Beijing Institute of Technology

Displaying 1-14 of 14 results

  • White Papers // Dec 2013

    Search Pattern Leakage in Searchable Encryption: Attacks and New Construction

    Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted third party while maintains the capability of keyword search on the data. Searchable encryption can be achieved using the classical...

    Provided By Beijing Institute of Technology

  • White Papers // Apr 2013

    An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks

    Wireless sensor networks consist of a great number of sensor nodes with strictly limited computation capability, storage, communication resources, and battery power. Because they are deployed in remote and hostile environments and hence are vulnerable to physical attacks, sensor networks face many practical challenges. Data confidentiality, data integrity, source authentication,...

    Provided By Beijing Institute of Technology

  • White Papers // Mar 2013

    A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks

    Security is a crucial issue in distributed applications of multi-hop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, the authors focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric...

    Provided By Beijing Institute of Technology

  • White Papers // Feb 2013

    Optimal Spectrum Sensing Interval to Minimize TheTransmission Delay for Cognitive Radio

    In this paper, the authors have studied the optimal spectrum sensing interval, which is the time between two consecutive spectrum sensing activities, such that the delay of the cognitive transmission is minimized. The throughput maximization of the cognitive radio is always a common goal of the researchers, which is keenly...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2012

    Performance Analysis of Code-Aided Iterative Hard/Soft Decision-Directed Carrier Phase Recovery

    Code-Aided (CA) iterative carrier phase synchronizer can improve the phase estimation performance significantly. However, due to the coupling involved between phase recovery and decoding, most studies depend on extensive simulations rather than on theoretical analysis to evaluate the performance of CA phase recovery. In this paper, the authors propose analytical...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2012

    Performance of OSTBC Transmission in Dual-Hop Amplify-and-Forward MIMO Relaying Systems Over Spatially Correlated Nakagami-M Fading Channels

    The performance of Orthogonal Space-Time Block Code (OSTBC) transmission in dual-hop Amplify-and-Forward (AF) Multiple-Input Multiple-Output (MIMO) relaying networks over spatially correlated Nakagami-m fading channel is investigated, where the source, relay, and destination terminals are all equipped with multiple antennas. The authors provide the compact closed-form expression for Cumulative Distribution Function...

    Provided By Beijing Institute of Technology

  • White Papers // May 2012

    Scalable NDN Forwarding: Concepts, Issues and Principles

    Named Data Networking (NDN) is a recently proposed general-purpose network architecture that leverages the strengths of Internet architecture while aiming to address its weaknesses. NDN names packets rather than end-hosts, and most of NDN's characteristics are a consequence of this fact. In this paper, the authors focus on the packet...

    Provided By Beijing Institute of Technology

  • White Papers // Jan 2012

    A Novel Mobile Robot Path Planning Method Based on ACO Algorithm Using New Ants Meeting Judgment Strategy

    Since equivalent distributing of initial pheromone in ant colony optimization algorithm results in longer searching time, pheromone gain and heuristic information are added to reasonably allocate initial pheromone in this paper. Two-way parallel searching tactic used in order to exert cooperation and optimization abilities between ants adequately, and then a...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2011

    Edge Detection Based on Statistical Threshold Stockwell Transform

    Edge detection plays an important role in image processing, especially in the area of infrared target detection. The Stockwell (S) transform has advantages both of the Fast Fourier Transform (FFT) and the Wavelet Transform (WT), which has been proved by Stockwell and many other researchers. The S transform is a...

    Provided By Beijing Institute of Technology

  • White Papers // Mar 2011

    Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach

    In Vehicular Ad Hoc NETworks (VANETs), because of the non-existence of end-to-end connections, it is essential that nodes take advantage of connection opportunities to forward messages, to make end-to-end messaging possible. Thus, it is crucial to make sure that nodes have incentives to forward messages for others, despite that the...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2010

    Research on Web Service Interoperability Testing Framework With Conformance Testing

    WEB service is widely used as the best way of realizing Service-Oriented Architectures (SOA). Being a cross-platform technology, they can be implemented on the different platforms with different programming languages. They provide a means for wrapping existing applications so developers can access them through standard languages and protocols. As a...

    Provided By Beijing Institute of Technology

  • White Papers // May 2010

    Storage Management in Virtualized Cloud Environment

    With Cloud Computing gaining tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary. One of the key technologies deployed in large Cloud infrastructures namely the Amazon EC2 for providing isolation and separate protection domains for multiple clients is virtualization. Therefore, identifying the performance bottlenecks...

    Provided By Beijing Institute of Technology

  • White Papers // Oct 2009

    Performance Analysis of Cluster-Based Wireless Sensor Networks With Application Constraints

    Clustering is an efficient techniques used to achieve the specific performance requirements of large scale wireless sensor networks. In this paper, the authors have carried out the performance analysis of cluster-based wireless sensor networks for different communication patterns formed due to application constraints based upon LEACH protocol, which is among...

