211 results on '"Xiuzhen CHEN"'
Search Results
102. Malicious virtual machines detection through a clustering approach
- Author
-
Xiuzhen Chen, Ahmed Serhrouchni, Youcef Begriche, Mohammad Bazm, Lyes Khoukhi, and Rida Khatoun
- Subjects
Computer science ,business.industry ,Botnet ,Cloud computing ,computer.software_genre ,Computer security ,Virtual machine ,Cloud testing ,Server ,CloudSim ,Scalability ,Cluster analysis ,business ,computer ,Computer network - Abstract
Cloud computing aims to provide enormous resources and services, parallel processing and reliable access for users on the networks. The flexible resources of clouds could be used by malicious actors to attack other infrastructures. Cloud can be used as a platform to perform these attacks, a virtual machine(VM) in the Cloud can play the role of a malicious VM belonging to a Botnet and sends a heavy traffic to the victim. For cloud service providers, preventing their infrastructure from being turned into an attack platform is very challenging since it requires detecting attacks at the source, in a highly dynamic and heterogeneous environment. In this paper, an approach to detect these malicious behaviors in the Cloud based on the analysis of network parameters is proposed. This approach is a source-based attack detection, which applies both Entropy and clustering methods on network parameters. The environment of Cloud is simulated on Cloudsim. The data clustering allows achieving high performance, with a high percentage of correctly clustered VMs.
- Published
- 2015
- Full Text
- View/download PDF
103. An Ime2-like mitogen-activated protein kinase is involved in cellulase expression in the filamentous fungus Trichoderma reesei
- Author
-
Xiuzhen Chen, Zhiyang Dong, Yong Tao, Lina Qin, Fei Chen, Huang Zhenbang, and Su Xiaoyun
- Subjects
Trichoderma ,biology ,Kinase ,Gene Expression Profiling ,Cell ,Fungi ,Bioengineering ,General Medicine ,Cellulase ,biology.organism_classification ,Applied Microbiology and Biotechnology ,Gene expression profiling ,medicine.anatomical_structure ,Biochemistry ,Mitogen-activated protein kinase ,Gene Expression Regulation, Fungal ,Gene expression ,biology.protein ,medicine ,Mitogen-Activated Protein Kinases ,Trichoderma reesei ,Gene Deletion ,Biotechnology - Abstract
Eukaryotic mitogen-activated protein kinases (MAPKs) play crucial roles in transducing environmental and developmental signals inside the cell and regulating gene expression, however, the roles of MAPKs remain largely unknown in Trichoderma reesei.T. reesei ime2 (TrIme2) encodes an Ime2-like MAPK in T. reesei. The deletion of the TrIme2 gene led to 90% increase in cellulase activity against filter paper during earlier period time of cellulase induction as well as the extracellular protein production. Compared to the parent strain, the transcriptional levels of the three major cellulase genes cbh1,cbh2, egl1 were increased by about 9 times, 4 times, 2 times, respectively, at 8 h after cellulase induction in the ΔTrIme2 mutant. In addition, the disruption of TrIme2 caused over 50% reduction of the transcript levels of cellulase transcriptional regulators cre1 and xyr1.TrIme2 functions in regulation of the expression of cellulase gene in T.reesei, and is a good candidate for genetically engineering of T. reesei for higher cellulase production.
- Published
- 2015
104. Multiple behavior information fusion based quantitative threat evaluation
- Author
-
Xiuzhen Chen, Jie Sun, Chen-Guang Lin, Xiaohong Guan, and Qinghua Zheng
- Subjects
Service (systems architecture) ,Security analysis ,General Computer Science ,Computer science ,Network security ,business.industry ,Computer security model ,Asset (computer security) ,Computer security ,computer.software_genre ,Security information and event management ,Threat ,business ,Law ,computer - Abstract
How to evaluate network security threat quantitatively is one of key issues in the field of network security, which is vital for administrators to make decision on the security of computer networks. A novel model of security threat evaluation with a series of quantitative indices is proposed on the analysis of prevalent network intrusions. This model is based on multiple behavior information fusion and two indices of privilege validity and service availability that are proposed to evaluate the impact of prevalent network intrusions on system security, so as to provide security evolution over time, i.e., monitor security changes with respect to modification of security factors. The Markov model and the algorithm of D-S evidence reasoning are proposed to measure these two indices, respectively. Compared with other methods, this method mitigates the impact of unsuccessful intrusions on threat evaluation. It evaluates the impact of important intrusions on system security comprehensively and helps administrators to insight into intrusion steps, determine security state and identify dangerous intrusion traces. Testing in a real network environment shows that this method is reasonable and feasible in alleviating the tremendous task of data analysis and facilitating the understanding of the security evolution of the system for its administrators.
- Published
- 2005
- Full Text
- View/download PDF
105. Temperature-sensitive membranes prepared by the plasma-induced graft polymerization ofN-Isopropylacrylamide into porous polyethylene membranes
- Author
-
Xuehai Yu, Jian Huang, Xiaolin Wang, and Xiuzhen Chen
- Subjects
chemistry.chemical_classification ,Materials science ,Polymers and Plastics ,General Chemistry ,Polymer ,Polyethylene ,Lower critical solution temperature ,Plasma polymerization ,Surfaces, Coatings and Films ,Solvent ,chemistry.chemical_compound ,Monomer ,Membrane ,chemistry ,Polymerization ,Polymer chemistry ,Materials Chemistry - Abstract
A temperature-responsive polymer, poly(N-isopropylacrylamide) (PNIPAAm), was grafted onto porous polyethylene membranes by a plasma-induced graft polymerization technique. A wide range of grafting was achieved through variations in the grafting conditions, including the postpolymerization temperature, time, monomer concentration, and graft-reaction medium. The active species induced by plasma treatment was proven to be long-living via a postpolymerization time of 95 h. Different solvent compositions, that is, water, methanol, benzene, and water/methanol, were used as reaction media, and water showed a much higher polymerization rate than the organic solvents. Based on the hydrophilicity of the active species, a mechanism explaining the solvent effect in plasma-induced graft polymerization was examined. Characterizations by scanning electron microscopy, X-ray photoelectron spectroscopy (XPS), and micro Fourier transform infrared showed that the grafted polymers were located on both the outer surface and inside pores of the membranes. The XPS analysis also confirmed that the polar amide groups tended to distribute more outward when grafted PNIPAAm was in its expanding state than when it was in its shrinking state. Water permeation experiments showed that the permeability of the grafted membranes varied dramatically with a slight temperature change in the vicinity of the lower critical solution temperature (LCST) of PNIPAAm. The effective pore radii of the grafted membranes above and below the LCST could be depicted by Hagen-Poiseuille's law. © 2003 Wiley Periodicals, Inc. J Appl Polym Sci 89: 3180–3187, 2003
- Published
- 2003
- Full Text
- View/download PDF
106. A novel major facilitator transporter TrSTR1 is essential for pentose utilization and involved in xylanase induction in Trichoderma reesei
- Author
-
Lina Qin, Hong-Qing Wu, Zhiyang Dong, Huang Zhenbang, Xiuzhen Chen, and Su Xiaoyun
- Subjects
chemistry.chemical_classification ,Trichoderma ,Endo-1,4-beta Xylanases ,biology ,Saccharomyces cerevisiae ,Pentoses ,Biophysics ,Pentose ,Computational Biology ,Cell Biology ,Xylose ,biology.organism_classification ,Biochemistry ,chemistry.chemical_compound ,chemistry ,Hypocrea ,Enzyme Induction ,Xylanase ,Glycoside hydrolase ,Sugar transporter ,Molecular Biology ,Trichoderma reesei - Abstract
Trichoderma reesei (teleomorph Hypocrea jecorina) is an industrially important filamentous fungus for glycoside hydrolases production, with its xylanolytic enzymes widely applied in many areas. However, the molecular mechanisms underlying xylanase expression are still insufficiently understood. In particular, the effect of sugar transporter on the induction of xylanase expression is unclear. In this work, we identified a novel major facilitator transporter TrSTR1 that is capable of transporting xylose by using a xylose utilization system in Saccharomyces cerevisiae. In T. reesei, TrSTR1 is essential for the utilization of d-xylose, l-arabinose, and even their downstream metabolites D-xylitol and L-arabitol. TrSTR1 is also involved in the induction of xylanase expression since both the xylanase activity and extracellular protein concentration in the Tu6△str1 strain were decreased, which further confirmed by a qRT-PCR analysis of the transcript levels of the key transcriptional regulators. Our observations provide new insights into connections between pentose utilization and xylanase production in T. reesei.
