SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Wang Xin) ;lar1:(hkr)"

Sökning: WFRF:(Wang Xin) > Högskolan Kristianstad

  • Resultat 1-4 av 4
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Huang, Xin, et al. (författare)
  • Human interactive secure key and ID exchange protocols in body sensor networks
  • 2013
  • Ingår i: IET Information Security. - : Institution of Engineering and Technology. - 1751-8709 .- 1751-8717. ; 7:1, s. 30-38
  • Tidskriftsartikel (refereegranskat)abstract
    • A body sensor network (BSN) is typically a wearable wireless sensor network. Security protection is critical to BSNs, since they collect sensitive personal information. Generally speaking, security protection of BSN relies on identity (ID) and key distribution protocols. Most existing protocols are designed to run in general wireless sensor networks, and are not suitable for BSNs. After carefully examining the characteristics of BSNs, the authors propose human interactive empirical channel-based security protocols, which include an elliptic curve Diffie–Hellman version of symmetric hash commitment before knowledge protocol and an elliptic curve Diffie–Hellman version of hash commitment before knowledge protocol. Using these protocols, dynamically distributing keys and IDs become possible. As opposite to present solutions, these protocols do not need any pre-deployment of keys or secrets. Therefore compromised and expired keys or IDs can be easily changed. These protocols exploit human users as temporary trusted third parties. The authors, thus, show that the human interactive channels can help them to design secure BSNs.
  •  
2.
  • Huang, Xin, et al. (författare)
  • Identity-based association protocols for wireless personal area networks
  • 2015
  • Konferensbidrag (övrigt vetenskapligt/konstnärligt)abstract
    • Identity based infrastructure allows the public keyof a user to be derived easily from a predefined aspect of theirknown identity such as a phone number, passport number orother universally unique identifier. Recently, H¨olbl and Welzerhave proposed an identity-based key establishment protocol.However, this protocol is found to be vulnerable to man-inthe-middle attacks and impersonation attacks. In this paper,we propose multi-channel identity based protocols for wirelesspersonal area networks which can eliminate these attacks.These protocols alleviate the certificate overhead by using apublic key infrastructure which is suitable for wireless personalarea networks.
  •  
3.
  • Wang, Qinghua, et al. (författare)
  • Localizing multiple objects using radio tomographic imaging technology
  • 2016
  • Ingår i: IEEE Transactions on Vehicular Technology. - : Institute of Electrical and Electronics Engineers Inc.. - 0018-9545 .- 1939-9359. ; 65:5, s. 3641-3656
  • Tidskriftsartikel (refereegranskat)abstract
    • Low data rate wireless networks can be deployed for physical intrusion detection and localization purposes. The intrusion of a physical object (or human) will disrupt the radio frequency magnetic field, and can be detected by observing the change of radio attenuation. This gives the basis for the radio tomographic imaging technology which has been recently developed for passively monitoring and tracking objects. Due to noise and the lack of knowledge about the number and the sizes of intruding objects, multi-object intrusion detection and localization is a challenging issue. This article proposes an extended VB-GMM (i.e. variational Bayesian Gaussian mixture model) algorithm in treating this problem. The extended VBGMM algorithm applies a Gaussian mixture model to model the changed radio attenuation in a monitored field due to the intrusion of an unknown number of objects, and uses a modified version of the variational Bayesian approach for model estimation. Real world data from both outdoor and indoor experiments (using the radio tomographic imaging technology) have been used to verify the high accuracy and the robustness of the proposed multi-object localization algorithm.
  •  
4.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-4 av 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy