To solve the problems just like limited cut point and handoff frequently when switching in low earth orbit,an algorithm that is used to orientate the handoff point based on the theorem called flat fan angle and the security cutting protocol related which is based on optimization strategy is proposed. Firstly,the flat sectorial angle theorem is applied to fix the latitude and longitude coordinates of the switch point,using this method avoided the limitations of the application of spherical triangle theorem;Therefore the new algorithm can calculate any cutting point in space. Secondly,it optimizes the performance of switching protocol from two aspects:Choosing the satellite which is most fit for the aircraft in speed to be next-hop satellite when switching,doing like that can shrunk the cut frequency;The new protocol is enhanced security by drawing into historical record which can reflect the past secret key and the integrity of orders. Finally,the new protocol is designed under the context transmission mode,which can decrease the communication and computing costs when compared with protocols under other authentication mode. Simulation experimental results show that the low communication and computing costs,less switching frequency and high security features makes the protocol be more suitable for LEO satellite network.
Microblog is not only a center or channel of mass media,but also involved in the formation,development and guidance of public opinions. The propagation of speculation microblog which is released from We-media,opinion leaders or some other users,causes microblog rumors,false hype,social mobilization and other problems. This paper analyzes the phenomenon of covert planning,mines the difference of the structure in communication networks and the incremental statistics of forwardings between the ordinary and the speculation. A novel algorithm for hype microblog recognition is proposed in this paper based on Support Vector Machine (SVM) which uses the modularity peak spread and the average diameter of the shortest path in propagation network. The proposed method has advantages of less dependence on user profile information and is sensitive to the structure of propagation networks,and it has higher recognition accuracy.
Wireless Local Area Network (WLAN) can be combined together with 3G network to be the carrier of Internet of Things (IoT). To solve the problem of security and group communication in recent access authentication schemes,this paper proposes a Secure and Efficient Group Access Authentication Protocol (SEGAP). It sets up the equipment group in initialization and registration stage and accomplishes the secure access in authentication and key agreement stage. Compared with conventional EAP-AKA,this scheme guarantees stronger forward security by adopting Elliptic Curve Diffie-Hellman (ECDH),enables first equipment in group to acquire group authentication vector,this paper shares it with others who come later,and provides better authentication performance by realizing group access authentication. The analysis results illustrate that the protocol can reduce the cost of group communication and can be applied to the business of IoT very well.
Taking advantage of vector merging algorithm and homomorphic Hash function,this paper proposes a data integrity scheme for multi-source network coding against pollution attacks. Each source node computes raw massage’s Hash values and uses a secure mechanism to sign the Hash values,then appends the Hash values and its signatures to each message which sends to forward nodes and sink nodes. The forwarder can verify the integrity of network coded data from different source nodes without knowing the sources private keys and generating the Hash for the combined messages. Experimental results show that the computation efficiency of the proposed scheme is better than the existing multi-source network coding scheme,and it is more suitable for the large-scale distributed network data security verification.
Web services composition is a key technology to solve cross-organizational business process integrations. However,it is hard to ensure its trusted properties (including correctness,reliability,safety),because of the loosely coupled development paradigm and open Internet running environment. To solve this problem,this paper proposes a formal verification and abstraction method for Web services composition based on model checking Multi-Agent Systems (MAS) and refinement. By applying the method of the graph-like counterexample guided abstraction and refinement on MCTK,it greatly reduces the state explosion problem of model checking. The correctness of the method is proved theoretically. Recording to the experimental results of which translates a credit risk assessment Web services to a MAS programmed by input language of MCTK then model checks both abstracted and un-abstracted MAS,the Web services verification based on proposed method works much more efficiently than the normal verification based on MAS model checking.
The traditional DV-Hop localization algorithm estimates the average hop distance with the physical distance between the anchor nodes instead of actual transmission distance,and the distance error between the two kinds of distance undoubtedly leads to the inaccuracy of the average hop distance and relatively high localization error. Aiming at this problem,the improved algorithm is proposed. The reason of error between the physical distance and actual transmission distance is analyzed in the paper,and is summarized as the asymmetry of distance resulted from the nodes random distribution,as well as the deviation degree between the actual transmission path and the physical distance,and the distance compensation model is built based on the asymmetry and deviation degree to make the physical distance closer to the transmission distance. The improved algorithm increases no extra hardware and the complexity of the DV-Hop. The simulation results show that the improved algorithm compensates the distance between the anchor nodes,and improves the localization accuracy to the unknown nodes.
Aiming at the problem of the tag’s ownership safe transfer during its lifetime,an ownership transfer protocol for Radio Frequency Identification(RFID) is proposed,which is based on the Hash function without the Third Trust Party (TTP). It adopts the challenge-response mechanism,and uses the Status flag to indicate the tag ’ s owner. In this protocol,the previous owner and the new owner share different secret keys with the target tag respectively, with communication information transferred between them,and the entities in systems can be authenticated. After a serious of authentication,the new owner obtains the ownership of the target tag. Analysis result shows that the protocol can satisfy the proposed security requirements for tag ownership transfer. The target tag is owned by the previous owner,and only owned by the new owner after the protocol’ s execution. So it can make the tag’ s ownership transfer exclusively. Compared with the previous works,the protocol’s performances on security and implementations are improved.