期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Fog Computing Architecture-Based Data Acquisition for WSN Applications 被引量:2
1
作者 Guangwei Zhang Ruifan Li 《China Communications》 SCIE CSCD 2017年第11期69-81,共13页
Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and erro... Efficient and effective data acquisition is of theoretical and practical importance in WSN applications because data measured and collected by WSN is often unreliable, such as those often accompanied by noise and error, missing values or inconsistent data. Motivated by fog computing, which focuses on how to effectively offload computation-intensive tasks from resource-constrained devices, this paper proposes a simple but yet effective data acquisition approach with the ability of filtering abnormal data and meeting the real-time requirement. Our method uses a cooperation mechanism by leveraging on both an architectural and algorithmic approach. Firstly, the sensor node with the limited computing resource only accomplishes detecting and marking the suspicious data using a light weight algorithm. Secondly, the cluster head evaluates suspicious data by referring to the data from the other sensor nodes in the same cluster and discard the abnormal data directly. Thirdly, the sink node fills up the discarded data with an approximate value using nearest neighbor data supplement method. Through the architecture, each node only consumes a few computational resources and distributes the heavily computing load to several nodes. Simulation results show that our data acquisition method is effective considering the real-time outlier filtering and the computing overhead. 展开更多
关键词 WSN fog computing abnormal data data filtering intrusion tolerance
在线阅读 下载PDF
ECC Based Threshold Decryption Scheme and Its Application in Web Security 被引量:2
2
作者 张险峰 张峰 +1 位作者 秦志光 刘锦德 《Journal of Electronic Science and Technology of China》 2004年第4期41-46,共6页
The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test appro... The threshold cryptography provides a new approach to building intrusion tolerance applications. In this paper, a threshold decryption scheme based elliptic curve cryptography is presented. A zero-knowledge test approach based on elliptic curve cryptography is designed. The application of these techniques in Web security is studied. Performance analysis shows that our scheme is characterized by excellent security as well as high efficiency. 展开更多
关键词 intrusion tolerance elliptic curve cryptography threshold decryption web security
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部