Showing 601 - 620 results of 1,197 for search '"lightweight"', query time: 0.04s Refine Results
  1. 601

    Research on trust sensing based secure routing mechanism for wireless sensor network by Dan-yang QIN, Shuang JIA, Song-xiang YANG, Jing-ya MA, Yan ZHANG, Qun DING

    Published 2017-10-01
    “…Aiming at the serious impact of the typical network attacks caused by the limited energy and the poor deployment environment of wireless sensor network (WSN) on data transmission,a trust sensing based secure routing mechanism (TSSRM) with the lightweight characteristics and the ability to resist many common attacks simultaneously was proposed.Based on the analysis of the characteristics of network attack,the trust degree calculation model was constructed by combining node’s behavior with energy,at the same time the security route selection algorithm was also optimized by taking trust degree and QoS metrics into account.Performance analysis and simulation results show that TSSRM can improve the security and effectiveness of WSN.…”
    Get full text
    Article
  2. 602

    Secure and efficient token based roaming authentication scheme for space-earth integration network by Kaiping XUE, Yongjin MA, Jia’nan HONG, Jie XU, Qingyou YANG

    Published 2018-05-01
    “…Aiming at the problem of prolongation and instability of satellite and terrestrial physical communication links in the space-earth integration network,a two-way token based roaming authentication scheme was proposed.The scheme used the characteristics of the computing capability of the satellite nodes in the network to advance the user authentication process from the network control center (NCC) to the access satellite.The satellite directly verified the token issued by the NCC to verify the user's identity.At the same time,the token mechanism based on the one-way accumulator achieved the user's dynamic join,lightweight user self-service customization and billing,and the introduction of Bloom Filter enabled effective user revocation and malicious access management.Compared with the existing scheme,the scheme can guarantee the security of roaming authentication and significantly reduce the calculation and communication overhead of the authentication and key negotiation process.…”
    Get full text
    Article
  3. 603

    Design of Material Transfer Manipulator in Lamp Lens Processing by Guo Ruiqin, Chen Song, Huang Junbo

    Published 2020-04-01
    “…The lamp lens is an important concentrator in the lamp assembly.The disadvantages of the traditional loading and unloading process of the hot forming process of lamp lens are analyzed.A lightweight and large-stroke loading and unloading manipulator is put forward based on the kinematic analysis of the glass rod.Introduced KaDang mechanism to realize the large stroke motion of the manipulator; added slider-crank mechanism to effectively reduce the space size of manipulator.The mutual movements among the components of KaDang mechanism is used to drive the combined mechanism,which can effectively reduce the number of drives and improve the dynamics performance of manipulator.At last,by using the virtual prototype,the kinematic simulation is carried out and the moving trail of manipulator is got,the correctness and superiority of the scheme are verified.…”
    Get full text
    Article
  4. 604

    Privacy protection of warning message publishing protocol in VANET by Hui LIU, Xinyan LIU, Yan XU, Hong ZHONG, Meng WANG

    Published 2021-08-01
    “…Aiming at the problem that the traffic control department publishes violation messages to vehicles, a privacy protection warning message publishing protocol was proposed, where transportation manage department could obtain vehicle’s pseudonym according to its real identity and send warning message to vehicles based on its pseudonym in VANET.Elliptic curve cryptography was used to construct a lightweight warning message publishing and receiving process.Furthermore, the conditional privacy protection was realized, which could effectively protect the identity privacy of the receiving vehicle.Security analysis shows that the proposed protocol can meet the security requirements of VANET.Performance analysis shows that the protocol protocol has lower computational overhead and communication overhead.…”
    Get full text
    Article
  5. 605

    Study on the Structure Optimization of Lever Balance Type Erecting Mechanism by Liu Yuxi, Gao Qinhe, Feng Jiangtao, Cheng Xiangrui

    Published 2016-01-01
    “…Aiming at the characteristics that its force is complicated and the stress distributed unbalanced in erecting process,the flexibility analysis on the stress of the triangular arm at the initial stage and the intermediate stage are carried out. The lightweight of the triangular arm is carried out by using topology optimization,so as to reducing the structural weight and the cost is saved.…”
    Get full text
    Article
  6. 606

    Achieving resist against DHCP man-in-the-middle attack scheme based on key agreement by Zhiqiang YAO, Zhirong ZHU, Guohua YE

