Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies...Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.展开更多
Many studies have been done in cognitive radios to maximize the network efficiency. There is always a trade-off between sensing and transmission time which has been addressed fully in the literature. There is also som...Many studies have been done in cognitive radios to maximize the network efficiency. There is always a trade-off between sensing and transmission time which has been addressed fully in the literature. There is also some missed idle times during the waiting phase when secondary user finds the channel busy. Therefore, the longer the transmission time is, the higher the successfully delivered bits would be and the higher the missed idle times in the waiting stage would be expected. In this work, we formulate these missed idle times to addressed this trade-off. Furthermore, interference due to PU re-occupancy is modelled in successful transmitted time and in collision probability. Moreover, we derive secondary user's packet delay distribution using phase type model at which retransmission due to collision results from both sensing error and PU re-occupancy is considered. Thanks to derived delay distribution, any statistical moments of delay could be found as a closed form mathematical expression. These moments can be used as constraints for applications with delay sensitive packets. Numerical results are given to clarify the network metrics. Finally, the optimized values for sensing and transmission time are computed using genetic algorithm in order to maximize access efficiency.展开更多
While operators have started deploying fourth generation(4G) wireless communication systems,which could provide up to1 Gbps downlink peak data rate,the improved system capacity is still insufficient to meet the drasti...While operators have started deploying fourth generation(4G) wireless communication systems,which could provide up to1 Gbps downlink peak data rate,the improved system capacity is still insufficient to meet the drastically increasing demand of mobile users over the next decade.The main causes of the above-mentioned phenomenon include the following two aspects:1) the growth rate of the network capacity is far below that of user's demand,and 2) the relatively deterministic wireless access network(WAN) architecture in the existing systems cannot accommodate the prominent increase of mobile traffic with space-time domain dynamics.In order to address the above-mentioned challenges,we investigate the time-spatial consistency architecture for the future WAN,whilst emphasizing the critical roles of some spectral-efficient techniques such as Massive multiple-input multiple-output(MIMO),full-duplex(FD)operation and heterogeneous networks(HetNets).Furthermore,the energy efficiency(EE)of the HetNets under the proposed architecture is also evaluated,showing that the proposed user-selected uplink power control algorithm outperforms the traditional stochastic-scheduling strategy in terms of both capacity and EE in a two-tier HetNet.The other critical issues,including the tidal effect,the temporal failure owing to the instantaneously increased traffic,and the network wide load-balancing problem,etc.,are also anticipated to be addressed in the proposed architecture.(Abstract)展开更多
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul...For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network lifetime.For saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor Networks.Because of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure.For increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor nodes.An Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster Head.The data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the BS.Thus,the MCH overhead reduces.During the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.展开更多
Engineering application domains need database management systems to supply them with a good means of modeling, a high data access efficiency and a language interface with strong functionality. This paper presents a se...Engineering application domains need database management systems to supply them with a good means of modeling, a high data access efficiency and a language interface with strong functionality. This paper presents a semantic hypergraph model based on relations, in order to express many-to-many relations among objects belonging to defferent semanic classes in engineering applications. A management mechanism expressed by the model and the basic data of engineering databases are managed in main memory. Especially, different objects are linked by different kinds of semantics defined by users, therefore the table swap, the record swap and some unnecessary examinations are reduced and the access efficiency of the engineering data is increased.C language interface that includes some generic and special functionality is proposed for closer connection with application programs.展开更多
基金supported by the NSFC(61173141,U1536206,61232016, U1405254,61373133,61502242,61572258)BK20150925+3 种基金Fund of Jiangsu Engineering Center of Network Monitoring(KJR1402)Fund of MOE Internet Innovation Platform(KJRP1403)CICAEETthe PAPD fund
文摘Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted data.In some common designs,attributes are managed by an attribute authority that is supposed to be fully trustworthy.This concept implies that the attribute authority can access all encrypted data,which is known as the key escrow problem.In addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE scheme.In this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user revocation.First,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access controller.Second,an efficient user revocation mechanism is achieved using a version key that supports forward and backward security.The analysis proves that our scheme is secure and efficient in user authorization and revocation.
基金supported by Islamic Azad University,Boroujerd Branch,Iran
文摘Many studies have been done in cognitive radios to maximize the network efficiency. There is always a trade-off between sensing and transmission time which has been addressed fully in the literature. There is also some missed idle times during the waiting phase when secondary user finds the channel busy. Therefore, the longer the transmission time is, the higher the successfully delivered bits would be and the higher the missed idle times in the waiting stage would be expected. In this work, we formulate these missed idle times to addressed this trade-off. Furthermore, interference due to PU re-occupancy is modelled in successful transmitted time and in collision probability. Moreover, we derive secondary user's packet delay distribution using phase type model at which retransmission due to collision results from both sensing error and PU re-occupancy is considered. Thanks to derived delay distribution, any statistical moments of delay could be found as a closed form mathematical expression. These moments can be used as constraints for applications with delay sensitive packets. Numerical results are given to clarify the network metrics. Finally, the optimized values for sensing and transmission time are computed using genetic algorithm in order to maximize access efficiency.
基金supported by the key project of the National Natural Science Foundation of China(No.61431001)the 863 project No.2014AA01A701+4 种基金Program for New Century Excellent Talents in University(NECT12-0774)the open research fund of National Mobile Communications Research Laboratory Southeast University(No.2013D12)Fundamental Research Funds for the Central Universities(FRF-BD-15-012A)the Research Foundation of China Mobilethe Foundation of Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services
文摘While operators have started deploying fourth generation(4G) wireless communication systems,which could provide up to1 Gbps downlink peak data rate,the improved system capacity is still insufficient to meet the drastically increasing demand of mobile users over the next decade.The main causes of the above-mentioned phenomenon include the following two aspects:1) the growth rate of the network capacity is far below that of user's demand,and 2) the relatively deterministic wireless access network(WAN) architecture in the existing systems cannot accommodate the prominent increase of mobile traffic with space-time domain dynamics.In order to address the above-mentioned challenges,we investigate the time-spatial consistency architecture for the future WAN,whilst emphasizing the critical roles of some spectral-efficient techniques such as Massive multiple-input multiple-output(MIMO),full-duplex(FD)operation and heterogeneous networks(HetNets).Furthermore,the energy efficiency(EE)of the HetNets under the proposed architecture is also evaluated,showing that the proposed user-selected uplink power control algorithm outperforms the traditional stochastic-scheduling strategy in terms of both capacity and EE in a two-tier HetNet.The other critical issues,including the tidal effect,the temporal failure owing to the instantaneously increased traffic,and the network wide load-balancing problem,etc.,are also anticipated to be addressed in the proposed architecture.(Abstract)
基金The authors would like to thank for the support from Taif University Researchers Supporting Project number(TURSP-2020/239),Taif University,Taif,Saudi Arabia.
文摘For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network lifetime.For saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor Networks.Because of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure.For increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor nodes.An Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster Head.The data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the BS.Thus,the MCH overhead reduces.During the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods.
文摘Engineering application domains need database management systems to supply them with a good means of modeling, a high data access efficiency and a language interface with strong functionality. This paper presents a semantic hypergraph model based on relations, in order to express many-to-many relations among objects belonging to defferent semanic classes in engineering applications. A management mechanism expressed by the model and the basic data of engineering databases are managed in main memory. Especially, different objects are linked by different kinds of semantics defined by users, therefore the table swap, the record swap and some unnecessary examinations are reduced and the access efficiency of the engineering data is increased.C language interface that includes some generic and special functionality is proposed for closer connection with application programs.