In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deploym...In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind spots.However,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic environments.Nevertheless,research in this area still needs to be conducted.This paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this problem.This algorithm considers the dynamic alterations in obstacle locations within the designated area.It determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage rates.The experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle positions.Experimental results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles change.With 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.展开更多
In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after t...In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.展开更多
Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, cluster...Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, clustering is considered a key technique in minimizing the consumed energy. However, few clustering protocols address the sensing coverage metric. This paper proposes a general framework that addresses both metrics for clustering algorithms in wireless sensor networks. The proposed framework is based on applying the principles of Virtual Field Force on each cluster within the network in order to move the sensor nodes towards proper locations that maximize the sensing coverage and minimize the transmitted energy. Two types of virtual forces are used: an attractive force that moves the nodes towards the cluster head in order to reduce the energy used for communication and a repulsive force that moves the overlapping nodes away from each other such that their sensing coverage is maximized. The performance of the proposed mechanism was evaluated by applying it to the well-known LEACH clustering algorithm. The simulation results demonstrate that the proposed mechanism improves the performance of the LEACH protocol considerably in terms of the achieved sensing coverage, and the network lifetime.展开更多
One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Auto...One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Automatic Teller Machines (ATM’s), smartcards, and mobile phone SIM cards. In this paper, we present area-efficient and high-throughput FPGA implementations of the DES which are developed using the Xilinx FPGA ISE design suite. In fact, we propose modifications on the fastest DES design reported in the literature and achieve 1.1 times higher speed. Also, we introduce an 8-stage pipelined design that needs only 0.75 times the registers and consumes 0.65 times the power of a similar 16-stages pipelined design. High-speed design and synthesis optimization techniques including pipelining, register retiming, and logic replication are used. Post- layout synthesis results show that the proposed implementations achieve high throughput-to-area ratio. To make a fair comparison, the proposed designs were synthesized using matching FPGA devices as being used by other implementations reported in the literature.展开更多
Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The co...Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The correlations among the sample sequences in the preamble are investigated, especially the correlation between the first sample sequence and the last sample sequence in the long preamble. The conventional joint timing and frequency synchronization algorithm is reviewed based on the short preamble referring to the algorithm proposed by Schmidl, then a robust joint timing and frequency synchronization algorithm is proposed based on the long preamble. The simulations in the multi-path and frequency selective fading channel show that the proposed algorithm has improved the performances of timing metric plateau, timing offset and synchronization acquisition time even when signal-to-noise ratio is less than -5 dB.展开更多
Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy ...Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks.展开更多
By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four si...By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0'〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0'〉. By using the |0'〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042.展开更多
A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping.The legitimate identities of communicating parties are enco...A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping.The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence.Secret messages are transmitted by using the classical XOR operation,which serves as a one-time-pad.No photon with secret information transmits in the quantum channel.Compared with the protocols proposed by Wang et al.[Acta Phys.Sin.56(2007)673;Opt.Commun.266(2006)732],the protocol in this study implements bidirectional communication and authentication,which defends most attacks including the‘man-in-the-middle’attack efficiently.展开更多
To transmit a message safely,five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol.Five-particle cluster state particles are used for both detecting e...To transmit a message safely,five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol.Five-particle cluster state particles are used for both detecting eavesdrop-pers and transmitting secret messages.All of the five-particle cluster states’photons for detection are mixed to the sending sequence to detect eavesdroppers.The detection rate approaches 88%per qubit.The five-particle cluster states needed are only one fifth of the photons in the sending sequence.In this protocol,there is no photon carrying secret information transmitting in quantum channel,and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol.Compared with three photons of each five-particle cluster state as detection photons,the five photons in this study will decrease the five-particle cluster states needed for detection greatly.展开更多
