-
221
Modified security model based on dynamic trusted degree
Published 2008-01-01“…A modified security model based on dynamic trusted degree security model MSMBDTD(modified security model based on dynamic trusted degree) was proposed.Based on the trusted authentication and measurement of trusted computing,MSMBDTD first gave definition of trusted degree rule.Then it analyzed dynamic transformation of trusted degree in the course of system running.And also it modified access privilege of subject,which made access range be in conformance with trusted degree.Finally,after formal description and safety analysis with proof are given,MSMBDTD can support access control based on trusted degree.…”
Get full text
Article -
222
Review on video privacy protection
Published 2013-08-01“…With the rapid development of the Internet and the tremendous proliferation of video applications,video privacy protection has garnered significant attention nowadays.It is a key problem to protect privacy while ensuring normal application.A survey of video privacy protection technologies was presented,and summary,comparison and analysis were mainly in three aspects:privacy extraction,privacy protection and access control.Moreover,some distinctive issues that correlate to privacy protection in video surveillance,such as privacy definition and perceptive security evaluation were also addressed.Finally,challenges and perspectives of video privacy protection technology were discussed.…”
Get full text
Article -
223
Dynamic frame length selection algorithm for slotted access in LTE-Advanced
Published 2017-03-01“…Through analyzing the random access model of slotted access based channel access control protocol (SCACP) in LTE-Advanced system, an optimization algorithm for access frame length selection based on slotted access was proposed. …”
Get full text
Article -
224
Optimal transmissions for space-time coded OFDM UWB systems
Published 2005-01-01“…The emerging ultra-wideband (UWB) system offers a great potential for the design of high-speed short-range communications.Compared with great progress at physical layer,the corresponding medium access control (MAC) layer designs are naturally placed on the schedules.We focus on the optimal power load scheme,which is an integral part of the MAC layer protocol design,for UWB space-time coded (STC) orthogonal frequency-division multiplexing (OFDM) transmissions.Assumed the transmitter has perfect or partial channel stage information (CSI).Based on the optimization criteria of maximizing capacity,three kinds of power load schemes were presented with different tradeoff among performance,complexity and feedback bandwidth overhead.The proposed schemes are verified and compared under the channel prototype proposed by IEEE 802.15.3a Task Group.…”
Get full text
Article -
225
A congestion control method based on loading-feedback in MTC
Published 2016-11-01“…Through analyzing the access efficiency of machine type communication(MTC)devices in LTE-Advanced system,a loading-feedback control method was proposed.The current access load was estimated and the load of next access slot were calculated using the preamble state information,and the access control parameters for MTC device were adjusted based on the load change dynamically.The good performance of the proposed solution was evaluated by computer simulations.The simulation result shows that the proposed scheme can reduce the impact of nearly simultaneous access of a large number of MTC devices on human-to-human(H2H)devices,decrease the number of retransmissions and improve the access success rate effectively.…”
Get full text
Article -
226
MAC protocols in ultra-wide band system
Published 2005-01-01“…Recently,the ultra-wide band (UWB)-based technique is focused on more deeply along with the design of MAC (media access control) for its advantages.Comparing with the conventional wireless communication system,the UWB system has its unique characteristics,higher speed rate,lower PSD (power spectrum density),etc.It is therefore necessary to propose advanced MAC protocols for matching the requirements of the system.In this study,the performance of various types of MAC protocols based on UWB system is investigated.The physical structures for different MAC protocols are compared.Some special demands from UWB for MAC are analyzed.The advanced design for the MAC protocols in UWB is proposed.It may provide the implementation base for future MAC protocols.…”
Get full text
Article -
227
Multi-authority attribute-based encryption with efficient revocation
Published 2017-03-01“…Multi-authority attribute-based encryption was very suitable for data access control in a cloud storage environment.However,efficient user revocation in multi-authority attribute-based encryption remains a challenging problem that prevents it from practical applications.A multi-authority ciphertext-policy attribute-based encryption scheme with efficient revocation was proposed in prime order bilinear groups,and was further proved statically secure and revocable in the random oracle model.Extensive efficiency analysis results indicate that the proposed scheme significantly reduce the computation cost for the users.In addition,the proposed scheme supports large universe and any monotone access structures,which makes it more flexible for practical applications.…”
Get full text
Article -
228
Secrecy outage probability based access strategy for device-to-device communication underlaying cellular networks
Published 2016-08-01“…A secure access strategy for D2D (device-to-device) communications underlaying cellular networks based on the secrecy outage probability was proposed.Firstly,the secrecy outage probability in the worst case was derived and a transmission power optimization scheme for D2D pairs was given.An access control strategy was further presented to allow the D2D pair with the minimum secrecy outage probability to reuse the cellular resource,which improved the se-cure communications for D2D links and cellular uplinks.Finally,simulation results showed that the proposed scheme was effective.…”
Get full text
Article -
229
Big data security features and operation practices
Published 2021-05-01“…With the continuous refinement of data types, user roles and application requirements, as well as the complex data storage and flow scenarios of big data, the requirement of big data security is higher and higher.Starting from the security characteristics and operation practice of big data, the security characteristics and technology development trend of big data were analyzed, the construction and operation practice of China Telecom’s big data security defense system with “data and people” as the core was systematically summarized.Some thoughts and prospects for the introduction of new technologies were also raised such as blockchain, federated learning, artificial intelligence and zero trust in data security circulation, data security risk monitoring and data access control.…”
Get full text
Article -
230
Altruistic Backoff: Collision Avoidance for Receiver-Initiated MAC Protocols for Wireless Sensor Networks
Published 2014-05-01“…In receiver-initiated medium access control (MAC) protocols for wireless sensor networks, communication is initiated by the receiver node which transmits beacons indicating its availability to receive data. …”
Get full text
Article -
231
