Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifun...Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface.展开更多
In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round...In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players.展开更多
DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the pri...DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the principles of both traditional and novel (Kaminsky) DNS cache poisoning, presents attack samples and describes the whole attack process in detail. After verifying the potential harm of DNS cache poisoning, the paper gives out several defense strategies.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different mon...This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different monitoring and controlling systems constructed by different companies, each with different functions and communication protocols. The protocol reduces the amount of traffic and has real-time and high-perfor-mance advantages. The protocol was implemented in CMCS for telecommunication power supply and air-condi-tioner used by the Telecommunication Bureau of Zhejiang Province. This paper deals with the hierarchical architecture and function of CMCS and packet format, command ID, and SDL description of its protocol. We also discuss the properties of the interoperability and performance of the protocol in this paper.展开更多
With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic techniqu...With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network.展开更多
This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before...This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before decoding, packet loss probability isestimated on the receiver side and encapsulated intoa soft ACKand sent to the sender.After decoding,decoding results are encapsulated into hard ACKsandsent to the sender. There are two contributionsin the proposed scheme: 1. Empl layer calculation instead layer statistics to estimate oying physical of application the packet loss probability of space channel, which can improvethe accuracy and practicality. 2. A cascade overhead-failure probability relationship between the sender and the receiver has been analyzed to help determine the exact numberof packetsneeded byfountain decoding.Simulations show that for space communications,compared with the existing space transport protocols, fountain codes based transport protoeolwith the proposed schemecan not only ensure transmission reliability, but also greatly improvelink utilization.展开更多
The congestion control mechanisms of the current standard TCP constrain the congestion windows that can be achieved by TCP in high-speed networks, which leads to low link utilization. HSTCP is one solution to solve th...The congestion control mechanisms of the current standard TCP constrain the congestion windows that can be achieved by TCP in high-speed networks, which leads to low link utilization. HSTCP is one solution to solve this problem by modifying the congestion control mechanism to have the characteristics of TCP friendliness in high loss rate environment and high scalability in low loss rate environment. However, experiments revealed that HSTCP has severe RTT unfairness. After analyzing the RTT unfairness in HSTCP with a model, we proposed CW-HSTCP, which added a fair factor to decrease the difference of congestion window caused by different RTT. Fair factor of long RTT flows can cause a sharp window increment that is easy to cause a bursty traffic, so a method called block-pacing was adopted. Simulation results showed that our new proposal could alleviate the RTT unfairness while keeping advantages of HSTCP.展开更多
An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module ...An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module and a 16×16 lattice word database based on e-Flash MM36SB020. Its software is a communication protocol between the central control computer and the entrance management base station. To resolve the conflicting problems occurred during the data transmission, a method of delaying time at random is proposed.展开更多
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first sc...In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.展开更多
Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i....Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.e, α[0...0〉 +β[1... 1〉) were proposed, respectively. In this paper, by applying the controlled-not (CNOT) gate, a new simple protocol is proposed for remotely preparing such class of states. Compared to the previous protocols, both classical communication cost and required quantum entanglement in our protocol are remarkably reduced. Moreover, the difficulty of identifying some quantum states in our protocol is also degraded. Hence our protocol is more economical and feasible.展开更多
In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every pola...In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every polariza-tion quantum bit required for a quantum com-munication protocol. In order to complete the protocol, the ground-based receiver needs to track and compensate for the polarization zero direction of the satellite-based transmitter. Ex- pressions satisfied by amplitudes of the s-polarization component and the p-polarization component are derived based on a two-mirror model, and a condition satisfied by the reflec- tion coefficients of the two mirrors is given. A polarization tracking principle is analyzed for satellite-to-ground quanaun communications, and quantum key encoding and decoding prin- ciples based on polarization tracking are given. A half-wave-plate-based dynamic polariza- tion-basis compensation scheme is proposed in this paper, and this scheme is proved to be suitable for satellite-to-ground and intersatellite quantum communications.展开更多