A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger-Horne-Zeilinger state is proposed. A binary string is used to express the identity of the receiver, wh...A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger-Horne-Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements au- thentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security.展开更多
With the expansive demand for video streaming over mobile networks,it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming or downloading the v...With the expansive demand for video streaming over mobile networks,it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming or downloading the video.Several approaches were proposed in the literature,including Dynamic Adaptive Streaming over HTTP(DASH).In this work,we consider an approach in which we place sufficient emphasis on the constrained battery resources in mobile devices when making decisions on the quality(or bitrate)of the video to be requested.This is done by using a fuzzy logic controller that enhances the performance of the Fuzzy-based DASH(FDASH)scheme.Simulation results show that our proposed approach conserves more energy than its predecessor while maintaining similar video quality and avoiding playback interruptions.展开更多
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery ...Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.In this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system.The proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication process.Furthermore,the proposed authentication scheme is mathematically modeled and validated using extensive simulation.The simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers.展开更多
A novel method for phase-detecting of each individual beam in coherent beam combining system of fiber laser array based on the property of time-shift of fast Fourier transform is reported. It takes advantage of the re...A novel method for phase-detecting of each individual beam in coherent beam combining system of fiber laser array based on the property of time-shift of fast Fourier transform is reported. It takes advantage of the relative movement of fringepattern to detect the phase shift between each individual beam and reference beam. No frequency shift component for reference beam is required in the system. At the same time, the acquisition fringe-pattern is firstly tailored to a few multiple of fringes in order to reduce the phase-detecting error caused by energy leakage during the course of fast Fourier transform. This technique can greatly reduce the effect of energy leakage and thus improve the phase-detecting precision. Basic principle of the new phase-detecting method is described in detail, and numerical results show that the phase-detecting error is less than 1/1000 wavelength bv utilizing our method.展开更多
Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,ma...Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,maintaining accurate knowledge of the network after a failure is one of the largest challenges in the SDN.Motivated by this reality,this paper focuses on the use of self-healing properties to boost the SDN robustness.This approach,unlike traditional schemes,is not based on proactively configuring multiple(and memory-intensive)backup paths in each switch or performing a reactive and time-consuming routing computation at the controller level.Instead,the control paths are quickly recovered by local switch actions and subsequently optimized by global controller knowledge.Obtained results show that the proposed approach recovers the control topology effectively in terms of time and message load over a wide range of generated networks.Consequently,scalability issues of traditional fault recovery strategies are avoided.展开更多
Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is sus...Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we propose a mechanism to assure information security against security attacks and particularly node capturing attacks. We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks. In C3SM, every cluster selects dynamically and alternately a node as a cluster security manager (CSM) which distributes a periodic shared secrete key for all nodes in the cluster. The cluster head, then, authenticates identity of the nodes and derive a unique pairwise key for each node in the cluster. C3SM provides sufficient security regardless how many nodes are compromised, and achieves high connectivity with low memory cost and low energy consumption. Compared to existing protocols, our protocol provides stronger resilience against node capture with lower key storage overhead.展开更多
Free space optical communication is a line-of-sight (LOS) technology that uses lasers to provide optical bandwidth connections. Potential disturbance arising from the weather condition is one of the most effective f...Free space optical communication is a line-of-sight (LOS) technology that uses lasers to provide optical bandwidth connections. Potential disturbance arising from the weather condition is one of the most effective factors that influence the bi-directional free space optics (FSO) performance. The complex weather condition in the Middle East region and Arabian Gulf has been dominated by dust storms activities. Dust storms directly affect the characteristics of FSO and consequently lead to an increase in the bit error rate (BER) and deterioration Q-factor to bad levels due to the high attenuation factor. In this research, the authors compare the differences between two bi-directional FSOs. One is the traditional link, and the other has been developed to enhance the system performance under the dust storms condition. The proposed design consists of dual FSO channels, and each one includes erbium-doped fiber amplifier (EDFA) optical amplifiers. This design has demonstrated the proficiency in addressing the attenuation that occurs due to weather stickers. The results prove there is an improvement in performance by measuring the Q-factor. In addition, BER can be significantly improved, and further communicating distance can be achieved by utilizing 1550nm with multiple channels and EDFA.展开更多