- Published
- 2015
107. Characterization and homologous overexpression of an N-acetylglucosaminidase Nag1 from Trichoderma reesei
- Author
-
Zhiyang Dong, Yong Tao, Xiuzhen Chen, Lina Qin, and Fei Chen
- Subjects
Genes, Fungal ,Molecular Sequence Data ,Biophysics ,Biology ,Biochemistry ,law.invention ,Fungal Proteins ,Industrial Microbiology ,law ,Putative gene ,Acetylglucosaminidase ,Secretion ,Amino Acid Sequence ,Cloning, Molecular ,Promoter Regions, Genetic ,Molecular Biology ,Peptide sequence ,Gene ,Trichoderma reesei ,Trichoderma ,Fungal protein ,Molecular mass ,Sequence Homology, Amino Acid ,Temperature ,Cell Biology ,Hydrogen-Ion Concentration ,biology.organism_classification ,Molecular biology ,Recombinant Proteins ,Up-Regulation ,Molecular Weight ,Recombinant DNA - Abstract
Trichoderma reesei is thought to be a promising recombinant host for the production and secretion of complex proteins due to its ability to secrete large amounts of proteins. In this study we identified a functional N-acetyl-β-glucosaminidase (NAGase) gene Nag1 in T. reesei. Nag1, a putative gene encoding a GH 20 family NAGase in T. reesei, was cloned and homologous overexpressed in the T. reesei RutC30ΔU3 with a strong cellobiohydrolase1 gene (cbh1) promoter. Nag1 was secreted in its active form and the highest expression level was around 499.85IU/ml. Nag1 has a molecular mass of 80kDa. The optimum pH and temperature were 4.0 and 60°C, respectively.
- Published
- 2014
108. Wormhole Attacks Detection in MANETs using Graph Theory
- Author
-
Rmayti, Mohammad, Begriche, Youcef, Khatoun, Rida, Khoukhi, Lyes, Gaïti, Dominique, Xiuzhen, Chen, Environnement de Réseaux Autonomes (ERA), Institut Charles Delaunay (ICD), Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS)-Université de Technologie de Troyes (UTT)-Centre National de la Recherche Scientifique (CNRS), Département Informatique et Réseaux (INFRES), Télécom ParisTech, Objets et Agents pour Systèmes d'Information et Simulation (OASIS), Laboratoire d'Informatique de Paris 6 (LIP6), Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS)-Université Pierre et Marie Curie - Paris 6 (UPMC)-Centre National de la Recherche Scientifique (CNRS), and Shanghai Jiao Tong University [Shanghai]
- Subjects
[INFO]Computer Science [cs] ,ComputingMilieux_MISCELLANEOUS - Abstract
International audience
- Published
- 2014
109. Histone methyltransferase G9a contributes to H3K27 methylation in vivo
- Author
-
Shaorong Gao, Sheng Liu, Xiaojun Ding, She Chen, Yingfeng Li, Hui Wu, Jun Xiong, Xiuzhen Chen, Bing Zhu, and Hong Li
- Subjects
EZH2 ,Histone-Lysine N-Methyltransferase ,Cell Biology ,Biology ,Bioinformatics ,Methylation ,Mass Spectrometry ,Cell biology ,Histones ,Mice ,In vivo ,Histone methyltransferase ,Histone H2A ,H3k27 methylation ,Histone methylation ,Animals ,Amino Acid Sequence ,Cancer epigenetics ,Letter to the Editor ,Molecular Biology ,Embryonic Stem Cells - Published
- 2010
- Full Text
- View/download PDF
110. GW26-e1342 Relationship between blood pressure and severity of coronary atherosclerosis in asymptomatic adults: assessment with coronary CT angiography
- Author
-
Mingjun Bai, Xiuzhen Chen, Chuangfeng Li, and Jie Qin
- Subjects
medicine.medical_specialty ,Blood pressure ,business.industry ,Internal medicine ,medicine ,Cardiology ,Coronary ct angiography ,medicine.symptom ,business ,Cardiology and Cardiovascular Medicine ,Asymptomatic ,Coronary atherosclerosis - Published
- 2015
- Full Text
- View/download PDF
111. A trustless architecture of blockchain-enabled metaverse
- Author
-
Minghui Xu, Yihao Guo, Qin Hu, Zehui Xiong, Dongxiao Yu, and Xiuzhen Cheng
- Subjects
Metaverse ,Blockchain ,Edge computing ,Trust ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Metaverse has rekindled human beings’ desire to further break space-time barriers by fusing the virtual and real worlds. However, security and privacy threats hinder us from building a utopia. A metaverse embraces various techniques, while at the same time inheriting their pitfalls and thus exposing large attack surfaces. Blockchain, proposed in 2008, was regarded as a key building block of metaverses. it enables transparent and trusted computing environments using tamper-resistant decentralized ledgers. Currently, blockchain supports Decentralized Finance (DeFi) and Non-fungible Tokens (NFT) for metaverses. However, the power of a blockchain has not been sufficiently exploited. In this article, we propose a novel trustless architecture of blockchain-enabled metaverse, aiming to provide efficient resource integration and allocation by consolidating hardware and software components. To realize our design objectives, we provide an On-Demand Trusted Computing Environment (OTCE) technique based on local trust evaluation. Specifically, the architecture adopts a hypergraph to represent a metaverse, in which each hyperedge links a group of users with certain relationship. Then the trust level of each user group can be evaluated based on graph analytics techniques. Based on the trust value, each group can determine its security plan on demand, free from interference by irrelevant nodes. Besides, OTCEs enable large-scale and flexible application environments (sandboxes) while preserving a strong security guarantee.
