2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

筛选
英文 中文
Study on Security Management Architecture for Sensor Network Based on Intrusion Detection 基于入侵检测的传感器网络安全管理体系研究
Xiong-qing Peng, Zheng Wu, Debao Xiao, Yang Yu
{"title":"Study on Security Management Architecture for Sensor Network Based on Intrusion Detection","authors":"Xiong-qing Peng, Zheng Wu, Debao Xiao, Yang Yu","doi":"10.1109/NSWCTC.2009.210","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.210","url":null,"abstract":"Wireless Sensor networks will play an important role in the next generation pervasive computing. But the character of wireless communication brings a great challenge to the security management measures used in the communication protocols. These measures are different from conventional network security management methods. This paper proposed a security management model for self-organizing wireless sensor networks based on intrusion detection. It can prevent most of attacks. Then an analysis of each layer of networks in our security model is discussed and the security management measures in the data link layer and network layer are described in detail especially.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115541979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
A Trustworthy Next Generation Internet Protocol Model 可信赖的下一代互联网协议模型
Yong-Min Liu, Xin-hua Jiang, X. Nian, Wu-Yi Lu, Sheng Yang
{"title":"A Trustworthy Next Generation Internet Protocol Model","authors":"Yong-Min Liu, Xin-hua Jiang, X. Nian, Wu-Yi Lu, Sheng Yang","doi":"10.1109/NSWCTC.2009.241","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.241","url":null,"abstract":"With the rapid development of Internet applications and the fast increasing number of users, the traditional network protocol layered only by the basic communication functions can create barriers rather than stimulants to its further development. This paper analyzes the problems and challenges of the classic Internet communication protocol, explicit the important features that NGI (Next Generation Internet) of vitality architecture possess under the current networks environment, proposed trustworthy network model. So it establishes the fundament of theory for further research and development the NGI in the future.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115558230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Multi-parameter Monitoring System Based on Wireless Sensor Network 一种新的基于无线传感器网络的多参数监测系统
Xingqiao Liu, Yiying Liu, Chengchun Li, Guohai Liu
{"title":"A New Multi-parameter Monitoring System Based on Wireless Sensor Network","authors":"Xingqiao Liu, Yiying Liu, Chengchun Li, Guohai Liu","doi":"10.1109/NSWCTC.2009.147","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.147","url":null,"abstract":"a new multi-parameter monitoring system based on wireless sensor network is introduced in the paper. The system synthetically applies the technology of modern senor, circle system and wireless data transmission. Multi-parameter collection, transmission and display of the water environment, such as salinity, temperature, are realized by the system, and the fast and accurate transmission of the data between senor detecting nodes and sink nodes is achieved by wireless network. Then the system realizes the real time remote supervisory for the multi-parameter of water environment. Because of its simple structure, fast data transmission and easily function extended, the system is suitable for many fields such as intelligent greenhouse, storage monitoring, industrial production and so on.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"105 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115694242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Coordinate Control Modeling among Enterprises in B2B EC Based on CBR 基于CBR的B2B电子商务企业间协调控制建模
Shibin Su, Zhenyu Liu, Zhengbing Hu
{"title":"Coordinate Control Modeling among Enterprises in B2B EC Based on CBR","authors":"Shibin Su, Zhenyu Liu, Zhengbing Hu","doi":"10.1109/NSWCTC.2009.71","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.71","url":null,"abstract":"In the era of network, B2B electronic commerce (EC) has become new bright spot to accelerate economy and trend of future business development gradually and it also becomes one of major reasons to economic gaps between developing countries and developed countries. However, there are lacks of research on Chinese B2B EC at present; especially it is lack of research on coordinate control among enterprises in Chinese B2B EC. Therefore, the paper analyzes the modeling of coordinate control among enterprises in B2B EC, and suggests realizing coordinate control among enterprises in B2B EC by case-based reasoning (CBR). Then, the paper designs case expression, case index, case adjustment and so on in coordinate control among enterprises in B2B EC. At last, the paper puts forward the lack of the research and points out the orientation of future research","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Analysis of VCO in PLL System 锁相环系统中压控振荡器的设计与分析
Xiu-long Wu, Jun-ning Chen, Meng Jian
