首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   3篇
  免费   0篇
机械仪表   1篇
自动化技术   2篇
  2008年   1篇
  2007年   1篇
  2005年   1篇
排序方式: 共有3条查询结果,搜索用时 0 毫秒
1
1.
Most existing solutions to group security in Mobile Ad Hoc Networks (MANETs) rely on a multicast Core Based Tree (CBT) for key distribution. Such solutions, although suitable for systems with low mobility and static characteristics, are unsuitable for dynamic and sparse groups with changing neighborhoods. In this paper, we propose an entirely decentralized key generation mechanism, employing a central trusted entity only during initialization. Using our approach, keys can be established between group members with absolutely no prior communication. The solution relies on threshold cryptography and introduces a novel concept of Node-Group-Key (NGK) mapping. We have provided an extensive analytical model for the computations involved and communication costs and have also provided a lie detection mechanism. Simulation results show appreciable performance improvement and enhanced robustness.  相似文献   
2.
With the support of cellular system a cellular-based mobile ad hoc network (MANET) offers promising communication scenarios while entails secure data exchange as other wireless systems. In this paper, we propose a novel decentralized key generation mechanism using shared symmetric polynomials in which the base stations (BSs) carry out an initial key generation by a symmetric polynomial in a distributed manner and then pass on the key material to mobile stations (MSs). Thereafter, our proposed key generation scheme enables each pair of MSs to establish a pairwise key without any intervention from the BS, thus reducing the management cost for the BS. The shared key between two MSs is computed without any interaction between them. In addition, the trust among MSs is derived from the cellular infrastructure, thus enjoying an equal security level as provided in the underlying cellular network. Simulations are done to observe the system performance and the results are very encouraging.  相似文献   
3.
Roy A  Iqbal K 《ISA transactions》2005,44(3):363-378
This paper discusses PID stabilization of a first-order-plus-dead-time (FOPDT) process model using the stability framework of the Hermite-Biehler theorem. The FOPDT model approximates many processes in the chemical and petroleum industries. Using a PID controller and first-order Padé approximation for the transport delay, the Hermite-Biehler theorem allows one to analytically study the stability of the closed-loop system. We derive necessary and sufficient conditions for stability and develop an algorithm for selection of stabilizing feedback gains. The results are given in terms of stability bounds that are functions of plant parameters. Sensitivity and disturbance rejection characteristics of the proposed PID controller are studied. The results are compared with established tuning methods such as Ziegler-Nichols, Cohen-Coon, and internal model control.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号