- Published
- 2023
- Full Text
- View/download PDF
112. Towards a Fine-Grained Access Control for Cloud
- Author
-
Mounira Msahli, Xiuzhen Chen, Ahmed Serhrouchni, Laboratoire Traitement et Communication de l'Information (LTCI), Télécom ParisTech-Institut Mines-Télécom [Paris] (IMT)-Centre National de la Recherche Scientifique (CNRS), and Institut Mines-Télécom [Paris] (IMT)-Télécom Paris
- Subjects
Cloud computing security ,Computer access control ,Computer science ,business.industry ,Distributed computing ,access control ,Cloud computing ,Access control ,security ,graph ,computer.software_genre ,Mandatory access control ,Discretionary access control ,[INFO.INFO-CR]Computer Science [cs]/Cryptography and Security [cs.CR] ,[INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] ,Operating system ,Role-based access control ,[INFO]Computer Science [cs] ,Distributed File System ,business ,computer ,Cloud ,Safe Box ,ComputingMilieux_MISCELLANEOUS ,—Profile centric model - Abstract
International audience; The centerpiece of an efficient Cloud securityarchitecture is a well-defined access control policy. In literaturewe can find several access control models such as the MandatoryAccess Control (MAC), Discretionary Access Control (DAC),Role-Based Access Control (RBAC) and the latest one UsageControl Authorization, oBligation and Condition (UCONABC).The UCONABCis very suitable for the context of distributedsystems like cloud computing but it doesn't give anyimplementation method. In this paper we define the profilecentric model using graph formalism and its implementationusing matrix. We define the profile as the combination of allpossible authorization, obligation, condition, role, etc... and otheraccess parameters like attributes that we can found in Cloudsystem.We discuss its application using three matrixes (profiledefinition, profile inheritance and user assignment). Profilecentric modeling is an optimum paradigm to define accesscontrol policy in complex distributed and elastic system likecloud computing.The proposed solution is validated andimplemented over Hadoop distributed file system in the contextof Safe Box as a service.
- Published
- 2013
- Full Text
- View/download PDF
113. Transcriptional profiling of biomass degradation-related genes during Trichoderma reesei growth on different carbon sources
- Author
-
Yingfeng Luo, Xiuzhen Chen, Hong Wu, Zhiyang Dong, Hongtao Yu, Songnian Hu, Yuhui Sun, and Shuhui Song
- Subjects
Genes, Fungal ,Bioengineering ,Cellulase ,Applied Microbiology and Biotechnology ,Fungal Proteins ,chemistry.chemical_compound ,Gene Expression Regulation, Fungal ,Gene expression ,Glycoside hydrolase ,Biomass ,Cellulose ,Gene ,Trichoderma reesei ,Trichoderma ,biology ,Sequence Analysis, RNA ,Gene Expression Profiling ,RNA ,General Medicine ,biology.organism_classification ,Gene expression profiling ,Glucose ,chemistry ,Biochemistry ,biology.protein ,Biotechnology - Abstract
To identify all the gene products involved in cellulosic biomass degradation, we employed RNA sequencing technology to perform a genome-wide comparison of gene expression during growth of Trichoderma reesei QM9414 on cellulose or glucose. Due to their important role in lignocellulose decomposition, we focused on CAZymes and other secreted proteins. In total, 122 CAZymes showed at least a two-fold change in mRNA abundance, and 97 of those were highly induced by cellulose. Compared to the well-characterized cellulases and hemicellulases, a majority of the other upregulated CAZymes showed lower transcriptional levels. In addition, 64 secreted proteins, including oxidoreductases, exhibited at least two-fold upregulation on cellulose medium. To better understand the potential roles of low-abundance CAZymes in cellulose breakdown, we compared the expression patterns of 25 glycoside hydrolase genes under different conditions via real-time PCR. Substantial differences for the 25 genes were observed for individual strains grown on different carbon sources, and between QM9414 and RUTC30 when grown on the same carbon source. Moreover, we identified 3 genes that are coregulated with known cellulases. Collectively, this study highlights a comprehensive transcriptional profile for biomass degradation-related proteins and provides a first step toward the identification of candidates to construct optimized enzyme cocktails.
- Published
- 2013
114. Detecting Community Structure of Complex Networks Based on Network Potential
- Author
-
Yuxin Zhao, Hao Peng, Xiuzhen Chen, Shenghong Li, Yueguo Zhang, and Chenglin Zhao
- Subjects
Topological property ,Distributed computing ,Community structure ,Statistical parameter ,Complex network ,Measure (mathematics) ,Field (computer science) - Abstract
Community structure is an important topological property of complex networks, which is beneficial to understand the structures and functions of complex networks. In this chapter a new statistical parameter, which we call network potential, is proposed to measure a complex network by introducing the field theories of physics. We then present a detecting algorithm of community structure based on the network potential whose main strategy is partitioning the network by optimizing the value of the network potential. We test our algorithm on both computer-generated networks and real-world networks whose community structure is already known. The experimental results show the algorithm can be effectively utilized for detecting the community structure of complex network.
- Published
- 2012
- Full Text
- View/download PDF
115. Quantitative threat assessment of denial of service attacks on service availability
- Author
-
Jianhua Li, Shenghong Li, Jin Ma, and Xiuzhen Chen
- Subjects
Service (systems architecture) ,Network security ,business.industry ,Computer science ,Reliability (computer networking) ,Denial-of-service attack ,Computer security ,computer.software_genre ,Security service ,Server ,Network performance ,business ,Threat assessment ,computer - Abstract
With increasing denial of service attacks on network infrastructure, there is an urgent need to develop technique to assess the threat of attacks on network security online. A novel model of security threat assessment relying on several predefined metrics of network performance is proposed to measure the impact of denial of service attacks on service availability in real time. This model applies the technique of D-S evidence reasoning to fuse three metrics of network performance, which are designed carefully to reflect the reliability of service availability in three perspectives. Our approach includes three steps: determining performance parameters, calculating threat index and characterizing the threat state of service availability. Compared with other methods, this method avoids the unilateral result obtained from single sensor, helps administrators to determine security threat state, and provides threat evolution of service availability over time. Testing in a real network environment shows that this method greatly improves the accuracy of threat assessment, demonstrates the impact of denial of service attacks on network security is different from the beginning to the end of DoS attacks, and provides administrators with threat evolution picture macroscopically. Moreover, it lays the foundation for administrators to adopt security response policies in real time for reliable and robust network.
