- Security in Wireless Sensor Networks
- Cloud Data Security Solutions
- Cryptography and Data Security
- Advanced Data Storage Technologies
- Advanced Authentication Protocols Security
- Security and Verification in Computing
- Advanced Malware Detection Techniques
- Energy Efficient Wireless Sensor Networks
- Blockchain Technology Applications and Security
- Access Control and Trust
- Distributed and Parallel Computing Systems
- Network Security and Intrusion Detection
- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Mobile Agent-Based Network Management
- UAV Applications and Optimization
- Parallel Computing and Optimization Techniques
- Peer-to-Peer Network Technologies
- Mobile Ad Hoc Networks
- Power Systems and Technologies
- Distributed systems and fault tolerance
- Information and Cyber Security
- Multimedia Communication and Technology
- Multi-Agent Systems and Negotiation
- Vehicular Ad Hoc Networks (VANETs)
Beijing Institute of Technology
2011-2024
Harbin Electric Corporation (China)
2023
Cloud Computing Center
2016-2017
Central South University
2010
Xiaomi (China)
2004
The application of intelligent computing in Internet Things (IoTs) makes IoTs systems such as telemedicine, in-vehicle IoT, and smart home more efficient. Secure communication secure resource sharing among terminals are essential. A channel for can be established through group key agreement (GKA), thereby ensuring the security terminals. Taking into account confidentiality level shared resources each terminal, different permissions a GKA protocol is proposed. Compared with previous work,...
Group key agreement is a good way to ensure secure communication within group. However, the identity authentication, privacy protection, and information sharing access control (different rights may exist for different sensitivity of information) are issues be solved in group agreement. Aiming at these problems, this paper proposes protocol based on protection attribute authentication (GKA-PPAA). The hidden attributes; it not only preserves advantages traditional identity-based protocol, but...
Security communication and information sharing among mobile devices are important application technologies of the intelligent system (IIS). Because IIS is vulnerable to attacks, so security seriously threatened. Thence, it necessary establish a secure channel for over an opening network. Group key agreement (GKA) can by encryption technology. Due resource-constraints devices, such as weak computing power, small storage capacity, limited range. To address these issues, asymmetric GKA protocol...
The advent of unmanned aerial vehicle (UAV) swarm technology brings possibilities to help humans complete tasks in no man's land, such as deserts and rainforests. However, UAV network faces many cyber threats, where attackers can impersonate legitimate entities or tamper with task data. For identity security, most the existing methods use centralized authentication schemes, which have a single point failure problem. data only secure ground system, ignoring security air network. Therefore,...
Data replication is a common method to reduce the bandwidth consumption and access latency in distributed systems. The existing methods mostly deal with read-only data, thus replica management mechanism relatively simple. Most replicate files all nodes or two endpoints on query path. Naturally, larger number of replicas, better performance it can obtain. However, these lead high overhead for unnecessary file replications consistency maintenance. This paper presents dynamic minimum cost based...
With the increased snapshot operations (creation or deletion), performance of storage system will degrade severely whether in Copy on write (COW) Redirect (ROW). This paper presents a novel scheme which could use resources effectively and keep historical data accurately for SSDHDD-hybrid system. SSD (source volume) stores all active executes read/write without responding to operations. In contrast, HDDs (snapshot store writing sequentially form logs are responsible backup this way, hybrid...
Through the group key agreement, all members could negotiate a common session which is used in later secure communication.While simple GKA cannot provide enough security to resist adversary's attack, and malicious damage during agreement makes authenticated particularly important.In identity-based authentication, user's unique identity information as public key, it exempt from series of management certification public-key infrastructure.Thereby, can simplify procedures reduce risk failure at...
In this paper, we focus on the query problem of trajectory tracking moving targets in a wireless sensor network. Our motivation is to design in-network storage and querying protocols support queries for searching given target signature low latency, high reliability, energy efficient manner. We propose protocol, which combines index-based random schemes. The protocol guarantees reliability efficiency. an scheme, each has index, stored at index node (designated node). Query nodes send messages...
with the rapid development of visualization, network visualization has become an important branch, which is applied in many aspects life such as business, education and virtual community.But existed systems are based on small volume static effect.Along incessant expansion modern internet scale, traditional tools' practicality decrease.Showing huge information clearly effectively will be great signification.In our paper, large-scale topology system finished by using Web 3D technique-Three.JS...
As FAT32 file system implemented on Windows is not open source, this paper tries to analyze its allocator strategy by analyzing the structure and principle of DBR, FSINFO sectors FAT32, as well source code Linux.Then using these theories together with hypotheses do massive experiments creating, copying deleting files devices different format type help it in depth.Declare differences comparing three common strategies, finally researchers users understand better protect their data better.
Because of the constraint sensor nodes in energy powering, storage capacity, and computing power, order to use less resource improve security WSNs, we propose a novel key management scheme which relies on remainder small integer connected graph theory.The improves resiliency WSNs compromise, minimizes usage as well communication load when establishing common keys.The major parts include id_key generation distribution, discovery establishment, secure path incremental addition nodes.Finally,...
When there is a massive blackout on the grid, reasonable and scientific selection of power supply restoration path can save huge economic losses, produce positive social significance. In order to improve overall recovery efficiency grid ensure safe stable start-up route optimization method based Dijkstra algorithm genetic was proposed. Based algorithm, considering that maximum sharing reduce total transmission distance, shortest model network constructed. At same time, operation time each...
With recent cyber security attacks, the "border defense" protection mechanism has often penetrated and broken through, "borderless" defense idea—Zero Trust was proposed. The device application sandbox deployment model is one of four essential Zero architecture models. isolation directly affects trusted applications. Given risks, such as escape in application, we propose a hybrid based on access behavior give formal definition characteristics model. dynamically determines identity subject...