In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devic...In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully.展开更多
We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be...We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal.The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently.Compared with other QSDC network protocols,our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information.Also,we discuss the security of our QSDC network protocol and its feasibility with current techniques.展开更多
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random an...A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random and secret polarization angles. The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.展开更多
Using CSMA/CD for EPON can eliminate the augmentations, such as multi-point control protocol and point-to-point emulation, added to the existing 802.3 architecture due to the incompatibility of PON to Ethernet. Both f...Using CSMA/CD for EPON can eliminate the augmentations, such as multi-point control protocol and point-to-point emulation, added to the existing 802.3 architecture due to the incompatibility of PON to Ethernet. Both full-duplex EPON system and half-duplex EPON system using CSMA/CD were proposed. In the full-duplex EPON, CSMA/CD is used as the upstream MAC protocol. In the half-duplex EPON system, both upstream and downstream traffic contend for the optical channel through CSMA/CD protocol. The upstream lightwave redirection and collision detection techniques were given. By the analysis and simulation, the throughput performance of the half-duplex EPON system is proven to be as well as that of the existing high speed half-duplex Ethernet LAN.展开更多
In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of p...In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of packet fragmenting and forward error correction encoding into multipath routing. The scheme works as follows: adding a certain redundancy into the original packets; fragmenting the resulting packets into exclusive blocks of the same size; encoding with the forward error correction technique, and then sending them to the destination node. When the receiving end receives a certain amount of information blocks, the original information will be recovered even with partial loss. The performance of the scheme was evaluated using OPNET modeler. The experimental results show that with the method the average transmission delay is decreased by 20% and the transmission reliability is increased by 30%.展开更多
文摘Aim To develop an information processing system with real time processing capability and artistic user interface for the optoelectronic antagonism general measuring system. Methods The A/D board and the multifunctional board communicating with every instruments were designed, data collecting and processing were realized by selecting appropriate software platform. Results Simulating results show the information processing system can operate correctly and dependably, the measuring rules, interactive interface and data handling method were all accepted by the user. Conclusion The designing approach based on the mix platform takes advantages of the two operating systems, the desired performances are acquired both in the real time processing and with the friendly artistic user interface.
基金This work was supported by the National Key Basic Research Program of China (NO. 2007CB311106), Beijing Municipal Natural Science Foundation.(No. 1102003) and Youth Science Foundation of Henan Normal University (No. 525198).
文摘In this paper,we propose a new approach for rational secret sharing in game theoretic settings.The trusted center is eliminated in the secret reconstruction phase.Every player doesn’t know current round is real round or fake round.The gain of following the protocol is more than the gain of deviating,so rational player has an incentive to abide the protocol.Finally,every player can obtain the secret fairly.Our scheme is verifiable and any player’s cheating can not work.Furthermore the proposed scheme is immune to backward induction and satisfies resilient equilibrium.No player of the coalition C can do better,even if the whole coalition C cheats.Our scheme can withstand the conspiracy attack with at most m-1 players.
文摘DNS is one of the most important basic infrastructures of the Internet, attacks on which will prevent the Internet from working properly. Therefore, its security is receiving great concern. This paper analyzes the principles of both traditional and novel (Kaminsky) DNS cache poisoning, presents attack samples and describes the whole attack process in detail. After verifying the potential harm of DNS cache poisoning, the paper gives out several defense strategies.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
文摘This paper describes a hierarchical architecture and a high-performance and interoperability protocol for centralized monitoring and controlling systems (CMCS) . The protocol we proposed can interoperate different monitoring and controlling systems constructed by different companies, each with different functions and communication protocols. The protocol reduces the amount of traffic and has real-time and high-perfor-mance advantages. The protocol was implemented in CMCS for telecommunication power supply and air-condi-tioner used by the Telecommunication Bureau of Zhejiang Province. This paper deals with the hierarchical architecture and function of CMCS and packet format, command ID, and SDL description of its protocol. We also discuss the properties of the interoperability and performance of the protocol in this paper.
基金Sponsored by the National High Technology Development Program of China (Grant No. 2002AA142020).