- Published
- 2011
- Full Text
- View/download PDF
116. A privacy-preserving alert correlation model
- Author
-
Jin Ma, Xiuzhen Chen, and Jianhua Li
- Subjects
Set (abstract data type) ,Data sharing ,Correlation ,Information privacy ,Similarity (network science) ,Computer science ,Alert correlation ,k-anonymity ,Intrusion detection system ,Data mining ,computer.software_genre ,computer - Abstract
Data holders need to share the alerts data that they detected for correlation and analysis purpose. In such cases, privacy issues turn out to be a major concern. This paper proposes a model to correlate and analyze intrusion alerts with privacy-preserving capability. The raw intrusion alerts are protected by improved k-anonymity method, which preserves the alert regulation inside disturbed data records. Combining this privacy preserving method with typical FP-tree frequent pattern mining approach and WINEPI sequence pattern mining algorithm, an alert correlation model is set up to well balance the alert correlation and the privacy protection. Experimental results show that this model reaches close similarity of correlation and analysis result comparing with original FP-tree and WINEPI algorithm, while sensitive attributes are well preserved.
- Published
- 2010
- Full Text
- View/download PDF
117. Bayesian-based model for a reputation system in vehicular networks
- Author
-
Begriche, Youcef, primary, Khatoun, Rida, additional, Khoukhi, Lyes, additional, and Xiuzhen, Chen, additional
- Published
- 2015
- Full Text
- View/download PDF
118. Using attack graphs and intrusion evidences to extrapolate network security state
- Author
-
Shaojun Zhang, Shanshan Song, Lan Li, Jianhua Li, and Xiuzhen Chen
- Subjects
Theoretical computer science ,Network security ,business.industry ,Computer science ,Node (networking) ,Approximation algorithm ,Bayesian inference ,computer.software_genre ,Weighting ,Metric (mathematics) ,Algorithm design ,Data mining ,business ,computer ,Computer Science::Cryptography and Security - Abstract
Network attack graphs are originally used to evaluate what the worst security state will be if a network is under attack. Along with observed intrusion evidences, we can further use attack graphs to extrapolate the current security state of a concerned network. Methods have been proposed in recent years to use observed intrusion evidences to compute the node belief metric of network attack graphs. However, these methods suffer either from low model generality, high computational complexity or immoderate dependence on empirical formulas. To overcome these obstacles, we improve one of the Bayesian network inference algorithms — the likelihood weighting algorithm into a novel node belief metric computation method. Experiment results show our method can achieve high computational accuracy in linear computational complexity, a feature making it feasible to be used to process large scale network attack graphs in real-time.
- Published
- 2009
- Full Text
- View/download PDF
119. Study of generating attack graph based on privilege escalation for computer networks
- Author
-
Xiuzhen Chen, Shaojun Zhang, and Jianhua Li
- Subjects
Relational database management system ,Relational database ,Vulnerability assessment ,Network security ,business.industry ,Computer science ,Vulnerability ,business ,computer.software_genre ,Computer security ,computer ,Privilege escalation ,Host (network) - Abstract
All current vulnerability assessment tools only can locate individual vulnerabilities on a single host without considering correlated effect of these vulnerabilities. Aiming at this issue, this paper proposes a method of generating attack graph based on privilege escalation. The vulnerabilities and known attacks with their prerequisites and consequences are modeled based on predicate logic theory and are correlated so as to automatically construct attack graphs with strong operation power of RDBMS. The testing result shows that this system can discover security problems undetectable if only the hosts are assessed individually in a network without simulating attacks. As an application based on relational database, it can be easily integrated with other security tools based on RDBMS.
- Published
- 2008
- Full Text
- View/download PDF
120. Evaluating attack time expenses for network security alert causal correlation
- Author
-
Lei Fan, Shaojun Zhang, Xiuzhen Chen, and Jianhua Li
- Subjects
Correlation ,Network security ,business.industry ,Computer science ,Attack time ,Metric (unit) ,Intrusion detection system ,Data mining ,business ,Computer security ,computer.software_genre ,computer - Abstract
Network security alert causal correlation aims at correlating causal related security alerts into comprehensible attack scenarios. In this paper, we propose a novel correlation criterion by evaluating the time expenses of the attacks that trigger security alerts. By taking the attack time expenses as random variables and studying their probabilistic distribution, we can calculate the temporal correlation belief metric of any two candidate alerts. To testify the feasibility, a prototype system is designed, implemented and tested with the DARPA 2000 IDS evaluation dataset. Result shows that our method is effective and efficient, providing a strong complementary support for attack scenario construction.
- Published
- 2008
- Full Text
- View/download PDF
121. Generating network attack graphs for security alert correlation
- Author
-
Jianhua Li, Shaojun Zhang, Lei Fan, and Xiuzhen Chen
- Subjects
Network security ,business.industry ,Computer science ,Covert channel ,Computer security model ,Computer security ,computer.software_genre ,Security information and event management ,Network simulation ,Security service ,Network Access Control ,business ,computer ,Heterogeneous network ,Network management station ,Computer network - Abstract
Most network administrators have got the unpleasant experience of being overwhelmed by tremendous unstructured network security alerts produced by heterogeneous network devices. To date, various approaches have been proposed to correlate security alerts, including the adoption of network attack graphs to clarify their causal relationship. However, there still lacks an operational method to generate attack graphs tailored for alert correlation, especially in large scale network environments. In this paper, we propose a kind of attack graph which can be built in polynomial time using an intuitive object-oriented method. Based on the graph, a criterion is given out to correlate security alerts into scenarios. As practice, a prototype system is implemented to testify the feasibility of the approaches.
