In WDM networks, path protection has emerged as a widely accepted technique for providing guaranteed survivability of network traffic. However, it requires allocating resources for backup lightpaths, which remain idle under normal fault-free conditions. In this paper, we introduce a new design strategy for survivable network design, which guarantees survivability of all ongoing connections that requires significantly fewer network resources than protection based techniques. In survivable routing, the goal is to find a Route and Wavelength Assignment (RWA) such that the logical topology remains connected for all single link failures. However, even if the logical topology remains connected after any single link fault, it may not have sufficient capacity to support all the requests for data communication, for all single fault scenarios. To address this deficiency, we have proposed two independent but related problem formulations. To handle our first formulation, we have presented an Integer Linear Program (ILP) that augments the concept of survivable routing by allowing rerouting of sub-wavelength traffic carried on each lightpath and finding an RWA that maximizes the amount of traffic that can be supported by the network in the presence of any single link failure. To handle our second formulation, we have proposed a new design approach that integrates the topology design and the RWA in such a way that the resulting logical topology is able to handle the entire set of traffic requests after any single link failure. For the second problem, we have first presented an ILP formulation for optimally designing a survivable logical topology, and then proposed a heuristic for larger networks. Experimental results demonstrate that this new approach is able to provide guaranteed bandwidth, and is much more efficient in terms of resource utilization, compared to both dedicated and shared path protection schemes. 相似文献
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes. 相似文献
The latest developments in mobile computing technology have increased the computing capabilities of smart mobile devices (SMDs). However, SMDs are still constrained by low bandwidth, processing potential, storage capacity, and battery lifetime. To overcome these problems, the rich resources and powerful computational cloud is tapped for enabling intensive applications on SMDs. In Mobile Cloud Computing (MCC), application processing services of computational clouds are leveraged for alleviating resource limitations in SMDs. The particular deficiency of distributed architecture and runtime partitioning of the elastic mobile application are the challenging aspects of current offloading models. To address these issues of traditional models for computational offloading in MCC, this paper proposes a novel distributed and elastic applications processing (DEAP) model for intensive applications in MCC. We present an analytical model to evaluate the proposed DEAP model, and test a prototype application in the real MCC environment to demonstrate the usefulness of DEAP model. Computational offloading using the DEAP model minimizes resources utilization on SMD in the distributed processing of intensive mobile applications. Evaluation indicates a reduction of 74.6% in the overhead of runtime application partitioning and a 66.6% reduction in the CPU utilization for the execution of the application on SMD.
Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challenging problems in WBAN due to the diverse QoS requirements. In this context, this paper proposes an Energy Efficient Traffic Prioritization for Medium Access Control (EETP-MAC) protocol, which provides sufficient slots with higher bandwidth and guard bands to avoid channels interference causing longer delay. Specifically, the design of EETP-MAC is broadly divided in to four folds. Firstly, patient data traffic prioritization is presented with broad categorization including Non-Constrained Data (NCD), Delay-Constrained Data (DCD), Reliability-Constrained Data (RCD) and Critical Data (CD). Secondly, a modified superframe structure design is proposed for effectively handling the traffic prioritization. Thirdly, threshold based slot allocation technique is developed to reduce contention by effectively quantifying criticality on patient data. Forth, an energy efficient frame design is presented focusing on beacon interval, superframe duration, and packet size and inactive period. Simulations are performed to comparatively evaluate the performance of the proposed EETP-MAC with the state-of-the-art MAC protocols. The comparative evaluation attests the benefit of EETP-MAC in terms of efficient slot allocation resulting in lower delay and energy consumption.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting... 相似文献
This paper presents a fully integrated, low transmit-power and high-efficiency 2.4 GHz class-E power amplifier (PA) in TSMC 0.18 μm CMOS process for low-power transmitters such as wireless sensor networks (WSN). In this paper, a new output load has been proposed. Also, analytical design equations have been included to design an efficient low power circuit. This PA, employs the pad capacitance and bond-wire inductance of the output node, for satisfying class-E zero-voltage switching (ZVS) condition and matching the antenna’s 50 Ω resistance. By using bond-wire inductance instead of inductor in the output filter, smaller chip size and higher efficiency has been achieved compared to other works for low transmit-power applications. Also, the effectiveness of bulk-drive technique on faster switching and increasing efficiency have been evaluated. It has been proved that this technique leads to increase the efficiency of switching PAs. This PA delivers a range of output power from 2.7 to 7.2 dBm with a supply voltage range from 500 to 850 mV while achieving overall power efficiency range of 57.3–60.7%. 相似文献