文摘With the increasing enlargement of network scale and the rapid development of network techniques, large numbers of the network applications begin to appear. Packet capture plays an important role as one basic technique used in each field of the network applications. In a high-speed network, the heavy traffic of network transmission challenges the packet capture techniques. This paper does an in-depth analysis on the traditional packet capture mechanisms in Linux, and then measures the performance bottleneck in the process of packet capture. The methods for improving the packet capture performance are presented and an optimized packet capture scheme is also designed and implemented. The test demonstrates that the new packet capture mechanism (Libpacket) can greatly improve the packet capture performance of the network application systems in a high-speed network.
基金supported by the National Natural Science Foundation of China (NSFC) under grant No. 61132002National Program on Key Basic Research Project of China (973 Program) under grant No. 2014CB340206+1 种基金the Creative Research Groups of NSFC under grant No. 61321061Aerospace Communications and Terminal Application Technologies Engineering Laboratory in Shenzhen under No.JCYJ20120619140254275
文摘This paper proposed a practical- feedback scheme for fountain codes based transportprotocol in space communications. In the proposed scheme, the sender is signaled by two types of acknowledgment (ACK) packets.Before decoding, packet loss probability isestimated on the receiver side and encapsulated intoa soft ACKand sent to the sender.After decoding,decoding results are encapsulated into hard ACKsandsent to the sender. There are two contributionsin the proposed scheme: 1. Empl layer calculation instead layer statistics to estimate oying physical of application the packet loss probability of space channel, which can improvethe accuracy and practicality. 2. A cascade overhead-failure probability relationship between the sender and the receiver has been analyzed to help determine the exact numberof packetsneeded byfountain decoding.Simulations show that for space communications,compared with the existing space transport protocols, fountain codes based transport protoeolwith the proposed schemecan not only ensure transmission reliability, but also greatly improvelink utilization.
文摘The congestion control mechanisms of the current standard TCP constrain the congestion windows that can be achieved by TCP in high-speed networks, which leads to low link utilization. HSTCP is one solution to solve this problem by modifying the congestion control mechanism to have the characteristics of TCP friendliness in high loss rate environment and high scalability in low loss rate environment. However, experiments revealed that HSTCP has severe RTT unfairness. After analyzing the RTT unfairness in HSTCP with a model, we proposed CW-HSTCP, which added a fair factor to decrease the difference of congestion window caused by different RTT. Fair factor of long RTT flows can cause a sharp window increment that is easy to cause a bursty traffic, so a method called block-pacing was adopted. Simulation results showed that our new proposal could alleviate the RTT unfairness while keeping advantages of HSTCP.
文摘An intelligent detecting system based on wireless transmission is designed. Its hardware includes the card reading module, the wireless digital transmission module, the LCD module, the random password keyboard module and a 16×16 lattice word database based on e-Flash MM36SB020. Its software is a communication protocol between the central control computer and the entrance management base station. To resolve the conflicting problems occurred during the data transmission, a method of delaying time at random is proposed.
基金Supported by the National Fundamental Research Program under Grant No.2010CB923202Specialized Research Fund for the Doctoral Program of Education Ministry of China under Grant No.20090005120008+1 种基金 the Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0710 China National Natural Science Foundation under Grant Nos.60871082,60937003 and 10947151
文摘In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.
基金supported by the Program for New Century Excellent Talents at the University of China under Grant No.NCET-06-0554the National Natural Science Foundation of China under Grant Nos.60677001 and 10747146+3 种基金the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806Natural Science Foundation of Hubei Province under Grant No.2006ABA354
文摘Recently, several similar protocols [J. Opt. B 4 (2002) 380; Phys. Lett. A 316 (2003) 159; Phys. Lett. A 355 (2006) 285; Phys. Lett. A 336 (2005) 317] for remotely preparing a class of multi-qubit states (i.e, α[0...0〉 +β[1... 1〉) were proposed, respectively. In this paper, by applying the controlled-not (CNOT) gate, a new simple protocol is proposed for remotely preparing such class of states. Compared to the previous protocols, both classical communication cost and required quantum entanglement in our protocol are remarkably reduced. Moreover, the difficulty of identifying some quantum states in our protocol is also degraded. Hence our protocol is more economical and feasible.