- Published
- 2008
- Full Text
- View/download PDF
122. Forecast of intrusion behavior based on interactive knowledge discovery
- Author
-
Xiaohong Guan, Chen-Guang Lin, Qinghua Zheng, and Xiuzhen Chen
- Subjects
Computer science ,business.industry ,Network security ,Event (computing) ,Intrusion detection system ,computer.software_genre ,Machine learning ,Host-based intrusion detection system ,Intrusion ,Knowledge extraction ,Artificial intelligence ,Data mining ,Inference engine ,Intrusion prevention system ,business ,computer - Abstract
Forecasting intending intrusion according to intrusion preludes is vital in computer security. One novel intrusion behavior forecast system based on interactive knowledge discovery, which consists of off-line interactive knowledge discovery and on-line forecast, is put forward. As to the former, the algorithm of sequential pattern discovery, WINEPI, is introduced to implement interactive knowledge discovery so as to mine frequent sequential patterns, of intrusion behavior from historical intrusion, event dataset. A novel idea of correlating discovered short sequential patterns based on intrusion prerequisite and intrusion intention is proposed to build long sequential patterns. As to the on-line part of intrusion behavior forecast system, it employs inference engine developed in this paper to forecast intrusion behavior based on intrusion preludes and to discover forecast rules. This system changes passive data storage into active data usage and helps to achieve active defense. Application in the integrated network security monitor and defense system named Net-Keeper have shown that all forecast accuracies are greater than 75%, which proves this system is feasible.
- Published
- 2005
- Full Text
- View/download PDF
123. GW25-e0811 Multimodality imaging to monitor mesenchymal stem cells for the treatment of myocardial infarction
- Author
-
Jie, Qin, primary, Xiaoli, Wang, additional, and Xiuzhen, Chen, additional
- Published
- 2014
- Full Text
- View/download PDF
124. GW25-e0814 Triple-fused reporter gene to monitor mesenchymal stem cells for the treatment of ischemic heart disease
- Author
-
Jie, Qin, primary, Chuangfeng, Li, additional, and Xiuzhen, Chen, additional
- Published
- 2014
- Full Text
- View/download PDF
125. Fast Skyline Community Search in Multi-Valued Networks
- Author
-
Dongxiao Yu, Lifang Zhang, Qi Luo, Xiuzhen Cheng, Jiguo Yu, and Zhipeng Cai
- Subjects
multi-valued graph ,community search ,skyline community ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Community search has been extensively studied in large networks, such as Protein-Protein Interaction (PPI) networks, citation graphs, and collaboration networks. However, in terms of widely existing multi-valued networks, where each node has d (d⩾1) numerical attributes, almost all existing algorithms either completely ignore the attributes of node at all or only consider one attribute. To solve this problem, the concept of skyline community was presented, based on the concepts of k-core and skyline recently. The skyline community is defined as a maximal k-core that satisfies some influence constraints, which is very useful in depicting the communities that are not dominated by other communities in multi-valued networks. However, the algorithms proposed on skyline community search can only work in the special case that the nodes have different values on each attribute, and the computation complexity degrades exponentially as the number of attributes increases. In this work, we turn our attention to the general scenario where multiple nodes may have the same attribute value. Specifically, we first present an algorithm, called MICS, which can find all skyline communities in a multi-valued network. To improve computation efficiency, we then propose a dimension reduction based algorithm, called P-MICS, using the maximum entropy method. Our algorithm can significantly reduce the skyline community searching time, while is still able to find almost all cohesive skyline communities. Extensive experiments on real-world datasets demonstrate the efficiency and effectiveness of our algorithms.
- Published
- 2020
- Full Text
- View/download PDF
126. When blockchain meets smart grids: A comprehensive survey
- Author
-
Yihao Guo, Zhiguo Wan, and Xiuzhen Cheng
- Subjects
Blockchain ,Smart Grid ,Survey ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Recent years have witnessed an increasing interest in the blockchain technology, and many blockchain-based applications have been developed to take advantage of its decentralization, transparency, fault tolerance, and strong security. In the field of smart grids, a plethora of proposals have emerged to utilize blockchain for augmenting intelligent energy management, energy trading, security and privacy protection, microgrid management, and energy vehicles. Compared with traditional centralized approaches, blockchain-based solutions are able to exploit the advantages of blockchain to realize better functionality in smart grids. However, the blockchain technology itself has its disadvantages in low processing throughput and weak privacy protection. Therefore, it is of paramount importance to study how to integrate blockchain with smart grids in a more effective way so that the advantages of blockchain can be maximized and its disadvantages can be avoided.This article surveys the state-of-the-art solutions aiming to integrate the emergent blockchain technology with smart grids. The goal of this survey is to discuss the necessity of applying blockchain in different components of smart grids, identify the challenges encountered by current solutions, and highlight the frameworks and techniques used to integrate blockchain with smart grids. We also present thorough comparison studies among blockchain-based solutions for smart grids from different perspectives, with the aim to provide insights on integrating blockchain with smart grids for different smart grid management tasks. Finally, we list the current projects and initiatives demonstrating the current effort from the practice side. Additionally, we draw attention to open problems that have not yet been tackled by existing solutions, and point out possible future research directions.
- Published
- 2022
- Full Text
- View/download PDF
127. A cloud-based framework for verifiable privacy-preserving spectrum auction
- Author
-
Ruinian Li, Tianyi Song, Bo Mei, Chunqiang Hu, Wei Li, Maya Larson, Xiuzhen Cheng, and Rongfang Bie
- Subjects
Homomorphic encryption ,Re-encryption ,Spectrum auction ,Privacy-preservation auction ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Spectrum auction is one of the most effective ways to achieve dynamic spectrum allocation in cognitive radio networks, and it provides one effective way to manage the spectrum demands of IoT devices with limited resources. Most spectrum auctions focus on protecting bidder privacy and achieving excellent social efficiency, but few tackles the verification of auction results that are controlled by the auctioneer. In this paper, we propose a cloud-based framework for verifiable privacy-preserving spectrum auctions. Our framework adopts a modified AFGH re-encryption algorithm that achieves both bid privacy protection and auction results verification at the same time. The cloud server helps to compute auction results based on homomorphic encryption, and an auctioneer decrypts the encrypted data from the server to obtain auction results. Meanwhile, the property of re-encryption makes it possible for any bidder to verify the auction results without compromising other bidders’ privacy.
- Published
- 2022
- Full Text
- View/download PDF
128. Delayed bronchobiliary fistula following radiofrequency ablation in a patient with hepatocellular carcinoma: A case report and lesson regarding treatment.