A quantum secure direct communication and authentication protocol is proposed by using single photons.An information transmission is completed by sending photons once in quantum channel,which improves the efficiency w...A quantum secure direct communication and authentication protocol is proposed by using single photons.An information transmission is completed by sending photons once in quantum channel,which improves the efficiency without losing the security.The protocol encodes identity-string of the receiver as single photons sequence,which acts as detection sequence and implements authentication.Before secret message is encoded as single photons sequence,it is encrypted with identity-string of the sender by using XOR operation,which defends quantum teleportation attack efficiently.The base identity-strings of the sender and the receiver are reused unconditionally secure even in noisy channel.Compared with the protocol proposed by Wang et al.(Phys Lett A,2006,358:256–258),the protocol in this study sends photons once in one transmission and defends most attacks including‘man-in-the-middle’attack and quantum teleportation attack efficiently.展开更多
A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the con...A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information.展开更多
Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Auth...Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.展开更多
This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string ...This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.展开更多
文摘In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of personnel.Most studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind spots.However,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic environments.Nevertheless,research in this area still needs to be conducted.This paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this problem.This algorithm considers the dynamic alterations in obstacle locations within the designated area.It determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage rates.The experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle positions.Experimental results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles change.With 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.
文摘In hybrid wireless sensor networks composed of both static and mobile sensor nodes, the random deployment of stationary nodes may cause coverage holes in the sensing field. Hence, mobile sensor nodes are added after the initial deployment to overcome the coverage holes problem. To achieve optimal coverage, an efficient algorithm should be employed to find the best positions of the additional mobile nodes. This paper presents a genetic algorithm that searches for an optimal or near optimal solution to the coverage holes problem. The proposed algorithm determines the minimum number and the best locations of the mobile nodes that need to be added after the initial deployment of the stationary nodes. The performance of the genetic algorithm was evaluated using several metrics, and the simulation results demonstrated that the proposed algorithm can optimize the network coverage in terms of the overall coverage ratio and the number of additional mobile nodes.
文摘Energy efficiency and sensing coverage are essential metrics for enhancing the lifetime and the utilization of wireless sensor networks. Many protocols have been developed to address these issues, among which, clustering is considered a key technique in minimizing the consumed energy. However, few clustering protocols address the sensing coverage metric. This paper proposes a general framework that addresses both metrics for clustering algorithms in wireless sensor networks. The proposed framework is based on applying the principles of Virtual Field Force on each cluster within the network in order to move the sensor nodes towards proper locations that maximize the sensing coverage and minimize the transmitted energy. Two types of virtual forces are used: an attractive force that moves the nodes towards the cluster head in order to reduce the energy used for communication and a repulsive force that moves the overlapping nodes away from each other such that their sensing coverage is maximized. The performance of the proposed mechanism was evaluated by applying it to the well-known LEACH clustering algorithm. The simulation results demonstrate that the proposed mechanism improves the performance of the LEACH protocol considerably in terms of the achieved sensing coverage, and the network lifetime.
文摘One of the most popular standards for protecting confidential information is the Data Encryption Standard (DES). Although it has been replaced by the Advanced Encryption Standard (AES), it is still widely used in Automatic Teller Machines (ATM’s), smartcards, and mobile phone SIM cards. In this paper, we present area-efficient and high-throughput FPGA implementations of the DES which are developed using the Xilinx FPGA ISE design suite. In fact, we propose modifications on the fastest DES design reported in the literature and achieve 1.1 times higher speed. Also, we introduce an 8-stage pipelined design that needs only 0.75 times the registers and consumes 0.65 times the power of a similar 16-stages pipelined design. High-speed design and synthesis optimization techniques including pipelining, register retiming, and logic replication are used. Post- layout synthesis results show that the proposed implementations achieve high throughput-to-area ratio. To make a fair comparison, the proposed designs were synthesized using matching FPGA devices as being used by other implementations reported in the literature.