基金supported by the Scientific Research Fund of Heilongjiang Provincial Education Department of China under Grant No.12511119
文摘In polarization-encoded free-space quantum communications, a transmitter on a satellite and a receiver in a ground station each have a respective polarization zero direction, by which they encode and decode every polariza-tion quantum bit required for a quantum com-munication protocol. In order to complete the protocol, the ground-based receiver needs to track and compensate for the polarization zero direction of the satellite-based transmitter. Ex- pressions satisfied by amplitudes of the s-polarization component and the p-polarization component are derived based on a two-mirror model, and a condition satisfied by the reflec- tion coefficients of the two mirrors is given. A polarization tracking principle is analyzed for satellite-to-ground quanaun communications, and quantum key encoding and decoding prin- ciples based on polarization tracking are given. A half-wave-plate-based dynamic polariza- tion-basis compensation scheme is proposed in this paper, and this scheme is proved to be suitable for satellite-to-ground and intersatellite quantum communications.
文摘In this paper, we introduced a novel storage architecture 'Unified Storage Network', which merges NAC( Network Attached Channel) and SAN( Storage Area Network) , and provides the file I/O services as NAS devices and provides the block I/O services as SAN. To overcome the drawbacks from FC, we employ iSCSI to implement the USN( Unified Storage Network) . To evaluate whether iSCSI is more suitable for implementing the USN, we analyze iSCSI protocol and compare it with FC protocol from several components of a network protocol which impact the performance of the network. From the analysis and comparison, we can conclude that the iSCSI is more suitable for implementing the storage network than the FC under condition of the wide-area network. At last, we designed two groups of experiments carefully.
基金Supported by the Natural Science Foundation of Jiangsu Provincial Universities under Grant No.10KJB180004the National Natural Science Foundation of China under Grant No.11105075
文摘We propose a bidirectional quantum secure direct communication(QSDC) network protocol with the hyperentanglment in both the spatial-mode ad the polarization degrees of freedom of photon pairs which can in principle be produced with a beta barium borate crystal.The secret message can be encoded on the photon pairs with unitary operations in these two degrees of freedom independently.Compared with other QSDC network protocols,our QSDC network protocol has a higher capacity as each photon pair can carry 4 bits of information.Also,we discuss the security of our QSDC network protocol and its feasibility with current techniques.
基金The project supported by National Natural Science Foundation of China under Grant Nos. 60472018 and 10547125
文摘A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random and secret polarization angles. The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.
文摘Using CSMA/CD for EPON can eliminate the augmentations, such as multi-point control protocol and point-to-point emulation, added to the existing 802.3 architecture due to the incompatibility of PON to Ethernet. Both full-duplex EPON system and half-duplex EPON system using CSMA/CD were proposed. In the full-duplex EPON, CSMA/CD is used as the upstream MAC protocol. In the half-duplex EPON system, both upstream and downstream traffic contend for the optical channel through CSMA/CD protocol. The upstream lightwave redirection and collision detection techniques were given. By the analysis and simulation, the throughput performance of the half-duplex EPON system is proven to be as well as that of the existing high speed half-duplex Ethernet LAN.
基金Projects(2003CB314802) supported by the State Key Fundamental Research and Development Programof China project(90104001) supported by the National Natural Science Foundation of China
文摘In order to improve the data transmission reliability of mobile ad hoc network, a routing scheme called integrated forward error correction multipath routing protocol was proposed, which integrates the techniques of packet fragmenting and forward error correction encoding into multipath routing. The scheme works as follows: adding a certain redundancy into the original packets; fragmenting the resulting packets into exclusive blocks of the same size; encoding with the forward error correction technique, and then sending them to the destination node. When the receiving end receives a certain amount of information blocks, the original information will be recovered even with partial loss. The performance of the scheme was evaluated using OPNET modeler. The experimental results show that with the method the average transmission delay is decreased by 20% and the transmission reliability is increased by 30%.