87,487 research outputs found
Fourier-Reflexive Partitions and MacWilliams Identities for Additive Codes
A partition of a finite abelian group gives rise to a dual partition on the
character group via the Fourier transform. Properties of the dual partitions
are investigated and a convenient test is given for the case that the bidual
partition coincides the primal partition. Such partitions permit MacWilliams
identities for the partition enumerators of additive codes. It is shown that
dualization commutes with taking products and symmetrized products of
partitions on cartesian powers of the given group. After translating the
results to Frobenius rings, which are identified with their character module,
the approach is applied to partitions that arise from poset structures
ISO/EPC Addressing Methods to Support Supply Chain in the Internet of Things
RFID systems are among the major infrastructures of the Internet of Things,
which follow ISO and EPC standards. In addition, ISO standard constitutes the
main layers of supply chain, and many RFID systems benefit from ISO standard
for different purposes. In this paper, we tried to introduce addressing systems
based on ISO standards, through which the range of things connected to the
Internet of Things will grow. Our proposed methods are addressing methods which
can be applied to both ISO and EPC standards. The proposed methods are simple,
hierarchical, and low cost implementation. In addition, the presented methods
enhance interoperability among RFIDs, and also enjoys a high scalability, since
it well covers all of EPC schemes and ISO supply chain standards. Further, by
benefiting from a new algorithm for long EPCs known as selection algorithm,
they can significantly facilitate and accelerate the operation of address
mapping.Comment: arXiv admin note: text overlap with arXiv:1807.0217
Security and Privacy Issues in Wireless Mesh Networks: A Survey
This book chapter identifies various security threats in wireless mesh
network (WMN). Keeping in mind the critical requirement of security and user
privacy in WMNs, this chapter provides a comprehensive overview of various
possible attacks on different layers of the communication protocol stack for
WMNs and their corresponding defense mechanisms. First, it identifies the
security vulnerabilities in the physical, link, network, transport, application
layers. Furthermore, various possible attacks on the key management protocols,
user authentication and access control protocols, and user privacy preservation
protocols are presented. After enumerating various possible attacks, the
chapter provides a detailed discussion on various existing security mechanisms
and protocols to defend against and wherever possible prevent the possible
attacks. Comparative analyses are also presented on the security schemes with
regards to the cryptographic schemes used, key management strategies deployed,
use of any trusted third party, computation and communication overhead involved
etc. The chapter then presents a brief discussion on various trust management
approaches for WMNs since trust and reputation-based schemes are increasingly
becoming popular for enforcing security in wireless networks. A number of open
problems in security and privacy issues for WMNs are subsequently discussed
before the chapter is finally concluded.Comment: 62 pages, 12 figures, 6 tables. This chapter is an extension of the
author's previous submission in arXiv submission: arXiv:1102.1226. There are
some text overlaps with the previous submissio
- …