    Published 2021-08-01
    “…In order to deal with the issue of the man-in-the-middle attack in the process of using dynamic host configuration protocol, a lightweight scheme was proposed.A new key agreement algorithm was developed based on public key cryptography to generate relevant keys, reducing the key storage burden.On the basis, a secure scheme was proposed, where two-way authentication of participants was designed to prevent the man-in-the-middle attack and digital signatures conforming to protocol specifications was constructed to ensure the legitimacy of the message source.By security analysis, the proposed scheme was demonstrated to be secure and valid against the man-in-the-middle attack and other common attacks.Experimental results show that the proposed scheme has the better performance compared with the related schemes, and can be compatible with both DHCPv4 and DHCPv6.…”
    Get full text
    Article
  7. 607

    Research on secret key generation based on wireless channel characteristics in body area network by Jingjing HUANG

    Published 2021-12-01
    “…Wireless body area network (WBAN) is a human-centered wireless network.With limitations of power and computation capabilities of WBAN, the significant challenge of ensuring security is how to generate a shared key between two entities based on a lightweight symmetric cryptography.To investigate this issue, a secret key generation scheme in ultra-wideband (UWB) WBAN was designed.In this scheme, the difference of multipath relative delay and its average value were chosen as common random source to reduce key mismatch probability.Furthermore, with the aid of relay, secret key generation rate could be increased.Simulation and test results demonstrate that the proposed scheme can achieve a good tradeoff between key match probability and key generation rate.Furthermore, security analysis of the scheme was also provided to validate its feasibility.…”
    Get full text
    Article
  8. 608

    Zero correlation-integral attack of MIBS block cipher by Qing-cong LIU, Ya-qun ZHAO, Meng MA, Feng-mei LIU

    Published 2016-11-01
    “…MIBS is a lightweight block cipher for extremely constrained environments such as RFID tags and sensor networks. …”
    Get full text
    Article
  9. 609

    Modal Analysis and Optimization Method of Flexspline of Harmonic Reducer by Yang Wang, Qianqian Liu, Xiaobiao Mu, Hao Wang

    Published 2021-12-01
    “…In response to the design requirements of miniaturization,lightweight and high resonance frequency of the flexspline,the inner diameter,aspect ratio,thickness-diameter ratio and tooth width coefficient of the flexspline are used as research variables. …”
    Get full text
    Article
  10. 610

    Collection Tree Extension of Reactive Routing Protocol for Low-Power and Lossy Networks by Jiazi Yi, Thomas Clausen

    Published 2014-03-01
    “…This paper proposes an extension to reactive routing protocol, for efficient construction of a collection tree for data acquisition in sensor networks. The Lightweight On-Demand Ad hoc Distance Vector Routing Protocol-Next Generation (LOADng) is a reactive distance vector protocol which is intended for use in mobile ad hoc networks and low-power and lossy networks to build paths between source-destination pairs. …”
    Get full text
    Article
  11. 611

    Novel chaotic block encryption scheme for WSN based on dynamic sub key by Ya-hua WANG, Yu-hua LING, Li-qing LIAO, Ke-hui SUN, Wen-hao LIU

    Published 2017-12-01
    “…In view of high efficiency and security requirements in WSN encryption algorithm,a lightweight chaotic block encryption algorithm was designed and a novel scheme of dynamic sub keys extension was proposed.To greatly reduce the computing burden of WSN nodes,this scheme made full use of WSN cloud servers monitoring platform,which was powerful in data computing and processing,and transfered the sub keys synchronization task from nodes to cloud servers.Experimental results and performance analysis show that the scheme has good characteristics of diffusion,confusion and statistical balance,strong key security and high algorithm efficiency.It has a good application prospect in the field of WSN communication encryption.…”
    Get full text
    Article
  12. 612

    RELIABILITY OPTIMIZATION DESIGN ON SHEARER’S RANGING ARM GEAR TRANSMISSION SYSTEM by LI FengJiang, ZHANG Jie, LIAO YingHua, LI QingChen

    Published 2017-01-01
    “…The results show that this method of optimization can improve gear transmission’s reliability,the volume and weight of gear transmission system are reduced too,which is beneficial to achieving products lightweight and reduceing production cost.…”
    Get full text
    Article
  13. 613

    Research on HTML5 application cache poison attack by Yan JIA, He WANG, Shao-qing LYU, Yu-qing ZHANG

