Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting... 相似文献
Miniaturization and energy consumption by computational systems remain major challenges to address. Optoelectronics based synaptic and light sensing provide an exciting platform for neuromorphic processing and vision applications offering several advantages. It is highly desirable to achieve single-element image sensors that allow reception of information and execution of in-memory computing processes while maintaining memory for much longer durations without the need for frequent electrical or optical rehearsals. In this work, ultra-thin (<3 nm) doped indium oxide (In2O3) layers are engineered to demonstrate a monolithic two-terminal ultraviolet (UV) sensing and processing system with long optical state retention operating at 50 mV. This endows features of several conductance states within the persistent photocurrent window that are harnessed to show learning capabilities and significantly reduce the number of rehearsals. The atomically thin sheets are implemented as a focal plane array (FPA) for UV spectrum based proof-of-concept vision system capable of pattern recognition and memorization required for imaging and detection applications. This integrated light sensing and memory system is deployed to illustrate capabilities for real-time, in-sensor memorization, and recognition tasks. This study provides an important template to engineer miniaturized and low operating voltage neuromorphic platforms across the light spectrum based on application demand. 相似文献
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
Internet of Things (IoT) refers to uniquely identifiable entities. Its vision is the world of connected objects. Due to its connected nature the data produced by IoT is being used for different purposes. Since IoT generates huge amount of data, we need some scalable storage to store and compute the data sensed from the sensors. To overcome this issue, we need the integration of cloud and IoT, so that the data might be stored and computed in a scalable environment. Harmonization of IoT in Cloud might be a novel solution in this regard. IoT devices will interact with each other using Constrained Application Protocol (CoAP). In this paper, we have implemented harmonizing IoT in Cloud. We have used CoAP to get things connected to each other through the Internet. For the implementation we have used two sensors, fire detector and the sensor attached with the door which is responsible for opening it. Thus our implementation will be storing and retrieving the sensed data from the cloud. We have also compared our implementation with different parameters. The comparison shows that our implementation significantly improves the performance compared to the existing system.
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes. 相似文献
In orthogonal frequency division multiplexing (OFDM) system, high value of peak-to-average power ratio (PAPR) is an operational problem that may cause non-linear distortion resulting in high bit error rate. Selected mapping (SLM) is a well known technique that shows good PAPR reduction capability but inflicts added computational overhead. In this paper, using Riemann sequence based SLM method, we applied reverse searching technique to find out low PAPR yielding phase sequences with significant reduction in computational complexity. Additionally, we explored side-information free transmission that achieves higher throughput but sacrifices PAPR reduction. Finally, to overcome this loss in PAPR reduction, we proposed application of Square-rooting companding technique over the output OFDM transmitted signal. Simulation results show that the proposed method is able to compensate the sacrifice in PAPR and achieved PAPR reduction of 8.9 dB with very low computational overhead. 相似文献
Coarse wavelength division multiplexing (CWDM) network has proven to be promising lower cost network architecture for a significant cost advantage over dense wavelength division multiplexing due to the lower cost of lasers and the filters used in CWDM modules. A compatible amplifier module having bidirectional amplification capability was deployed for introducing inside stackable reconfigurable optical add/drop multiplexers in realizing large-scale CWDM networks. The amplifier module for use in the bidirectional IP transmission confirmed that the insertion losses of the nodes and the losses of the fibers connecting the nodes can be compensated effectively, allowing the network administrator to increase the number of nodes and fiber length of the network. However, the noise generated from the amplification due to amplified spontaneous emission must be considered in network design issues. In this paper, optical power penalties due to the bidirectional amplification were estimated by conducting experimentation on minimum detectable power of optical transceivers. After analyzing the power penalty issue, an IP-over-CWDM ring network was implemented and the performance of network was evaluated by monitoring the power and packet transmissions before and after the amplifier module was turned on. 相似文献