共查询到20条相似文献,搜索用时 15 毫秒
1.
JIANG Jian-ping DING Xing-miao 《通信学报》2004,25(12):187-193
The manfully packaging the content of the web server for down loading is much inefficient. The paper introduced a Web server agent for packaging automitization, which makes self-organization of the content of the pages and free the site administrator from the heavy burden of the manually packaging the web pages downloaded by web browsers. An example was illustrated to show the details of the solution, which was implemented in J2EE architecture. 相似文献
2.
3.
4.
Riihijarvi J. Mahonen P. Saaranen M.J. Roivainen J. Soininen J.-P. 《Communications Magazine, IEEE》2001,39(10):74-79
There is a strong trend toward embedding Internet capabilities into electronics and everyday appliances. We introduce the results from a research project where we have been working toward implementing a functionally minimized Web server on silicon. Although most embedded Internet appliances will use a microcontroller and software to enable TCP/IP and HTTP support, we argue that there are many applications where a hardware-based approach is more suitable. Our WebChip approach is a family of IPv6-compatible solutions toward the realization of embedded and minimized Web systems. The core parts of the implementation are a C-code library and VHDL code implementation. The solution is tested with an FPGA and can be later embedded into various ASIC chips. We argue that this approach is also commercially viable since the VHDL code can be delivered as an intellectual property block 相似文献
5.
6.
7.
《现代电子技术》2018,(8):100-103
针对基于传统C/S结构的Web服务器软硬件成本高、移动不便等问题,提出一种基于Android和ZigBee的温室监测系统的嵌入式Web服务器设计方案。该服务器的硬件部分由Zig Bee协调器以及嵌入式Android设备组成,Android设备的MCU采用Exynos 4412处理器,Zig Bee协调器采用CC2530作为核心模块,它们之间通过串口相互通信。服务器软件部分采用Android自带的SQLite数据库存储数据,并使用PHP脚本和Ajax技术来实现温室传感数据的实时监测。实验结果表明,该设计方案解决了C/S模式下服务器成本高、部署不便的问题,并且实现了对温室的远程实时监测。 相似文献
8.
Mohamed Salah Azzaz Camel Tanougast Abdelmadjid Maali Mustapha Benssalah 《International Journal of Communication Systems》2020,33(10)
This paper presents a new efficient and lightweight approach for enhancing the security of biometric models, namely, fingerprint templates, against possible attacks. The proposed design is based on Vernam stream cipher in which the key generator is designed in the hardware manner. The designed cryptosystem consists of using multi‐scroll chaotic system that is characterized by a large key space and can be generated N×N grid multi‐scroll attractors, with a good behavior of chaotic dynamic. The hardware approach is carried out through describing Euler method by VHDL. Field‐programmable gate array (FPGA) experimental results validate the developed architecture while still providing a good compromise between hardware resources and performance. Indeed, security analysis also shows that the designed encryption algorithm is robust against statistical, brute force, and entropy attacks. Therefore, it can be considered as a lightweight security solution, which could be very useful in many embedded applications namely securing biometric authentication systems. 相似文献
9.
Mustapha Reda Senouci Said Sadoudi Badis Djamaa Mohamed Abdelkrim Senouci 《International Journal of Communication Systems》2020,33(10)
Interconnected sensor and actuator objects creating Constrained‐Node Networks (CNN) are among the most prominent technologies of the Internet of things. Deployed to monitor our lives, surroundings, and critical infrastructure, CNN communications must be strongly secured in order to prevent devastating unauthorized access to critical information. This, however, faces severe challenges imposed by CNN constraints in terms of energy, memory, and computational power. To address such conflicting requirements, this paper presents a chaos‐based efficient lightweight secure communication system for CNNs. The proposed cryptosystem performs optimized confusion‐diffusion operations at the byte level allowing it to be fully implemented on an 8‐bit microcontroller. Obtained results from extensive experiments at both statistical and implementation levels confirm the robustness of the proposed cryptosystem against a multitude of attacks. Additionally, the evaluated encryption/decryption speeds along with the low memory and energy consumption grant the proposed cryptosystem attractive lightweight aspects enabling its deployment in very constrained CNN applications having soft real‐time requirements. 相似文献
10.
11.