文摘Based on the structures of the short preamble and long preamble, which are defined for synchronization in IEEES02.16e specification, the robust synchronization algorithm for IEEES02.16e OFDM system is proposed. The correlations among the sample sequences in the preamble are investigated, especially the correlation between the first sample sequence and the last sample sequence in the long preamble. The conventional joint timing and frequency synchronization algorithm is reviewed based on the short preamble referring to the algorithm proposed by Schmidl, then a robust joint timing and frequency synchronization algorithm is proposed based on the long preamble. The simulations in the multi-path and frequency selective fading channel show that the proposed algorithm has improved the performances of timing metric plateau, timing offset and synchronization acquisition time even when signal-to-noise ratio is less than -5 dB.
文摘Based on fuzzy set theory, a fuzzy trust model is established by using membership function to describe the fuzziness of trust. The trust vectors of subjective trust are obtained based on a mathematical model of fuzzy synthetic evaluation. Considering the complicated and changeable relationships between various subjects, the multi-level mathematical model of fuzzy synthetic evaluation is introduced. An example of a two-level fuzzy synthetic evaluation model confirms the feasibility of the multi-level fuzzy synthesis evaluation model. The proposed fuzzy model for trust evaluation may provide a promising method for research of trust model in open networks.
基金supported by the National Natural Science Foundation of China(Grant No.61402058)the Science and Technology Support Project of Sichuan Province of China(Grant No.2013GZX0137)+1 种基金the Fund for Young Persons Project of Sichuan Province of China(Grant No.12ZB017)the Foundation of Cyberspace Security Key Laboratory of Sichuan Higher Education Institutions,China(Grant No.szjj2014-074)
文摘By using six-qubit decoherence-free (DF) states as quantum carriers and decoy states, a robust quantum secure direct communication and authentication (QSDCA) protocol against decoherence noise is proposed. Four six-qubit DF states are used in the process of secret transmission, however only the |0'〉 state is prepared. The other three six-qubit DF states can be obtained by permuting the outputs of the setup for |0'〉. By using the |0'〉 state as the decoy state, the detection rate and the qubit error rate reach 81.3%, and they will not change with the noise level. The stability and security are much higher than those of the ping-pong protocol both in an ideal scenario and a decoherence noise scenario. Even if the eavesdropper measures several qubits, exploiting the coherent relationship between these qubits, she can gain one bit of secret information with probability 0.042.
基金Supported by the Science and Technology Support Project of Sichuan Province of China under Grant No 13ZC2138the Young Persons Project of Sichuan Province of China under Grant No 12ZB017.
文摘A multiparty controlled bidirectional quantum secure direct communication and authentication protocol is proposed based on EPR pair and entanglement swapping.The legitimate identities of communicating parties are encoded to Bell states which act as a detection sequence.Secret messages are transmitted by using the classical XOR operation,which serves as a one-time-pad.No photon with secret information transmits in the quantum channel.Compared with the protocols proposed by Wang et al.[Acta Phys.Sin.56(2007)673;Opt.Commun.266(2006)732],the protocol in this study implements bidirectional communication and authentication,which defends most attacks including the‘man-in-the-middle’attack efficiently.
基金Supported by the Science and Technology Project of Sichuan Province under Grant No 13ZC2138the Fund for Young Persons Project of Sichuan Province under Grant No 12ZB017.
文摘To transmit a message safely,five-particle cluster state particles are used to construct a bidirectional quantum secure direct communication protocol.Five-particle cluster state particles are used for both detecting eavesdrop-pers and transmitting secret messages.All of the five-particle cluster states’photons for detection are mixed to the sending sequence to detect eavesdroppers.The detection rate approaches 88%per qubit.The five-particle cluster states needed are only one fifth of the photons in the sending sequence.In this protocol,there is no photon carrying secret information transmitting in quantum channel,and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol.Compared with three photons of each five-particle cluster state as detection photons,the five photons in this study will decrease the five-particle cluster states needed for detection greatly.
基金Project supported by the National Natural Science Foundation of China(Grant No.61370203)the Science and Technology Support Project of Sichuan Province,China(Grant No.13ZC2138)the Fund for Young Persons Project of Sichuan Province,China(Grant No.12ZB017)
文摘A quantum broadcast communication and authentication protocol with a quantum one-time pad based on the Greenberger-Horne-Zeilinger state is proposed. A binary string is used to express the identity of the receiver, which is encoded as a single sequence of photons. The encoded photon sequence acts as a detection sequence and implements au- thentication. An XOR operation serves as a one-time pad and is used to ensure the security of the protocol. The binary string is reused even in a noisy channel and proves to be unconditionally secure. In contrast with the protocols proposed by Wang et al. [Chin. Phys. 16 1868 (2007)] and Yang et al. [Chin. Phys. B 19 070304 (2010)], the protocol in this study implements the identity authentication with a reusable binary string; no hash function or local unitary operation is used. The protocol in this study is also easier to implement and highly efficient without losing security.
文摘With the expansive demand for video streaming over mobile networks,it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming or downloading the video.Several approaches were proposed in the literature,including Dynamic Adaptive Streaming over HTTP(DASH).In this work,we consider an approach in which we place sufficient emphasis on the constrained battery resources in mobile devices when making decisions on the quality(or bitrate)of the video to be requested.This is done by using a fuzzy logic controller that enhances the performance of the Fuzzy-based DASH(FDASH)scheme.Simulation results show that our proposed approach conserves more energy than its predecessor while maintaining similar video quality and avoiding playback interruptions.
基金This material is based on the project supported by the National Science Foundation,CISE/CNS Trustworthy Computing program,under grant No.CNS-1053286.
文摘Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent applications.The robust authentication of RFID system components is critical in providing trustworthy data delivery from/to tags.In this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the system.The proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication process.Furthermore,the proposed authentication scheme is mathematically modeled and validated using extensive simulation.The simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers.
基金Supported by the National Natural Science Founda-tion of China (60678018)
文摘A novel method for phase-detecting of each individual beam in coherent beam combining system of fiber laser array based on the property of time-shift of fast Fourier transform is reported. It takes advantage of the relative movement of fringepattern to detect the phase shift between each individual beam and reference beam. No frequency shift component for reference beam is required in the system. At the same time, the acquisition fringe-pattern is firstly tailored to a few multiple of fringes in order to reduce the phase-detecting error caused by energy leakage during the course of fast Fourier transform. This technique can greatly reduce the effect of energy leakage and thus improve the phase-detecting precision. Basic principle of the new phase-detecting method is described in detail, and numerical results show that the phase-detecting error is less than 1/1000 wavelength bv utilizing our method.
基金This work has been supported by the Ministerio de Economía y Competitividad of the Spanish Government under project TEC2016-76795-C6-1-R and AEI/FEDER,UE.
文摘Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic.Software-Defined Network(SDN)is an emerging architecture aimed to address this need.However,maintaining accurate knowledge of the network after a failure is one of the largest challenges in the SDN.Motivated by this reality,this paper focuses on the use of self-healing properties to boost the SDN robustness.This approach,unlike traditional schemes,is not based on proactively configuring multiple(and memory-intensive)backup paths in each switch or performing a reactive and time-consuming routing computation at the controller level.Instead,the control paths are quickly recovered by local switch actions and subsequently optimized by global controller knowledge.Obtained results show that the proposed approach recovers the control topology effectively in terms of time and message load over a wide range of generated networks.Consequently,scalability issues of traditional fault recovery strategies are avoided.
