmitted from sensor nodes in uplink phase.Then,the energy-efficiency maximization problem of the Sinks is presented by considering the time costs and energy consumption of channel detection.It is proved that the formulated problem is an optimal stopping process with optimal stopping rules.An optimal energy-efficiency(OEE)algorithm is designed to obtain the optimal stopping rules for SWIPT.Finally,the simulations are performed based on the OEE algorithm compared with the other two strategies to verify the effectiveness and gains in improving the system efficiency.展开更多
Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to t...Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the SCS.In this paper,we propose a model with two interdependent networks to represent a sensor-cloud system.Besides,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading failure.When the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration threshold.Theoretically,this result is the critical maximum that the coupled SCS can withstand.To verify the correctness of the theoretical results,we further carried out actual simulation experiments.The results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority attacked.Similarly,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability.展开更多
In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protecti...In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protection algorithm based on local differential privacy(LDP) is proposed. Firstly, through the local obfuscation algorithm(LOA), the base station can get the data of the real location and the pseudo location by flipping a coin, and then send the data to the fog layer, then the obfuscation location domain set is obtained. Secondly, in order to reconstruct the location distribution of the real location and the pseudo location in the base station, the location domain of the base station is divided into several decentralized sub-regions, and a privacy location reconstruction algorithm(PLRA) is performed in each sub-region. Finally, the base station correlates the location information of each sub-region, and then uploads the data information containing the disturbance location to the fog node layer. The simulation results show that compared with the existing base station location anonymity and security technique(BLAST) algorithm, the proposed method not only reduce the algorithm’s running time and network delay, but also improve the data availability. So the proposed method can protect the location privacy of the base station more safely and efficiently.展开更多
基金This work was supported by Scientific Research Ability Improving Foundation for Young and Middle-Aged University Teachers in Guangxi(No.2020KY04030)The school introduces talents to start scientific research projects(No.2019KJQD17)+1 种基金This work was supported in part by the National Natural Science Foundation of China(No.61762010,No.61862007)Guangxi Natural Science Foundation(No.2018GXNSFAA138147).
文摘Leveraging energy harvesting abilities in wireless network devices has emerged as an effective way to prolong the lifetime of energy constrained systems.The system gains are usually optimized by designing resource allocation algorithm appropriately.However,few works focus on the interaction that channel’s time-vary characters make the energy transfer inefficiently.To address this,we propose a novel system operation sequence for sensor-cloud system where the Sinks provide SWIPT for sensor nodes opportunistically during downlink phase and collect the data transmitted from sensor nodes in uplink phase.Then,the energy-efficiency maximization problem of the Sinks is presented by considering the time costs and energy consumption of channel detection.It is proved that the formulated problem is an optimal stopping process with optimal stopping rules.An optimal energy-efficiency(OEE)algorithm is designed to obtain the optimal stopping rules for SWIPT.Finally,the simulations are performed based on the OEE algorithm compared with the other two strategies to verify the effectiveness and gains in improving the system efficiency.
基金supported by National Natural Science Foundation of China under Grant No.62072412,61902359,U1736115in part by the Opening Project of Shanghai Key Laboratory of Integrated Administration Technologies for Information Security under Grant No.AGK2018001.
文摘Based on the wide application of cloud computing and wireless sensor networks in various fields,the Sensor-Cloud System(SCS)plays an indispensable role between the physical world and the network world.However,due to the close connection and interdependence between the physical resource network and computing resource network,there are security problems such as cascading failures between systems in the SCS.In this paper,we propose a model with two interdependent networks to represent a sensor-cloud system.Besides,based on the percolation theory,we have carried out a formulaic theoretical analysis of the whole process of cascading failure.When the system’s subnetwork presents a steady state where there is no further collapse,we can obtain the largest remaining connected subgroup components and the penetration threshold.Theoretically,this result is the critical maximum that the coupled SCS can withstand.To verify the correctness of the theoretical results,we further carried out actual simulation experiments.The results show that a scale-free network priority attack’s percolation threshold is always less than that of ER network which is priority attacked.Similarly,when the scale-free network is attacked first,adding the power law exponentλcan be more intuitive and more effective to improve the network’s reliability.
基金supported by the National Natural Science Foundation of China (61202458, 61403109)the Natural Science Foundation of Heilongjiang Province of China(LH2020F034)the Harbin Science and Technology Innovation Research Funds (2016RAQXJ036)。
文摘In view of the privacy security issues such as location information leakage in the interaction process between the base station and the sensor nodes in the sensor-cloud system, a base station location privacy protection algorithm based on local differential privacy(LDP) is proposed. Firstly, through the local obfuscation algorithm(LOA), the base station can get the data of the real location and the pseudo location by flipping a coin, and then send the data to the fog layer, then the obfuscation location domain set is obtained. Secondly, in order to reconstruct the location distribution of the real location and the pseudo location in the base station, the location domain of the base station is divided into several decentralized sub-regions, and a privacy location reconstruction algorithm(PLRA) is performed in each sub-region. Finally, the base station correlates the location information of each sub-region, and then uploads the data information containing the disturbance location to the fog node layer. The simulation results show that compared with the existing base station location anonymity and security technique(BLAST) algorithm, the proposed method not only reduce the algorithm’s running time and network delay, but also improve the data availability. So the proposed method can protect the location privacy of the base station more safely and efficiently.