- Author
-
ZHAOLIN ZENG, MINGYUE CAI, WENSOU HUANG, JINGJUN HUANG, XIUZHEN CHEN, HONG SHAN, and KANGSHUN ZHU
- Subjects
BILIARY fistula ,LIVER cancer ,RADIOTHERAPY complications ,MAGNETIC resonance imaging ,CANCER treatment - Abstract
Bronchobiliary fistula (BBF) is a rare complication of radiofrequency ablation (RFA) of hepatocellular carcinoma. The rupture of a biloma following RFA may result in the development of BBF, with their early detection and timely management important in the prevention of BBF. The current study presents a case of BBF, which developed at 17 months after radiofrequency ablation (RFA), due to biloma rupture in a patient with hepatocellular carcinoma. Despite the percutaneous drainage of the biloma following BBF, the persistent fever did not resolve due to biliary infection. Finally, an extensive surgical intervention was performed. The magnetic resonance imaging (MRI) scans that had been performed following RFA were reviewed, and it was found that the biloma and increased bile leakage had presented prior to biloma rupture. For that reason, it is advised that patients who present with biloma following RFA should receive regular follow-up MRI scans. Biloma enlargement could be a predictor for the development of BBF; therefore, timely drainage of an enlarging biloma may be able to prevent this complication. [ABSTRACT FROM AUTHOR]
- Published
- 2016
- Full Text
- View/download PDF
129. CSRF protection in JavaScript frameworks and the security of JavaScript applications
- Author
-
Ksenia Peguero and Xiuzhen Cheng
- Subjects
JavaScript security ,Web security ,Web frameworks ,Framework analysis ,Cross-site request forgery ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
With JavaScript being the most popular programming language on the web, several new JavaScript frameworks are released every year. A well designed framework may help developers create secure applications. The goal of our study is to understand how framework developers can best protect applications developed using their framework. In this work we studied how cross-site request forgery vulnerability is mitigated in several server-side JavaScript frameworks: Express.js, Koa.js, Hapi.js, Sails.js, and Meteor.js. We then analyzed open source applications developed with these frameworks using open source and custom written tools for automated static analysis and identified the percentage of protected applications for each framework. We correlated our analysis results to the implementation levels of mitigating controls in each framework and performed statistical analysis of our results to ensure no other confounding factors were involved. Based on the received outcomes we provide recommendations for framework developers on how to create frameworks that produce secure applications.
- Published
- 2021
- Full Text
- View/download PDF
130. Electrolint and security of electron applications
- Author
-
Ksenia Peguero and Xiuzhen Cheng
- Subjects
JavaScript security ,Web security ,Desktop security ,Framework analysis ,Electron framework ,Static analysis ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
JavaScript applications today are not limited to just client-side web applications and server-side code powered by Node.js. They became the standard for desktop application development with the emergence and popularity of the Electron framework. Combining the features of client-side and server-side applications, the Electron applications possess a completely different security posture. The attacks typical for front-end applications can now be escalated to the back-end attacks, for example, making a cross-site scripting result in a remote code execution on the user’s machine. The goal of our study is to analyze the typical security vulnerabilities of an Electron application, study common mitigation controls, and propose new remediation solutions that are easy to implement for developers. In this study we analyze security vulnerabilities in over a hundred open source Electron applications using automated and manual static analysis. We explore the mitigation controls existing in the Electron framework, and propose changes to the framework that will prevent many of the common vulnerabilities. Based on these results, we develop an IDE plugin for Electron applications that automatically suggests remediations to common security defects within a developer’s work environment, thus shifting the fixing of a vulnerability to earlier in the software development life cycle. We show the effectiveness of the IDE plugin by applying the plugin’s suggestions to the analyzed open source applications and demonstrating that they stop being exploitable after the applied fix.
- Published
- 2021
- Full Text
- View/download PDF
131. GROUP TESTING COMPUTER ALGORITHMS ENHANCE TNM PROGNOSTIC ASSESSMENT IN LUNG CANCER
- Author
-
Kai Xing, Arnold M. Schwartz, Dechang Chen, Donald E. Henson, and Xiuzhen Chen
- Subjects
Pulmonary and Respiratory Medicine ,medicine.medical_specialty ,business.industry ,medicine ,Cardiology and Cardiovascular Medicine ,Critical Care and Intensive Care Medicine ,Lung cancer ,medicine.disease ,Intensive care medicine ,business ,Group testing - Published
- 2008
- Full Text
- View/download PDF
132. Inaugural issue editorial
- Author
-
Xiuzhen Cheng, Weifeng Lv, and Zhipeng Cai
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Published
- 2021
- Full Text
- View/download PDF
133. Quantitative threat assessment of denial of service attacks on service availability.
- Author
-
Xiuzhen Chen, Shenghong Li, Jin Ma, and Jianhua Li
- Published
- 2011
- Full Text
- View/download PDF
134. Evaluating attack time expenses for network security alert causal correlation.
- Author
-
Shaojun Zhang, Jianhua Li, Xiuzhen Chen, and Lei Fan
- Published
- 2008
- Full Text
- View/download PDF
135. A Blockchain Based Truthful Incentive Mechanism for Distributed P2P Applications
- Author
-
Yunhua He, Hong Li, Xiuzhen Cheng, Yan Liu, Chao Yang, and Limin Sun
- Subjects
Incentive mechanism ,P2P applications ,data transmissions ,Bitcoin System ,collusion attacks ,pricing strategy ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
In distributed peer-to-peer (P2P) applications, peers self-organize and cooperate to effectively complete certain tasks such as forwarding files, delivering messages, or uploading data. Nevertheless, users are selfish in nature and they may refuse to cooperate due to their concerns on energy and bandwidth consumption. Thus each user should receive a satisfying reward to compensate its resource consumption for cooperation. However, suitable incentive mechanisms that can meet the diverse requirements of users in dynamic and distributed P2P environments are still missing. On the other hand, we observe that Blockchain is a decentralized secure digital ledger of economic transactions that can be programmed to record not just financial transactions and Blockchain-based cryptocurrencies get more and more market capitalization. Therefore in this paper, we propose a Blockchain based truthful incentive mechanism for distributed P2P applications that applies a cryptocurrency such as Bitcoin to incentivize users for cooperation. In this mechanism, users who help with a successful delivery get rewarded. As users and miners in the Blockchain P2P system may exhibit selfish actions or collude with each other, we propose a secure validation method and a pricing strategy, and integrate them into our incentive mechanism. Through a game theoretical analysis and evaluation study, we demonstrate the effectiveness and security strength of our proposed incentive mechanism.
- Published
- 2018
- Full Text
- View/download PDF
136. Temperature-sensitive membranes prepared by the plasma-induced graft polymerization of N-Isopropylacrylamide into porous polyethylene membranes.