基于嵌入式Web服务器的远程控制系统的实现 总被引:3,自引:0,他引:3
为解决在小型工农业生产及恶劣环境下实现对设备远程控制的问题,设计了基于嵌入式Web服务器的远程控制系统.该系统硬件设计采用RISC型32位微处理器S3C44BOX,以太网控制器RTL8019AS,2 MB的NOR Flash 及8 MB的SDRAM.通过配置μClinux嵌入式操作系统及BOA服务器构建了基于嵌入式的Web服务器.通过编写设备驱动程序和服务器CGI程序实现对Web网页的交互访问.测试结果表明:嵌入式Web服务器控制设备不受距离和环境限制,实现对设备远程控制. 相似文献
12.
13.
14.
嵌入式Web污染源自动监测系统 总被引:1,自引:0,他引:1
针对当前我国污染源监测系统存在的问题.采用基于32位AT91SAM7X系列微处理器的嵌入式Web服务器实现基于B/S模式的污染源自动监测系统。给出硬件结构图,并对其主要功能器件进行描述;给出软件平台结构图及其层次功能设计,讲解如何结合Ajax技术实现高效的Web服务器,并对系统功能做设计说明。经测试表明,系统功能完备,具有稳定性高和响应性能好的优点。 相似文献
15.
针对当前我国污染源监测系统存在的问题,采用基于32位AT91SAM7X系列微处理器的嵌入式Web服务器实现基于B/S模式的污染源自动监测系统.给出硬件结构图,并对其主要功能器件进行描述;给出软件平台结构图及其层次功能设计.讲解如何结合Ajax技术实现高效的Web服务器,并对系统功能做设计说明.经测试表明,系统功能完备,具有稳定性高和响应性能好的优点. 相似文献
16.
While the Simple Network Management Protocol (SNMP) is still the dominant protocol for managing network elements in IP‐based networks and the Internet, network managers are acknowledging its limitations with respect to configuration management, application development and decentralization of management tasks. Web Services (WS) have been recently proposed to alleviate these limitations, given their pertinence to both decentralized management paradigms (e.g., CORBA), and XML management systems which provide efficiency in configuration management operations. This paper reviews architectures for WS‐based network management, outlining their advantages and disadvantages. These architectures address management of both individual network elements and composite multi‐device networks. Moreover, the paper introduces the architecture of a prototype system for WS‐based network management, namely WSNET. Along with presentation of the WSNET system, we provide a set of experimental results reporting performance figures for the WSNET system, as well as for systems based on other WS architectures. These figures allow for a comparative evaluation of the various systems, and manifest the benefits of the WSNET implementation. An important conclusion from our work is that WS should be seen as an accompaniment to conventional SNMP management rather than a replacement. However, there are also cases (e.g., need for secure remote access) where WS serve as a core rather than auxiliary solution, given that conventional methods are not applicable. Copyright © 2006 John Wiley & Sons, Ltd. 相似文献
17.
18.
19.
The cloud computing environment is a real‐time communication network that involves a large number of systems connected in a distributed fashion, for which resources are available on demand. In recent years, due to the enormous growth of data and information, data maintenance tasks involve a major effort in information technology (IT) industries. So, IT industries are concentrating on the cloud computing environment in order to maintain their data and manage their resources. Owing to the increase in the number of data centres, which have an impact on electrical energy cost, peak power dissipation, cooling and carbon emission, power‐conservation‐based resource management is essential. A best‐fit heuristic job placement algorithm is proposed in this paper in order to increase the job allocation percentage, a worst‐fit heuristic virtual machine (VM) placement algorithm is also proposed in order to place the VMs over the physical machines (PMs) thereby reducing the number of the latter allotted, and a server consolidation algorithm is proposed in order to improve power conservation. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献
20.
A robust and efficient dynamic identity‐based multi‐server authentication scheme using smart cards 下载免费PDF全文
Chin‐Chen Chang Ting‐Fang Cheng Wei‐Yuan Hsueh 《International Journal of Communication Systems》2016,29(2):290-306
In single‐server architecture, one service is maintained by one server. If a user wants to employ multiple services from different servers, he/she needs to register with these servers and to memorize numerous pairs of identities and passwords corresponding to each server. In order to improve user convenience, many authentication schemes have been provided for multi‐server environment with the property of single registration. In 2013, Li et al. provided an efficient multi‐server authentication scheme, which they contended that it could resist several attacks. Nevertheless, we find that their scheme is sensitive to the forgery attack and has a design flaw. This paper presents a more secure dynamic identity‐based multi‐server authentication scheme in order to solve the problem in the scheme by Li et al. Analyses show that the proposed scheme can preclude several attacks and support the revocation of anonymity to handle the malicious behavior of a legal user. Furthermore, our proposed scheme has a lower computation and communication costs, which make it is more suitable for practical applications. Copyright © 2014 John Wiley & Sons, Ltd. 相似文献