文摘Wireless Sensor Networks (WSNs) are resource-constrained networks in which sensor nodes operate in an aggressive and uncontrolled environment and interact with sensitive data. Traffic aggregated by sensor nodes is susceptible to attacks and, due to the nature of WSNs, security mechanisms used in wired networks and other types of wireless networks are not suitable for WSNs. In this paper, we propose a mechanism to assure information security against security attacks and particularly node capturing attacks. We propose a cluster security management protocol, called Cryptographic Checksum Clustering Security Management (C3SM), to provide an efficient decentralized security management for hierarchal networks. In C3SM, every cluster selects dynamically and alternately a node as a cluster security manager (CSM) which distributes a periodic shared secrete key for all nodes in the cluster. The cluster head, then, authenticates identity of the nodes and derive a unique pairwise key for each node in the cluster. C3SM provides sufficient security regardless how many nodes are compromised, and achieves high connectivity with low memory cost and low energy consumption. Compared to existing protocols, our protocol provides stronger resilience against node capture with lower key storage overhead.
文摘Free space optical communication is a line-of-sight (LOS) technology that uses lasers to provide optical bandwidth connections. Potential disturbance arising from the weather condition is one of the most effective factors that influence the bi-directional free space optics (FSO) performance. The complex weather condition in the Middle East region and Arabian Gulf has been dominated by dust storms activities. Dust storms directly affect the characteristics of FSO and consequently lead to an increase in the bit error rate (BER) and deterioration Q-factor to bad levels due to the high attenuation factor. In this research, the authors compare the differences between two bi-directional FSOs. One is the traditional link, and the other has been developed to enhance the system performance under the dust storms condition. The proposed design consists of dual FSO channels, and each one includes erbium-doped fiber amplifier (EDFA) optical amplifiers. This design has demonstrated the proficiency in addressing the attenuation that occurs due to weather stickers. The results prove there is an improvement in performance by measuring the Q-factor. In addition, BER can be significantly improved, and further communicating distance can be achieved by utilizing 1550nm with multiple channels and EDFA.
基金supported by the National Natural Science Foundation of China(61370203)the Science &Technology Pillar Program of Sichuan Province of China(2013GZX0137)the Youth Fund Project of Sichuan Province of China(12ZB017)
文摘A quantum secure direct communication and authentication protocol is proposed by using single photons.An information transmission is completed by sending photons once in quantum channel,which improves the efficiency without losing the security.The protocol encodes identity-string of the receiver as single photons sequence,which acts as detection sequence and implements authentication.Before secret message is encoded as single photons sequence,it is encrypted with identity-string of the sender by using XOR operation,which defends quantum teleportation attack efficiently.The base identity-strings of the sender and the receiver are reused unconditionally secure even in noisy channel.Compared with the protocol proposed by Wang et al.(Phys Lett A,2006,358:256–258),the protocol in this study sends photons once in one transmission and defends most attacks including‘man-in-the-middle’attack and quantum teleportation attack efficiently.
基金supported by the National Natural Science Foundation of China (61370203)the Science & Technology Pillar Program of Sichuan Province of China (2013GZX0137)the Youth Fund Project of Sichuan Province of China (12ZB017)
文摘A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information.
基金supported by Science and Technology Support Project of Sichuan Province of China (2013GZX0137)Fund for Young Persons Project of Sichuan Province of China (12ZB017)+2 种基金the National Natural Science Foundation of China (61100205)Project of the Fundamental Research Funds for the Central Universities of China (2013RC0307)the Cryptography Basic Development of the National ‘12th Five-Year-Plan’ of China on Cryptographic Theory (MMJJ201301004)
文摘Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.
基金supported by the Science and Technology Support Project of Sichuan Province of China(Grant No.2013GZX0137)the Fund for Young Persons Project of Sichuan Province of China(Grant No.12ZB017)+2 种基金the National Natural Science Foundation of China(Grant No.61100205)the Project of the Fundamental Research Funds for the Central Universities of China(Grant No.2013RC0307)the Cryptography Basic Development of the National"Twelfth Five-Year Plan" of China on Cryptographic Theory(Grant No.MMJJ201301004)
文摘This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.