Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages ov...Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.展开更多
A study of wireless technologies for IoT applications in terms of power consumption has been presented in this paper. The study focuses on the importance of using low power wireless techniques and modules in IoT appli...A study of wireless technologies for IoT applications in terms of power consumption has been presented in this paper. The study focuses on the importance of using low power wireless techniques and modules in IoT applications by introducing a comparative between different low power wireless communication techniques such as ZigBee, Low Power Wi-Fi, 6LowPAN, LPWA and their modules to conserve power and longing the life for the IoT network sensors. The approach of the study is in term of protocol used and the particular module that achieve that protocol. The candidate protocols are classified according to the range of connectivity between sensor nodes. For short ranges connectivity the candidate protocols are ZigBee, 6LoWPAN and low power Wi-Fi. For long connectivity the candidate is LoRaWAN protocol. The results of the study demonstrate that the choice of module for each protocol plays a vital role in battery life due to the difference of power consumption for each module/protocol. So, the evaluation of protocols with each other depends on the module used.展开更多
Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, s...Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, such networks find use in a wide variety of applications, for example in collecting remote data, type of climate monitoring, seismic activity, or in other areas such?as home automation and medical. Unfortunately, their disadvantages are up to their promises. Indeed, the sensor nodes are subjected to high energy consumption constraints due to their compact size as well as the deployment environment. Frequent replacement of batteries is excluded in a field that can be difficult to access. Therefore, the main challenge remains as a result of miniaturization and reduces power consumption to maximize network lifetime. The objective of this work is to make a thorough study of the energy consumption in wireless sensor networks. The study points are addressed at the media access protocol or MAC protocol.展开更多
Based on the regular polyhedron model of multi-electronic atom combined with the Bohr hypothesis, the following supposition is put forward: the electron momentum multiplied by the inscribed sphere radius of edges of e...Based on the regular polyhedron model of multi-electronic atom combined with the Bohr hypothesis, the following supposition is put forward: the electron momentum multiplied by the inscribed sphere radius of edges of each regular polyhedron is equal to the Planck constant. The relationship between saturation magnetization rates and Planck constants is determined, and the ferromagnetism of atoms is obtained from regular dodecahedron and regular hexahedron. Then, terbium, dysprosium, and holmium saturation magnetization rate are obtained from electronic regular polyhedron configuration. Derivation of matter wave formula is from thermodynamics, avoiding over speed of light.展开更多
The periodic table of elements is arranged based on a series of regular polyhedron. The stability of inert gas atoms can be explained by the distribution of electrons, as well as their motion and magnetic force struct...The periodic table of elements is arranged based on a series of regular polyhedron. The stability of inert gas atoms can be explained by the distribution of electrons, as well as their motion and magnetic force structure. A magnetic force regular octahedron is proposed. It is a unique configuration that best satisfies the convergence of electrons moving in the same direction within regular polyhedra. In the case of an electrostatic force crust, the formal electron spin accounts for the crusts intrinsic magnetic moment exceeding the speed of light. If one is to consider that the electron has a magnetic outer layer and an electrostatic inner layer, then the question can be solved and abovementioned inference can provide the basis for magnetic force and momentum for the regular octahedron model. The electron periphery has twenty-petal adsorptive substances;the existence of adsorptive substance causes the magnetic force greater than the electrostatic force. Each electronic shell in the regular polyhedron is in accordance with the electron configuration of periodic table of elements;the kinetic track of each electron is a surface of regular polyhedron. The magnetic properties of iron, cobalt, and nickel can be explained by the regular dodecahedron electronic shell of an atom. The electron orbit converged from reverse direction can explain diamond. The adsorptive substances found in atomic nuclei and electrons are defined as magnetic particles called magnetons. The thermodynamic magneton theory can be better explained when it is analyzed using principles of thermodynamics, superconductivity, viscosity, and even in the creation of glass. The structure of the light is a helical line.展开更多
基金supported by Teaching Reform Project of Shenzhen University of Technology under Grant No.20231016.