    Provided By Beijing Institute of Technology

  • White Papers // Jul 2009

    Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes

    This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attacks are particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2012

    Performance Analysis of Code-Aided Iterative Hard/Soft Decision-Directed Carrier Phase Recovery

    Code-Aided (CA) iterative carrier phase synchronizer can improve the phase estimation performance significantly. However, due to the coupling involved between phase recovery and decoding, most studies depend on extensive simulations rather than on theoretical analysis to evaluate the performance of CA phase recovery. In this paper, the authors propose analytical...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2012

    Performance of OSTBC Transmission in Dual-Hop Amplify-and-Forward MIMO Relaying Systems Over Spatially Correlated Nakagami-M Fading Channels

    The performance of Orthogonal Space-Time Block Code (OSTBC) transmission in dual-hop Amplify-and-Forward (AF) Multiple-Input Multiple-Output (MIMO) relaying networks over spatially correlated Nakagami-m fading channel is investigated, where the source, relay, and destination terminals are all equipped with multiple antennas. The authors provide the compact closed-form expression for Cumulative Distribution Function...

    Provided By Beijing Institute of Technology

  • White Papers // Feb 2013

    Optimal Spectrum Sensing Interval to Minimize TheTransmission Delay for Cognitive Radio

    In this paper, the authors have studied the optimal spectrum sensing interval, which is the time between two consecutive spectrum sensing activities, such that the delay of the cognitive transmission is minimized. The throughput maximization of the cognitive radio is always a common goal of the researchers, which is keenly...

    Provided By Beijing Institute of Technology

  • White Papers // May 2010

    Storage Management in Virtualized Cloud Environment

    With Cloud Computing gaining tremendous importance in the recent past, understanding low-level implications of the cloud infrastructure becomes necessary. One of the key technologies deployed in large Cloud infrastructures namely the Amazon EC2 for providing isolation and separate protection domains for multiple clients is virtualization. Therefore, identifying the performance bottlenecks...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2010

    Research on Web Service Interoperability Testing Framework With Conformance Testing

    WEB service is widely used as the best way of realizing Service-Oriented Architectures (SOA). Being a cross-platform technology, they can be implemented on the different platforms with different programming languages. They provide a means for wrapping existing applications so developers can access them through standard languages and protocols. As a...

    Provided By Beijing Institute of Technology

  • White Papers // Jul 2009

    Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes

    This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attacks are particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces...

    Provided By Beijing Institute of Technology

  • White Papers // Mar 2011

    Stimulating Cooperation in Vehicular Ad Hoc Networks: A Coalitional Game Theoretic Approach

    In Vehicular Ad Hoc NETworks (VANETs), because of the non-existence of end-to-end connections, it is essential that nodes take advantage of connection opportunities to forward messages, to make end-to-end messaging possible. Thus, it is crucial to make sure that nodes have incentives to forward messages for others, despite that the...

    Provided By Beijing Institute of Technology

  • White Papers // Oct 2009

    Performance Analysis of Cluster-Based Wireless Sensor Networks With Application Constraints

    Clustering is an efficient techniques used to achieve the specific performance requirements of large scale wireless sensor networks. In this paper, the authors have carried out the performance analysis of cluster-based wireless sensor networks for different communication patterns formed due to application constraints based upon LEACH protocol, which is among...

    Provided By Beijing Institute of Technology

  • White Papers // Jan 2012

    A Novel Mobile Robot Path Planning Method Based on ACO Algorithm Using New Ants Meeting Judgment Strategy

    Since equivalent distributing of initial pheromone in ant colony optimization algorithm results in longer searching time, pheromone gain and heuristic information are added to reasonably allocate initial pheromone in this paper. Two-way parallel searching tactic used in order to exert cooperation and optimization abilities between ants adequately, and then a...

    Provided By Beijing Institute of Technology

  • White Papers // Nov 2011

    Edge Detection Based on Statistical Threshold Stockwell Transform

    Edge detection plays an important role in image processing, especially in the area of infrared target detection. The Stockwell (S) transform has advantages both of the Fast Fourier Transform (FFT) and the Wavelet Transform (WT), which has been proved by Stockwell and many other researchers. The S transform is a...

    Provided By Beijing Institute of Technology

  • White Papers // Dec 2013

    Search Pattern Leakage in Searchable Encryption: Attacks and New Construction

    Searching on remote encrypted data (commonly known as searchable encryption) has become an important issue in secure data outsourcing, since it allows users to outsource encrypted data to an untrusted third party while maintains the capability of keyword search on the data. Searchable encryption can be achieved using the classical...

    Provided By Beijing Institute of Technology

  • White Papers // May 2012

    Scalable NDN Forwarding: Concepts, Issues and Principles

    Named Data Networking (NDN) is a recently proposed general-purpose network architecture that leverages the strengths of Internet architecture while aiming to address its weaknesses. NDN names packets rather than end-hosts, and most of NDN's characteristics are a consequence of this fact. In this paper, the authors focus on the packet...

    Provided By Beijing Institute of Technology

  • White Papers // Apr 2013

    An Efficient Data Aggregation Protocol Concentrated on Data Integrity in Wireless Sensor Networks

    Wireless sensor networks consist of a great number of sensor nodes with strictly limited computation capability, storage, communication resources, and battery power. Because they are deployed in remote and hostile environments and hence are vulnerable to physical attacks, sensor networks face many practical challenges. Data confidentiality, data integrity, source authentication,...

    Provided By Beijing Institute of Technology

  • White Papers // Mar 2013

    A PEFKS- and CP-ABE-Based Distributed Security Scheme in Interest-Centric Opportunistic Networks

    Security is a crucial issue in distributed applications of multi-hop wireless opportunistic network due to the features of exposed on the fly communication, relaxed end-to-end connectivity, and vague destinations literately. In this paper, the authors focus on problems of user privacy leakage and end-to-end confidentiality invasion in content-based or interest-centric...

    Provided By Beijing Institute of Technology