{"title":"Design and Analysis of VCO in PLL System","authors":"Xiu-long Wu, Jun-ning Chen, Meng Jian","doi":"10.1109/NSWCTC.2009.392","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.392","url":null,"abstract":"A wide-bandwidth low-noise VCO used in PLL system was investigated, including a harmonic filtering resistor and source damping resistors to reduce the phase noise and power dissipation. The back-to-back varactor topology is identified as a suitable solution to linearize the tank capacitance. The amplitude to phase noise conversion is greatly attenuated. The circuit was simulated using 0.35um CMOS technology in Mentor Graphics Eldo-RF environment, the simulation results show that the phase noise of the oscillator can reach -119.5dBc/Hz@1MHz, the power dissipation is 3.0mw at 2.4GHz.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122080014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comprehensive Evaluation of Shooting Goals Based on Rough Sets 基于粗糙集的射击目标综合评价
Xiao-quan Li, Qunsong Zhu, Jian-bo Ren
{"title":"Comprehensive Evaluation of Shooting Goals Based on Rough Sets","authors":"Xiao-quan Li, Qunsong Zhu, Jian-bo Ren","doi":"10.1109/NSWCTC.2009.227","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.227","url":null,"abstract":"In this paper, the Rough Sets theory was introduced, then on the basis of analyzing and creating the index system of certain weapon system’s shooting targets, RS was used to impersonally distribute weight vectors. It overcame the problems of subjectivist empower rules The RS comprehensive evaluation model of the targets system was given out according to the practical cases. The sequence of threatening degree and evaluation grade of the targets were educed last. This practical model offers reference for the commanders of the antiaircraft forces.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125845202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks 一种基于身份和阈值的Ad Hoc网络密钥管理方案
Hua Sun, Xue-feng Zheng, Zhongjun Deng
{"title":"An Identity-based and Threshold Key Management Scheme for Ad Hoc Networks","authors":"Hua Sun, Xue-feng Zheng, Zhongjun Deng","doi":"10.1109/NSWCTC.2009.291","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.291","url":null,"abstract":"This paper studies key management, a fundamental problem in securing mobile ad hoc networks (MANETs). We present the key management scheme as a combination of identity-based and threshold cryptography for ad hoc networks. It is a certificateless solution which eliminates the need for public key distribution and certificates in conventional public key management schemes. With the lower cost of computation and communication, our scheme is efficient, secure and especially suitable for mobile ad hoc networks characterized by distributed computing, dynamic topology and multi-hop communications.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124710641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Efficient Electronic Voting Scheme Based on Quadratic Residue 基于二次残数的高效电子投票方案
Wen Chen, Yun Wu, Feng Pan, Feiyu Lei
{"title":"An Efficient Electronic Voting Scheme Based on Quadratic Residue","authors":"Wen Chen, Yun Wu, Feng Pan, Feiyu Lei","doi":"10.1109/NSWCTC.2009.223","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.223","url":null,"abstract":"This paper proposes a new simple efficient electronic voting scheme based on quadratic residue. Through analysis, the scheme satisfies the basic security requirements for a electronic voting system.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design and Application of Wirless Sensor Network Web Server Based on S3C2410 and Zigbee Protocol 基于S3C2410和Zigbee协议的无线传感器网络Web服务器的设计与应用
J. Yongping, Feng Zehao, Xu Du
{"title":"Design and Application of Wirless Sensor Network Web Server Based on S3C2410 and Zigbee Protocol","authors":"J. Yongping, Feng Zehao, Xu Du","doi":"10.1109/NSWCTC.2009.404","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.404","url":null,"abstract":"Remote control network is a research focus in the application domain of wireless communication technology. Zigbee technology makes up for the vacancy of wireless communication market in the low-cost and low-power equipment domain. This paper presents the design and application of wirless sensor network web server based on S3C2410 and Zigbee protocol. This server can realize real-time motoring and control for the remote object. With B/S structures and modular design method, hardware and software design is introduced, and key  implementation techniques are described. It has been proved that the server runs stability and has good scalability, which can be widely used in smart home, monitoring systems, industrial control, and other fields","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129850803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
A Simple Iterative Carrier Frequency Estimation Algorithm 一种简单的迭代载波频率估计算法
Hua Xu, Dongmei Zhang
{"title":"A Simple Iterative Carrier Frequency Estimation Algorithm","authors":"Hua Xu, Dongmei Zhang","doi":"10.1109/NSWCTC.2009.178","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.178","url":null,"abstract":"The estimation of carrier frequency of communication signals with high estimation precision and wide estimation range is required in lots of applications. A carrier frequency estimation algorithm based on Maximum-likelihood principle and iterative process with high precision and wide estimation range is proposed in this paper. The performance of the iterative algorithm is compared with the other two widely used classic carrier frequency estimation algorithms by computer simulations. In simulation results, the iterative algorithm has better performance than the others’.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128689327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信