{"title":"Adaptive channel reservation multiple access protocol based on differentiated traffic guarantee","authors":"Ze Liu, Bo Li, Mao Yang, Zhongjiang Yan","doi":"10.1051/jnwpu/20244210084","DOIUrl":"https://doi.org/10.1051/jnwpu/20244210084","url":null,"abstract":"Ad Hoc network is widely used because of its distributed flexibility, in which nodes may generate different types of traffic, and some high-priority traffic requires lower delay and other Quality of service (QoS) requirements. However, as the load of traffic increases, the probability of conflict increases significantly, which makes it difficult to guarantee the requirement of these traffic. It is significant to design the efficient multiple access protocol to ensure the quality of different kinds of traffic. Channel reservation mechanism is an important method to ensure QoS. However, the existing channel reservation mechanism does not fine-adjust reservation parameters according to the QoS when dealing with various traffic differently, and the differentiation mechanism is rough. In addition, it is difficult to ensure the performance of common services when low-latency services are met. Therefore, a differentiated service guarantee adaptive reservation mechanism (DSGARM) to solve the above problems is proposed. The core idea of the protocol is to provide differentiated services in detail according to the delay tolerance requirements of each business. Absolute reservation mechanism is used to guarantee delay-sensitive services, and relative reservation mechanism is used to service relatively delay-insensitive services. In the protocol, a model is established to design an adaptive algorithm to quantitatively calculate reservation parameters that meet the delay requirements. On the premise of prioritized reservation for various services, appropriate reservation parameters can be adjusted according to network conditions to ensure the delay tolerance requirements of each type of service. The present work can be widely applied to scenarios with differentiated business requirements. The simulation results show the advantages of the present protocol and have great practical significance.","PeriodicalId":515230,"journal":{"name":"Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University","volume":"44 53","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140464617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xige Zhang, Jiacheng Zhu, Jun Ma, Lixiang Shen, Jiahui Zhou, Dejun Mu
{"title":"Hardware security and reliability verification based on fault propagation model","authors":"Xige Zhang, Jiacheng Zhu, Jun Ma, Lixiang Shen, Jiahui Zhou, Dejun Mu","doi":"10.1051/jnwpu/20244210092","DOIUrl":"https://doi.org/10.1051/jnwpu/20244210092","url":null,"abstract":"Large scale integrate circuits is facing serious threat such as design vulnerabilities, side channels, and hardware Trojans. Traditional functional verification method is difficult to ensure high test coverage, and it is also difficult to detect security vulnerabilities such as side channels and stealthy hardware Trojans. Formal verification methods focus on the equivalence and functional correctness of design, and are difficult to meet security and reliability verification needs. The present work proposes a hardware security and reliability verification method from formal model. The present method can develop formal models for describing the security and reliability behaviour of hardware designs. It can detect potential security vulnerabilities in hardware designs. Experimental results show that the verification method is effective in detecting sensitive information leakage and modification caused by side channels and hardware Trojans.","PeriodicalId":515230,"journal":{"name":"Xibei Gongye Daxue Xuebao/Journal of Northwestern Polytechnical University","volume":"741 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140469365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}