Rhenium disulfide (ReS2) is a two‐dimensional (2D) group VII transition metal dichalcogenide (TMD). It is attributed with structural and vibrational anisotropy, layer‐independent electrical and optical properties, and metal‐free magnetism properties. These properties are unusual compared with more widely used group VI‐TMDs, e.g., MoS2, MoSe2, WS2 and WSe2. Consequently, it has attracted significant interest in recent years and is now being used for a variety of applications including solid state electronics, catalysis, and, energy harvesting and energy storage. It is anticipated that ReS2 has the potential to be equally used in parallel with isotropic TMDs from group VI for all known applications and beyond. Therefore, a review on ReS2 is very timely. In this first review on ReS2, we critically analyze the available synthesis procedures and their pros/cons, atomic structure and lattice symmetry, crystal structure, and growth mechanisms with an insight into the orientation and architecture of domain and grain boundaries, decoupling of structural and vibrational properties, anisotropic electrical, optical, and magnetic properties impacted by crystal imperfections, doping and adatoms adsorptions, and contemporary applications in different areas. 相似文献
Polysulfated nanomaterials that mimic the extracellular cell matrix are of great interest for their potential to modulate cellular responses and to bind and neutralize pathogens. However, control over the density of active functional groups on such biomimetics is essential for efficient interactions, and this remains a challenge. In this regard, producing polysulfated graphene derivatives with control over their functionality is an intriguing accomplishment in order to obtain highly effective 2D platforms for pathogen interactions. Here, a facile and efficient method for the controlled attachment of a heparin sulfate mimic on the surface of graphene is reported. Dichlorotriazine groups are conjugated to the surface of graphene by a one‐pot [2+1] nitrene cycloaddition reaction at ambient conditions, providing derivatives with defined functionality. Consecutive step by step conjugation of hyperbranched polyglycerol to the dichlorotriazine groups and eventual conversion to the polyglycerol sulfate result in the graphene based heparin biomimetics. Scanning force microscopy, cryo‐transmission electron microscopy, and in vitro bioassays reveal strong interactions between the functionalized graphene (thoroughly covered by a sulfated polymer) and vesicular stomatitis virus. Infection experiments with highly sulfated versions of graphene drastically promote the infection process, leading to higher viral titers compared to nonsulfated analogues. 相似文献
In orthogonal frequency division multiplexing (OFDM) system, high value of peak-to-average power ratio (PAPR) is an operational problem that may cause non-linear distortion resulting in high bit error rate. Selected mapping (SLM) is a well known technique that shows good PAPR reduction capability but inflicts added computational overhead. In this paper, using Riemann sequence based SLM method, we applied reverse searching technique to find out low PAPR yielding phase sequences with significant reduction in computational complexity. Additionally, we explored side-information free transmission that achieves higher throughput but sacrifices PAPR reduction. Finally, to overcome this loss in PAPR reduction, we proposed application of Square-rooting companding technique over the output OFDM transmitted signal. Simulation results show that the proposed method is able to compensate the sacrifice in PAPR and achieved PAPR reduction of 8.9 dB with very low computational overhead. 相似文献
We give generic constructions of several fundamental cryptographic primitives based on a new encryption primitive that combines circular security for bit encryption with the so-called reproducibility property (Bellare et al. in Public key cryptography—PKC 2003, vol. 2567, pp. 85–99, Springer, 2003). At the heart of our constructions is a novel technique which gives a way of de-randomizing reproducible public-key bit encryption schemes and also a way of reducing one-wayness conditions of a constructed trapdoor function family (TDF) to circular security of the base scheme. The main primitives that we build from our encryption primitive include k-wise one-way TDFs (Rosen and Segev in SIAM J Comput 39(7):3058–3088, 2010), chosen-ciphertext-attack-secure encryption and deterministic encryption. Our results demonstrate a new set of applications of circularly secure encryption beyond fully homomorphic encryption and symbolic soundness. Finally, we show the plausibility of our assumptions by showing that the decisional Diffie–Hellman-based circularly secure scheme of Boneh et al. (Advances in cryptology—CRYPTO 2008, vol. 5157, Springer, 2008) and the subgroup indistinguishability-based scheme of Brakerski and Goldwasser (Advances in cryptology—CRYPTO 2010, vol. 6223, pp. 1–20, Springer, 2010) are both reproducible. 相似文献