文摘Vehicular ad hoc networks(VANETs)provide intelligent navigation and efficient route management,resulting in time savings and cost reductions in the transportation sector.However,the exchange of beacons and messages over public channels among vehicles and roadside units renders these networks vulnerable to numerous attacks and privacy violations.To address these challenges,several privacy and security preservation protocols based on blockchain and public key cryptography have been proposed recently.However,most of these schemes are limited by a long execution time and massive communication costs,which make them inefficient for on-board units(OBUs).Additionally,some of them are still susceptible to many attacks.As such,this study presents a novel protocol based on the fusion of elliptic curve cryptography(ECC)and bilinear pairing(BP)operations.The formal security analysis is accomplished using the Burrows–Abadi–Needham(BAN)logic,demonstrating that our scheme is verifiably secure.The proposed scheme’s informal security assessment also shows that it provides salient security features,such as non-repudiation,anonymity,and unlinkability.Moreover,the scheme is shown to be resilient against attacks,such as packet replays,forgeries,message falsifications,and impersonations.From the performance perspective,this protocol yields a 37.88%reduction in communication overheads and a 44.44%improvement in the supported security features.Therefore,the proposed scheme can be deployed in VANETs to provide robust security at low overheads.
文摘A study of wireless technologies for IoT applications in terms of power consumption has been presented in this paper. The study focuses on the importance of using low power wireless techniques and modules in IoT applications by introducing a comparative between different low power wireless communication techniques such as ZigBee, Low Power Wi-Fi, 6LowPAN, LPWA and their modules to conserve power and longing the life for the IoT network sensors. The approach of the study is in term of protocol used and the particular module that achieve that protocol. The candidate protocols are classified according to the range of connectivity between sensor nodes. For short ranges connectivity the candidate protocols are ZigBee, 6LoWPAN and low power Wi-Fi. For long connectivity the candidate is LoRaWAN protocol. The results of the study demonstrate that the choice of module for each protocol plays a vital role in battery life due to the difference of power consumption for each module/protocol. So, the evaluation of protocols with each other depends on the module used.
文摘Wireless sensor networks are currently experiencing widespread enthusiasm in the field of research, mainly because of the great benefits they promise in terms of flexibility, cost, range and robustness. In addition, such networks find use in a wide variety of applications, for example in collecting remote data, type of climate monitoring, seismic activity, or in other areas such?as home automation and medical. Unfortunately, their disadvantages are up to their promises. Indeed, the sensor nodes are subjected to high energy consumption constraints due to their compact size as well as the deployment environment. Frequent replacement of batteries is excluded in a field that can be difficult to access. Therefore, the main challenge remains as a result of miniaturization and reduces power consumption to maximize network lifetime. The objective of this work is to make a thorough study of the energy consumption in wireless sensor networks. The study points are addressed at the media access protocol or MAC protocol.
文摘Based on the regular polyhedron model of multi-electronic atom combined with the Bohr hypothesis, the following supposition is put forward: the electron momentum multiplied by the inscribed sphere radius of edges of each regular polyhedron is equal to the Planck constant. The relationship between saturation magnetization rates and Planck constants is determined, and the ferromagnetism of atoms is obtained from regular dodecahedron and regular hexahedron. Then, terbium, dysprosium, and holmium saturation magnetization rate are obtained from electronic regular polyhedron configuration. Derivation of matter wave formula is from thermodynamics, avoiding over speed of light.
文摘The periodic table of elements is arranged based on a series of regular polyhedron. The stability of inert gas atoms can be explained by the distribution of electrons, as well as their motion and magnetic force structure. A magnetic force regular octahedron is proposed. It is a unique configuration that best satisfies the convergence of electrons moving in the same direction within regular polyhedra. In the case of an electrostatic force crust, the formal electron spin accounts for the crusts intrinsic magnetic moment exceeding the speed of light. If one is to consider that the electron has a magnetic outer layer and an electrostatic inner layer, then the question can be solved and abovementioned inference can provide the basis for magnetic force and momentum for the regular octahedron model. The electron periphery has twenty-petal adsorptive substances;the existence of adsorptive substance causes the magnetic force greater than the electrostatic force. Each electronic shell in the regular polyhedron is in accordance with the electron configuration of periodic table of elements;the kinetic track of each electron is a surface of regular polyhedron. The magnetic properties of iron, cobalt, and nickel can be explained by the regular dodecahedron electronic shell of an atom. The electron orbit converged from reverse direction can explain diamond. The adsorptive substances found in atomic nuclei and electrons are defined as magnetic particles called magnetons. The thermodynamic magneton theory can be better explained when it is analyzed using principles of thermodynamics, superconductivity, viscosity, and even in the creation of glass. The structure of the light is a helical line.