- Cryptography and Data Security
- Privacy-Preserving Technologies in Data
- Blockchain Technology Applications and Security
- Inertial Sensor and Navigation
- Software-Defined Networks and 5G
- GNSS positioning and interference
- Caching and Content Delivery
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Advanced Data Storage Technologies
- Security in Wireless Sensor Networks
- Indoor and Outdoor Localization Technologies
- Peer-to-Peer Network Technologies
China Academy of Safety Sciences and Technology
2022
China Mobile (China)
2020-2022
High-precision positioning is critical for many Internet-of-Things (IoT) applications; however, most existing approaches are too expensive to be used in commercial products. A highly accurate differential global system (DGPS) has not been widely because of the difficulty solving integer ambiguities single-frequency carrier phase. Multipath interference and receiver noise main reasons limiting DGPS accuracy efficiency ambiguities. In this article, we propose a combination anti-multipath...
摘要: 具有 VCR 功能的流媒体服务系统由于请求的随机性会影响用户的点播体验,该文结合数据预取机制以及基于分段的缓存策略计算出用户点播延迟的期望,给出一个较优的缓存管理策略,并通过在线计算逼近最优解,同时在缓存已知的情况下,给出相应的数据预取算法,利用缓存和预取两种数据获取方法的相互协作减小客户端点播延迟,提高缓存效率。仿真结果证实了所提算法的有效性。 关键词: 多媒体通信 / 预取机制 缓存策略 服务质量
Security of Internet things network is difficult to manage because devices are heterogeneous and always deployed in remote places. Based on these features, attacks against like distributed denial-of-service system intrusion easier than traditional network. In order enhance network’s security, this article we propose the concept intrinsic security establish a trusted autonomy Intrinsic emphasizes that itself must be autonomous address problems which caused by heterogeneous. thought, designed...
Due to the emergence of various new technologies, Internet things (IoT) is gradually becoming one most valued technologies at present. The IoT makes our life more and convenient through interconnection everything, but brings many advantages also raises some security issues, such as perception layer main means sensing data delivery, due limited resources nodes their vulnerability, diversity data, heterogeneity network, making vulnerable malicious attacks. Therefore, guaranteeing trustworthy...
Abstract As the important transmission approach of perception data, security and privacy layer nodes have been paid more attention. To evaluate credibility protect autologous identity privacy, a remote attestation mechanism using group signature (GS-RAM) for centralized networking is proposed in this paper. First, RAM, based on computational Diffie–Hellman (CDH) problem GS, established data source nodes. Second, specific construction GS-RAM given to identify trusted state sources without...