Entity

Time filter

Source Type


Gong S.,CAS Shanghai Institute of Microsystem and Information Technology | Li X.,University of Chinese Academy of Sciences | Xing T.,Beijing University of Posts and Telecommunications | Ma J.,Wuxi Sensing Net Industrialization Research Institute
Advances in Information Sciences and Service Sciences | Year: 2011

Trust and reputation model is a basic mean to protect the security of Wireless Sensor Networks (WSNs). Although various trust and reputation models for WSNs have been proposed, as we know, none of them can achieve high accurate estimation of trustworthiness. In this paper, we present a new least-squares estimates based trust and reputation model for WSNs (LsTrust). The model uses historical samples to estimate the trustworthiness of the node, and calculates the reputation evaluation by combining the average algorithm and the least-squares algorithm. Furthermore, considering that the computation abilities of sensor nodes are limited, we propose a recursive algorithm to simplify the computation. Finally, experiments show that compared with some previous models, the proposed Ls Trust model is more accurate in trust evaluation under three typical changing states of trustworthiness, i.e. ascending state, descending state and fluctuating state. Source


Ma R.,CAS Shanghai Institute of Microsystem and Information Technology | Yu Z.,Wuxi Sensing Net Industrialization Research Institute | Liu H.,Wuxi Sensing Net Industrialization Research Institute
Journal of Information and Computational Science | Year: 2012

There are some problems on the neighbor nodes selection method in Wireless Sensor Networks. The Neighbors Selection Algorithm, based on the communication energy consumption between pairs of nodes, is proposed and applied to enhance the DV routing protocol and DV-Hop localization algorithm. According to the simulation results, in the networks where the node radio range is larger than the average distance between adjacent nodes, the modified routing method could cut down the routing energy consumption, and the modified localization algorithm could achieve better localization accuracy. Copyright © 2012 Binary Information Press. Source


Xiaopeng L.,Beijing University of Posts and Telecommunications | Wendong W.,Beijing University of Posts and Telecommunications | Xiangyang G.,Beijing University of Posts and Telecommunications | Jian M.,Beijing University of Posts and Telecommunications | Jian M.,Wuxi Sensing Net Industrialization Research Institute
China Communications | Year: 2011

To address cross-ISP traffic problem caused by BitTorrent, we present our design and evaluation of a proximity-aware BitTorrent system. In our approach, clients generate global proximityaware information by using landmark clustering; the tracker uses this proximity to maintain all **peers in an orderly way and hands back a biased subset consisting of the peers who are physically closest to the requestor. Our approach requires no co-operation between P2P users and their Internet infra structures, such as ISPs or CDNs, no constantly path monitoring or probing their neighbors. The simulation results show that our approach can not only reduce unnecessary cross- ISP traffic, but also allow downloadsing fast. Source


Zhang J.,Beijing University of Posts and Telecommunications | Wang W.,Beijing University of Posts and Telecommunications | Ma J.,Beijing University of Posts and Telecommunications | Ma J.,Wuxi Sensing Net Industrialization Research Institute | Li X.,Beijing University of Posts and Telecommunications
Journal of Convergence Information Technology | Year: 2012

RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been proposed based on Cyclic Redundancy Check (CRC). Due to the bad properties of the CRC function used in the protocol; the claimed security objectives are not met. In this paper, we propose a novel authentication protocol based on Gen2 for low-cost RFID tags which use the Pseudo-Random Number Generator (PRNG in brief) function instead of the CRC function. The advantages of the novel authentication is that the proposed protocol could withstand de-synchronization attack, disclosure attack and cloning attack, furthermore, it also could provide anonymity and mutual authentication. Source


Gong S.,CAS Shanghai Institute of Microsystem and Information Technology | Gong S.,University of Chinese Academy of Sciences | Xing T.,CAS Shanghai Institute of Microsystem and Information Technology | Xing T.,Wuxi Sensing Net Industrialization Research Institute
2011 2nd International Conference on Mechanic Automation and Control Engineering, MACE 2011 - Proceedings | Year: 2011

A low-cost scissors gate control system was achieved in this paper,which has many front controllers based on real-time operating system of free FreeRTOS, open-source uIP,and ARM Cortex-M3 MCU. This system realized a ID interface by using rfid technology or twodimensional codes. Also TCP/IP data channel, gate control, information management and so on were carried out in this system. Moreover this paper described the implementation of the system. According to the actual situations, it indicated that this system runned reliably and stably. © 2011 IEEE. Source

Discover hidden collaborations