期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Distributed In-Time Multiple Coverage Holes Healing Protocol
1
作者 Lin-Na Wei Zhi-Guang Qin 《Journal of Electronic Science and Technology》 CAS 2012年第2期185-191,共7页
Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes... Coverage holes often appear in wireless sensor networks due to sensor failure or the inheritance of sensor's random distribution. In the hybrid model, mobile sensors in the network are acquired to heal coverage holes by their mobifity. When multiple coverage holes appear in the sensor network and each of them has a time requirement (in which the coverage hole has to be healed), conflicts for the requests of the same mobile sensor may arise. A distributed multiple mobile sensor schedufing protocol (DMS) is proposed in this paper to solve this problem by finding mobile sensors in the time response zone defined by the time requirement of each coverage hole. Simulation results show that DMS can well schedule the mobile sensors to move to multiple coverage holes within the time requirement. 展开更多
关键词 Coverage bole distributed protocol mobile sensor dispatch sensor network time limited.
在线阅读 下载PDF
Twin-Field Quantum Key Distribution Protocol Based on Wavelength-Division-Multiplexing Technology
2
作者 Yanxin Han Zhongqi Sun +5 位作者 Tianqi Dou Jipeng Wang Zhenhua Li Yuqing Huang Pengyun Li Haiqiang Ma 《Chinese Physics Letters》 SCIE EI CAS CSCD 2022年第7期3-8,共6页
Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes ... Quantum key distribution(QKD) generates information-theoretical secret keys between two parties based on the physical laws of quantum mechanics. Following the advancement in quantum communication networks, it becomes feasible and economical to combine QKD with classical optical communication through the same fiber using dense wavelength division multiplexing(DWDM) technology. This study proposes a detailed scheme of TF-QKD protocol with DWDM technology and analyzes its performance, considering the influence of quantum channel number and adjacent quantum crosstalk on the secret key rates. The simulation results show that the scheme further increases the secret key rate of TF-QKD and its variants. Therefore, this scheme provides a method for improving the secret key rate for practical quantum networks. 展开更多
关键词 Twin-Field Quantum Key Distribution protocol Based on Wavelength-Division-Multiplexing Technology QKD Quantum protocol KEY
在线阅读 下载PDF
Proof of Security of a Semi-Device-Independent Quantum Key Distribution Protocol
3
作者 Peng Xu Wan-Su Bao +2 位作者 Hong-Wei Li Yang Wang Hai-Ze Bao 《Chinese Physics Letters》 SCIE CAS CSCD 2017年第2期7-10,共4页
Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prov... Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prove the security of the SDI-QKD protocol under the depolarization channel by considering the quantum dimension witness inequalities and minimum entropy and the specific process of the QKD protocol, combining with a four- quantum-state preparation and three measurement bases. We also provide the relationship between the dimension witness value, the error rate and the security key rate by the numerical simulation. 展开更多
关键词 QKD Proof of Security of a Semi-Device-Independent Quantum Key Distribution protocol SDI
在线阅读 下载PDF
Practical Timing Synchronization for Network Dynamics in Large Machine-to-Machine Networks
4
作者 Lei Gu Shih-Chun Lin 《China Communications》 SCIE CSCD 2016年第10期160-168,共9页
Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchro... Efficient multi-machine cooperation and network dynamics still remain open that jeopardize great applications in largescale machine-to-machine(M2M) networks. Among all possible machine cooperation controls, to synchronize tremendous machines in a timing-efficient brings one of the greatest challenge and serves as the foundation for any other network control policies. In this paper, we propose a linear-time synchronization protocol in large M2M networks. Specifically, a closed-form of synchronization rate is provided by developing the statistical bounds of the second smallest eigenvalue of the graph Laplacian matrix. These bounds enable the efficient control of network dynamics, facilitating the timing synchronization in networks. Through a practical study in Metropolis, simulation results confirm our theoretical analysis and provide effective selection of wireless technologies, including Zigbee, Wi-Fi, and cellular systems, with respect to the deployed density of machines. Therefore, this paper successfully demonstrates a practical timing synchronization, to make a breakthrough of network dynamic control in real-world machine systems, such as Internet of Things. 展开更多
关键词 timing synchronization network dynamics graph Laplacian matrix distributed protocol internet of things(IoTs) machine-to-machine(M2M) communications
在线阅读 下载PDF
Quantum Key Distribution Network Based on Differential Phase Shift 被引量:5
5
作者 王婉莹 王川 +1 位作者 文凯 龙桂鲁 《Chinese Physics Letters》 SCIE CAS CSCD 2007年第6期1463-1466,共4页
Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the dif... Using a series of quantum correlated photon pairs, we propose a theoretical scheme for any-to-any multi-user quantum key distribution network based on differential phase shift. The differential phase shift and the different detection time slots ensure the security of our scheme against eavesdropping. We discuss the security under the intercept-resend attack and the source replacement attack. 展开更多
关键词 SECURE DIRECT COMMUNICATION DISTRIBUTION protocol OPTICAL NETWORKS BELLTHEOREM CRYPTOGRAPHY ENTANGLEMENT STATES
在线阅读 下载PDF
Round-robin differential quadrature phase-shift quantum key distribution 被引量:1
6
作者 Chun Zhou Ying-Ying Zhang +3 位作者 Wan-Su Bao Hong-Wei Li Yang Wang Mu-Sheng Jiang 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第2期63-67,共5页
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas... Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol. 展开更多
关键词 round-robin differential phase-shift protocol quantum key distribution intercept-resend attack beam-splitting attack
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部