    Published 2016-10-01
    “…HTML5 application cache (AppCache) allowed Web browser to access Web offline.But it also brought a new method of cache poisoning attack that was more persisting.As for websites which used the AppCache,a novel poisoning method RFTM (replace file twice method),in which the attacker replaced the manifest file twice to poison the client’s AppCache,was proposed.Compared with the original attack,the legal server would not receive abnormal HTTP requests from the client in the attack.Therefore,changing the server configuration could not prevent the client from the RFTM AppCache poisoning.To avoid the attack mentioned above,a lightweight signature defense scheme Sec-Cache in application layer was designed.Furthermore,experiments show that it has good performance and compatibility.…”
    Get full text
    Article
  14. 614

    Data processing based on the privacy-preserving vector for wireless sensor networks by Wei-ni ZENG, Ya-ping LIN, Ye-qing YI, Shi-ming HE, Peng CHEN

    Published 2015-09-01
    “…To solve the privacy disclosing problem during the data processing phase of wireless sensor networks,a dis-tributed mechanism was proposed.Privacy-preserving vector (vector for short) was constructed.Moreover,lightweight method for vector generation and novel method for using the vector were also presented.Thus,the methods were able to solve the privacy-preserving problem for various data processing funtions such as max/min and data compression effi-ciently.An algorithm based on data hiding and slice was given and then the vector was able to be generated securely and dynamically.Extensive analyses and experiments show that the mechanism is more robust to node compromise attack and thus can preserve privacy more efficiently.Moreover,the mechanism consumes less power.…”
    Get full text
    Article
  15. 615

    Provable secure mutual authentication protocol for RFID in the standard model by Feng XIAO, Ya-jian, ZHOU, Jing-xian ZHOU, Xin-xin NIU

    Published 2013-04-01
    “…The security issue of RFID is becoming more and more serious,in order to protect the RFID's information security and privacy,a mutual authentication protocol for RFID based on HB protocol was proposed in the standard model.The security proofs for this novel protocol was given by using the reduction method,and attacker's hardness was reduced to the indistinguishability between pseudo-random function and real random function.The implementation of proposed protocol only required lightweight pseudo-random generator and vector dot product operation and provided higher security and efficiency.The comparisons of security and performance were also given with other authentication protocols,the results show that the proposed protocol is feasible for RFID tags which are low cost and resource-constrained.…”
    Get full text
    Article
  16. 616

    A Computational Method for Dynamic Analysis of Deployable Structures by Ying Wang, Bin Sun

    Published 2020-01-01
    “…A computational method is developed to study the dynamics of lightweight deployable structures during the motion process without regard to damping. …”
    Get full text
    Article
  17. 617

    The Security Weakness of Block Cipher Piccolo against Fault Analysis by Junghwan Song, Kwanhyung Lee, Younghoon Jung

    Published 2014-03-01
    “…Piccolo is a 64-bit lightweight block cipher which is able to be implemented in constrained hardware environments such as a wireless sensor network. …”
    Get full text
    Article
  18. 618

    Design of a Small Quadruped Robot with Parallel Legs by Ming Lu, Baorui Jing, Hao Duan, Guanbin Gao

    Published 2022-01-01
    “…In this paper, a lightweight and modular design of a quadruped robot with two-degree-of-freedom parallel legs is presented. …”
    Get full text
    Article
  19. 619

    Energy-absorbing structures with multi-material topology optimization considering large deformation by Daiki WATANABE, Masatoshi SHIMODA

    Published 2025-01-01
    “…Future vehicle design will require lightweight, crashworthy, and stiffness, yet it will balance these requirements. …”
    Get full text
    Article
  20. 620

    Development Status and Trend of Space Optical Communication Technology by Shaowen LU, Xia HOU, Guotong LI, Jianfeng SUN, Hanghua YU, Weibiao CHEN

    Published 2022-06-01
    “…Based on the laser inter-satellite communication link to realize information transmission between diff erent satellite nodes in satellite constellation, it can solve the problems of slow data rate and limited frequency resources in traditional satellite communication technology.Firstly, the main components of space laser communication technology and the research status at home and abroad were introduced.Then, the technical difficulties and main solutions of high-performance tracking, fast acquisition and high-throughput communication of the terminal were described respectively.Finally, the development trend of space laser communication miniaturization, lightweight and low power consumption technology were described, and the new technology was discussed, which provided relevant reference for the development of space laser communication technology.…”
    Get full text
    Article