- Author
-
Jian Huang, Xiaolin Wang, Xiuzhen Chen, and Xuehai Yu
- Published
- 2003
137. Perturbation-Based Private Profile Matching in Social Networks
- Author
-
Ruinian Li, Hongjuan Li, Xiuzhen Cheng, Xiaobo Zhou, Keqiu Li, Shengling Wang, and Rongfang Bie
- Subjects
Social networks ,private profile matching ,privacy preservation ,secure dot-product ,secure friend discovery ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Social networking has become part of our life in recent years, allowing users to converse and connect with people sharing similar interests in real world. However, networking via the social media suffers from serious privacy issues, and one of which is profile attribute leakage in friend discovery. While existing studies mainly focus on leveraging rich cryptographic algorithms to prevent privacy leak, we propose a novel perturbation-based private profile matching mechanism by mixing the private data with random noise to preserve privacy in this paper. In this paper, we consider the case where the profiles are fine-grained, meaning that each attribute is associated with a user-specific numerical value to indicate the level of interest. By carefully tuning the amount of information owned by each party, we guarantee that privacy is effectively preserved while the matching result of users' profiles can be cooperatively obtained. We first give an introduction to a basic scheme, then detail two improved ones by, respectively, taking collusion attack and verifiability into consideration. As no expensive encryption algorithms get involved, our methods are computationally efficient; thus they are more practical for real-world applications. Theoretical security analysis as well as comparison-based simulation studies are carried out to evaluate the performance of our designs.
- Published
- 2017
- Full Text
- View/download PDF
138. An Attribute-Based Encryption Scheme to Secure Fog Communications
- Author
-
Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, Xiaoshuang Xing, and Xiuzhen Cheng
- Subjects
Fog computing ,security ,ciphertext-policy attribute based encryption (CP-ABE) ,cloud computing ,communications security ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Fog computing is deemed as a highly virtualized paradigm that can enable computing at the Internet of Things devices, residing in the edge of the network, for the purpose of delivering services and applications more efficiently and effectively. Since fog computing originates from and is a non-trivial extension of cloud computing, it inherits many security and privacy challenges of cloud computing, causing the extensive concerns in the research community. To enable authentic and confidential communications among a group of fog nodes, in this paper, we propose an efficient key exchange protocol based on ciphertext-policy attribute-based encryption (CP-ABE) to establish secure communications among the participants. To achieve confidentiality, authentication, verifiability, and access control, we combine CP-ABE and digital signature techniques. We analyze the efficiency of our protocol in terms of security and performance. We also implement our protocol and compare it with the certificate-based scheme to illustrate its feasibility.
- Published
- 2017
- Full Text
- View/download PDF
139. A Secure and Practical Authentication Scheme Using Personal Devices
- Author
-
Abdulrahman Alhothaily, Chunqiang Hu, Arwa Alrawais, Tianyi Song, Xiuzhen Cheng, and Dechang Chen
- Subjects
Security ,authentication ,one-time username ,access control ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Authentication plays a critical role in securing any online banking system, and many banks and various services have long relied on username/password combos to verify users. Memorizing usernames and passwords for a lot of accounts becomes a cumbersome and inefficient task. Furthermore, legacy authentication methods have failed over and over, and they are not immune against a wide variety of attacks that can be launched against users, networks, or authentication servers. Over the years, data breach reports emphasize that attackers have created numerous high-tech techniques to steal users' credentials, which can pose a serious threat. In this paper, we propose an efficient and practical user authentication scheme using personal devices that utilize different cryptographic primitives, such as encryption, digital signature, and hashing. The technique benefits from the widespread usage of ubiquitous computing and various intelligent portable and wearable devices that can enable users to execute a secure authentication protocol. Our proposed scheme does not require an authentication server to maintain static username and password tables for identifying and verifying the legitimacy of the login users. It not only is secure against password-related attacks, but also can resist replay attacks, shoulder-surfing attacks, phishing attacks, and data breach incidents.
- Published
- 2017
- Full Text
- View/download PDF
140. Cooperative spectrum sharing of multiple primary users and multiple secondary users
- Author
-
Hang Liu, Sha Hua, Xuejun Zhuo, Dechang Chen, and Xiuzhen Cheng
- Subjects
Dynamic spectrum access ,MIMO ,Relay selection ,Cooperative spectrum sharing ,Bargaining game ,Information technology ,T58.5-58.64 - Abstract
This paper proposes a multiple-input multiple-output (MIMO) based cooperative dynamic spectrum access (DSA) framework that enables multiple primary users (PUs) and multiple secondary users (SUs) to cooperate in spectrum sharing. By exploiting MIMO in cooperative DSA, SUs can relay the primary traffic and send their own data at the same time, which greatly improves the performance of both PUs and SUs when compared to the non-MIMO time-division spectrum sharing schemes. Especially, we focus on the relay selection optimization problem among multiple PUs and multiple SUs. The network-wide cooperation and competition are formulated as a bargaining game, and an algorithm is developed to derive the optimal PU-SU relay assignment and resource allocation. Evaluation results show that both primary and secondary users achieve significant utility gains with the proposed framework, which gives all of them incentive for cooperation.
- Published
- 2016
- Full Text
- View/download PDF
141. Histone methyltransferase G9a contributes to H3K27 methylation in vivo.
- Author
-
Hui Wu, Xiuzhen Chen, Jun Xiong, Yingfeng Li, Hong Li, Xiaojun Ding, Sheng Liu, She Chen, Shaorong Gao, and Bing Zhu
- Subjects
LETTERS to the editor ,METHYLATION - Abstract
A letter to the editor is presented which discusses the role of histone methyltransferase G9a to histone H3 lysine 27 (H3K27) methylation.
- Published
- 2011
- Full Text
- View/download PDF
142. Editorial for special issue on Big Data and knowledge extraction for Cyber-Physical Systems 2016
- Author
-
Xiuzhen Cheng, Yunchuan Sun, Zhipeng Cai, Jiguo Yu, Donghyun Kim, and Jin Liu
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Published
- 2016
- Full Text
- View/download PDF
143. Big Data and Knowledge Extraction for Cyber-Physical Systems
- Author
-
Xiuzhen Cheng, Yunchuan Sun, Antonio Jara, Houbing Song, and Yingjie Tian
- Subjects
Electronic computers. Computer science ,QA75.5-76.95 - Published
- 2015
- Full Text
- View/download PDF
144. Two New 4,5-Dioxoaporphine Alkaloids Isolated from Aristolochia tuberosa
- Author
-
Zhu, Dayuan, primary, Dayuan, Zhu, additional, Baode, Wang, additional, Baoshan, Huang, additional, Rensheng, Xu, additional, Yunping, Qiu, additional, and Xiuzhen, Chen, additional
- Published
- 1982
- Full Text
- View/download PDF
145. QuickCash: Secure Transfer Payment Systems
- Author
-
Abdulrahman Alhothaily, Arwa Alrawais, Tianyi Song, Bin Lin, and Xiuzhen Cheng
- Subjects
secure payment systems ,QuickCash ,mobile payment ,P2P payment ,banking ,QR code ,Chemical technology ,TP1-1185 - Abstract
Payment systems play a significant role in our daily lives. They are an important driver of economic activities and a vital part of the banking infrastructure of any country. Several current payment systems focus on security and reliability but pay less attention to users’ needs and behaviors. For example, people may share their bankcards with friends or relatives to withdraw money for various reasons. This behavior can lead to a variety of privacy and security issues since the cardholder has to share a bankcard and other sensitive information such as a personal identification number (PIN). In addition, it is commonplace that cardholders may lose their cards, and may not be able to access their accounts due to various reasons. Furthermore, transferring money to an individual who has lost their bankcard and identification information is not a straightforward task. A user-friendly person-to-person payment system is urgently needed to perform secure and reliable transactions that benefit from current technological advancements. In this paper, we propose two secure fund transfer methods termed QuickCash Online and QuickCash Offline to transfer money from peer to peer using the existing banking infrastructure. Our methods provide a convenient way to transfer money quickly, and they do not require using bank cards or any identification card. Unlike other person-to-person payment systems, the proposed methods do not require the receiving entity to have a bank account, or to perform any registration procedure. We implement our QuickCash payment systems and analyze their security strengths and properties.