Research on the Networking Strategy in Indoor Visible Light Communication
Published 2014-01-01“…The key technologies of VLC system about the layout of lighting, network handover and access control were analyzed.…”
Get full text
Article -
232
Data privacy preservation for the search of Internet of things based on fine-grained authorization
Published 2017-01-01“…Secondly, the scheme of data privacy preservation for the search of Internet of things based on fine-grained authorization was pro-posed, which combined the encrypted search algorithm with the attribute based access control algorithm. Thirdly, the security analysis and performance analysis of the scheme were also carried out. …”
Get full text
Article -
233
Resource management in sliced networks with mobile edge computing for B5G and 6G
Published 2021-06-01“…With the time-delay sensitive compute-intensive tasks growing exponentially, 5G and future 6G mobile cellular communication networks will form differentiated network slices with edge computing resource to service the multiple communication services.To achieve this, the wireless frequency and edge computing resources will be shared among the network slices, thus the efficient management of the resources is of great importance.The demands of resources management in the life duration of the network slice was analyzed.Then the research progress of the corresponding technologies for slices, i.e., access control, resources allocation and stimulating cooperation among terminals, were summarized.And the open research issue was given.Thus, the resources are managed efficiently for the slices with edge computing resource.…”
Get full text
Article -
234
Using idle TDMA slots for retransmitting packets cooperatively in VANET
Published 2015-07-01“…The distributed TDMA approach for VANET dose not take advantage of idle slots,failing to effectively utilize radio resources.A retransmission method for medium access control was proposed for utilizing idle slots.In the method,neighboring nodes utilized idle slots for retransmitting a packet which failed to reach the target receiver.Theoretical analysis and simulation results show that the proposed method significantly increases the probability of successful packet transmission and the network throughput.In addition,a comparison between the proposed method and IEEE 802.11p was presented via extensive simulation,and the results prove that,due to its ability to access channel determinately,the method can disseminate real-time safety information timely and stably.…”
Get full text
Article -
235
Application-aware IPv6 networking
Published 2020-08-01“…,service level agreement,SLA).A framework called application-aware IPv6 networking (APN6) was proposed,which could encapsulate applications’ requirements into packets.Networks could be aware of an application’s requirements and perform traffic steering and network resource adjustment.Besides,a secure access control mechanism was designed to solve application information forgery and tampering issues in APN6,which ensured that APN6 only provided services to legal users.…”
Get full text
Article -
236
An energy-efficient multi-channel MAC protocol for linear sensor network
Published 2022-12-01“…Sensor nodes in linear sensor network (LSN) are deployed linearly due to the linear topology of the monitoring area.Most of the state-of-the-art medium access control (MAC) protocols designed for LSN adopted the duty-cycling and pipelined-forwarding (DCPF) schemes.They can reduce data propagation delay and network energy consumption but may still cause issues such as transmission competition, interference, and energy hole.To address these issues, an improved DCPF MAC protocol was proposed based on multiple channels and redundant-node deployment for LSN.The extensive simulations based on OPNET demonstrate that, compared with existing protocols, the proposed protocol shows a better performance in terms of energy efficiency, packet delivery ratio, throughput, and packet transmission latency.…”
Get full text
Article -
237
Slice scheduling strategy in LTE wireless network virtualization
Published 2017-02-01“…The future mobile communication network slicing mechanism was studied.A slice scheduler of flow level in medium access control (MAC) layer within the base station was used to utilize the shared resources between operators by predetermined proportion in the downlink LTE system.According to the different service level agreement parameters,the wireless resources are allocated for operators,which is the owner of slices in wireless network virtualization.System level simulation experiment and the comparison of the utilization between different slice methods were carried out.Compared to fixed slice method,the NVS method ensures that the users in different slices can achieve better utilization of wireless resources.In addition,the slices for services were established according to the difference of real-time(RT)and non-real-time(NRT)traffic requests,which minimizes the packet loss rate and ensures performance of the whole system.…”
Get full text
Article -
238
Data-driven data transmission of the Internet of things based on sensing spectrum
Published 2019-06-01“…Facing the problem of spectrum shortage caused by the mass data,in order to share as a solution,how operators use the sensing spectrum reasonably to transmit data was studied.Considering the limitation of Internet of things(IoT) devices,the ultra-dense cognitive heterogeneous network architecture was designed,based on traffic demand and perception cost,an optimal access control and perception decision method was designed to maximize network utility.Considering the uncertainty of the perceived spectrum,the optimal programming scheme was modeled as a mixed integer stochastic optimization problem,and a data-driven probabilistic solution method based on statistical characteristics was proposed.In the case of unknown probability distribution of available bandwidth,data transmission requirements meeting various service requests were counted.…”
Get full text
Article -
239
La préparation et le passage du recensement du Soudan 2008
Published 2008-06-01“…So much stakes, identity and ressources access, control and redistribution conflicts at all scales and in every sudanese margin are pushing the census to catalyse and finally reveal the tragical limits of an ethnocratic governance.…”
Get full text
Article -
240
Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing
Published 2019-04-01“…In order to solve the problems of privilege sensitivity protection and the abuse of authorization by the agent when the device owner delegates authorization in IoT devices sharing environment,a trust-based delegation mechanism for controllable partial permissions was proposed with the trust access control model and the proxy signature.This mechanism generates trust values and authorization policies based on the relationship between the users,and implements controllable partial authority delegation through the proxy signature.According to the security analysis,the mechanism can meet the security attributes such as verifiability,non-repudiation,distinguishability,identifiability and non-abuse required by the permission transfer,and ensure the controllable security transfer of the device owner's permission.The problem of over authorization of an intermediary agent is effectively prevented.…”
Get full text
Article