- Published
- 2017
- Full Text
- View/download PDF
146. Social Welfare Control in Mobile Crowdsensing Using Zero-Determinant Strategy
- Author
-
Qin Hu, Shengling Wang, Rongfang Bie, and Xiuzhen Cheng
- Subjects
crowdsensing ,game theory ,zero-determinant strategy ,social welfare ,Chemical technology ,TP1-1185 - Abstract
As a promising paradigm, mobile crowdsensing exerts the potential of widespread sensors embedded in mobile devices. The greedy nature of workers brings the problem of low-quality sensing data, which poses threats to the overall performance of a crowdsensing system. Existing works often tackle this problem with additional function components. In this paper, we systematically formulate the problem into a crowdsensing interaction process between a requestor and a worker, which can be modeled by two types of iterated games with different strategy spaces. Considering that the low-quality data submitted by the workers can reduce the requestor’s payoff and further decrease the global income, we turn to controlling the social welfare in the games. To that aim, we take advantage of zero-determinant strategy, based on which we propose two social welfare control mechanisms under both game models. Specifically, we consider the requestor as the controller of the games and, with proper parameter settings for the to-be-adopted zero-determinant strategy, social welfare can be optimized to the desired level no matter what strategy the worker adopts. Simulation results demonstrate that the requestor can achieve the maximized social welfare and keep it stable by using our proposed mechanisms.
- Published
- 2017
- Full Text
- View/download PDF
147. Radar and Sonar Sensor Networks
- Author
-
Qilian Liang, Xiuzhen Cheng, Scott. C.-H. Huang, Sherwood W. Samn, Lingming Wang, and Zheng Zhou
- Subjects
Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Published
- 2010
- Full Text
- View/download PDF
148. Latency-Optimized and Energy-Efficient MAC Protocol for Underwater Acoustic Sensor Networks: A Cross-Layer Approach
- Author
-
Qingchun Ren and Xiuzhen Cheng
- Subjects
Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Considering the energy constraint for fixed sensor nodes and the unacceptable long propagation delay, especially for latency sensitive applications of underwater acoustic sensor networks, we propose a MAC protocol that is latency-optimized and energy-efficient scheme and combines the physical layer and the MAC layer to shorten transmission delay. On physical layer, we apply convolution coding and interleaver for transmitted information. Moreover, dynamic code rate is exploited at the receiver side to accelerate data reception rate. On MAC layer, unfixed frame length scheme is applied to reduce transmission delay, and to ensure the data successful transmission rate at the same time. Furthermore, we propose a network topology: an underwater acoustic sensor network with mobile agent. Through fully utilizing the supper capabilities on computation and mobility of autonomous underwater vehicles, the energy consumption for fixed sensor nodes can be extremely reduced, so that the lifetime of networks is extended.
- Published
- 2010
- Full Text
- View/download PDF
149. In Situ Key Establishment in Large-Scale Sensor Networks
- Author
-
Yingchang Xiang, Fang Liu, Xiuzhen Cheng, Dechang Chen, and David H. C. Du
- Subjects
Telecommunication ,TK5101-6720 ,Electronics ,TK7800-8360 - Abstract
Due to its efficiency, symmetric key cryptography is very attractive in sensor networks. A number of key predistribution schemes have been proposed, but the scalability is often constrained by the unavailability of topology information before deployment and the limited storage budget within sensors. To overcome this problem, three in-situ key establishment schemes, SBK, LKE, and iPAK, have been proposed. These schemes require no preloaded keying information but let sensors compute pairwise keys after deployment. In this paper, we propose an in-situ key establishment framework of which iPAK, SBK, and LKE represent different instantiations. We further compare the performance of these schemes in terms of scalability, connectivity, storage, and resilience. Our simulation results indicate that all the three schemes scale well to large sensor networks. We also notice that SBK outperforms LKE and LKE outperforms iPAK with respect to topology adaptability. Finally, observing that iPAK, SBK, and LKE all rely on the key space models that involve computationally intensive modular operations, we propose an improvement that rely on random keys that can be easily computed from a secure pseudorandom function. This new approach requires no computation overhead at regular worker sensors, therefore has a high potential to conserve the network resource.
- Published
- 2009
- Full Text
- View/download PDF
150. On Connected Target k-Coverage in Heterogeneous Wireless Sensor Networks
- Author
-
Jiguo Yu, Ying Chen, Liran Ma, Baogui Huang, and Xiuzhen Cheng
- Subjects
heterogeneous wireless sensor networks (HWSNs) ,k-coverage ,connectivity ,connected cover set ,Chemical technology ,TP1-1185 - Abstract
Coverage and connectivity are two important performance evaluation indices for wireless sensor networks (WSNs). In this paper, we focus on the connected target k-coverage (CTC k ) problem in heterogeneous wireless sensor networks (HWSNs). A centralized connected target k-coverage algorithm (CCTC k ) and a distributed connected target k-coverage algorithm (DCTC k ) are proposed so as to generate connected cover sets for energy-efficient connectivity and coverage maintenance. To be specific, our proposed algorithms aim at achieving minimum connected target k-coverage, where each target in the monitored region is covered by at least k active sensor nodes. In addition, these two algorithms strive to minimize the total number of active sensor nodes and guarantee that each sensor node is connected to a sink, such that the sensed data can be forwarded to the sink. Our theoretical analysis and simulation results show that our proposed algorithms outperform a state-of-art connected k-coverage protocol for HWSNs.
- Published
- 2016
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.