17 research outputs found

    An Improved TESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

    Get PDF
    Broadcast authentication is a fundamental security technology in wireless sensor networks (ab. WSNs). As an authentication protocol, the most widely used in WSN, TESLA protocol, its publication of key is based on a fixed time interval, which may lead to unsatisfactory performance under the unstable network traffic environment. Furthermore, the frequent network communication will cause the delay authentication for some broadcast packets while the infrequent one will increase the overhead of key computation. To solve these problems, this paper improves the traditional TESLA by determining the publication of broadcast key based on the network data flow rather than the fixed time interval. Meanwhile, aiming at the finite length of hash chain and the problem of exhaustion, a self-renewal hash chain based on Benaloh-Leichter secret sharing scheme (SRHC-BL SSS) is designed, which can prolong the lifetime of network. Moreover, by introducing the queue theory model, we demonstrate that our scheme has much lower key consumption than TESLA through simulation evaluations. Finally, we analyze and prove the security and efficiency of the proposed self-renewal hash chain, comparing with other typical schemes

    TCNet: Multiscale Fusion of Transformer and CNN for Semantic Segmentation of Remote Sensing Images

    No full text
    Semantic segmentation of remote sensing images plays a critical role in areas such as urban change detection, environmental protection, and geohazard identification. Convolutional Neural Networks (CNNs) have been excessively employed for semantic segmentation over the past few years; however, a limitation of the CNN is that there exists a challenge in extracting the global context of remote sensing images, which is vital for semantic segmentation, due to the locality of the convolution operation. It is informed that the recently developed Transformer is equipped with powerful global modeling capabilities. A network called TCNet is proposed in this article, and a parallel-in-branch architecture of the Transformer and the CNN is adopted in the TCNet. As such, the TCNet takes advantage of both Transformer and CNN, and both global context and low-level spatial details could be captured in a much shallower manner. In addition, a novel fusion technique called Interactive Self-attention is advanced to fuse the multilevel features extracted from both branches. To bridge the semantic gap between regions, a skip connection module called Windowed Self-attention Gating is further developed and added to the progressive upsampling network. Experiments on three public datasets (i.e., Bijie Landslide Dataset, WHU Building Dataset, and Massachusetts Buildings Dataset) depict that TCNet yields superior performance over state-of-the-art models. The IoU values obtained by TCNet for these three datasets are 75.34% (ranked first among 10 models compared), 91.16% (ranked first among 13 models compared), and 76.21% (ranked first among 13 models compared), respectively

    An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

    Get PDF
    Broadcast authentication is a fundamental security technology in wireless sensor networks (ab. WSNs). As an authentication protocol, the most widely used in WSN, μTESLA protocol, its publication of key is based on a fixed time interval, which may lead to unsatisfactory performance under the unstable network traffic environment. Furthermore, the frequent network communication will cause the delay authentication for some broadcast packets while the infrequent one will increase the overhead of key computation. To solve these problems, this paper improves the traditional μTESLA by determining the publication of broadcast key based on the network data flow rather than the fixed time interval. Meanwhile, aiming at the finite length of hash chain and the problem of exhaustion, a self-renewal hash chain based on Benaloh-Leichter secret sharing scheme (SRHC-BL SSS) is designed, which can prolong the lifetime of network. Moreover, by introducing the queue theory model, we demonstrate that our scheme has much lower key consumption than μTESLA through simulation evaluations. Finally, we analyze and prove the security and efficiency of the proposed self-renewal hash chain, comparing with other typical schemes

    An Improved μTESLA Protocol Based on Queuing Theory and Benaloh-Leichter SSS in WSNs

    Get PDF
    Broadcast authentication is a fundamental security technology in wireless sensor networks (ab. WSNs). As an authentication protocol, the most widely used in WSN, μTESLA protocol, its publication of key is based on a fixed time interval, which may lead to unsatisfactory performance under the unstable network traffic environment. Furthermore, the frequent network communication will cause the delay authentication for some broadcast packets while the infrequent one will increase the overhead of key computation. To solve these problems, this paper improves the traditional μTESLA by determining the publication of broadcast key based on the network data flow rather than the fixed time interval. Meanwhile, aiming at the finite length of hash chain and the problem of exhaustion, a self-renewal hash chain based on Benaloh-Leichter secret sharing scheme (SRHC-BL SSS) is designed, which can prolong the lifetime of network. Moreover, by introducing the queue theory model, we demonstrate that our scheme has much lower key consumption than μTESLA through simulation evaluations. Finally, we analyze and prove the security and efficiency of the proposed self-renewal hash chain, comparing with other typical schemes

    Permafrost Stability Mapping on the Tibetan Plateau by Integrating Time-Series InSAR and the Random Forest Method

    No full text
    The ground deformation rate is an important index for evaluating the stability and degradation of permafrost. Due to limited accessibility, in-situ measurement of the ground deformation of permafrost areas on the Tibetan Plateau is a challenge. Thus, the technique of time-series interferometric synthetic aperture radar (InSAR) is often adopted for measuring the ground deformation rate of the permafrost area, the effectiveness of which is, however, degraded in areas with geometric distortions in synthetic aperture radar (SAR) images. In this study, a method that integrates InSAR and the random forest method is proposed for an improved permafrost stability mapping on the Tibetan Plateau; to demonstrate the application of the proposed method, the permafrost stability mapping in a small area located in the central region of the Tibetan Plateau is studied. First, the ground deformation rate in the concerned area is studied with InSAR, in which 67 Sentinel-1 scenes taken in the period from 2014 to 2020 are collected and analyzed. Second, the relationship between the environmental factors (i.e., topography, land cover, land surface temperature, and distance to road) and the permafrost stability is mapped with the random forest method based on the high-quality data extracted from the initial InSAR analysis. Third, the permafrost stability in the whole study area is mapped with the trained random forest model, and the issue of data scarcity in areas where the terrain visibility of SAR images is poor or InSAR results are not available in permafrost stability mapping can be overcome. Comparative analyses demonstrate that the integration of the InSAR and the random forest method yields a more effective permafrost stability mapping compared with the sole application of InSAR analysis

    An Improved R-Index Model for Terrain Visibility Analysis for Landslide Monitoring with InSAR

    No full text
    The interferometric synthetic aperture radar (InSAR) technique is widely adopted for detecting and monitoring landslides, but its effectiveness is often degraded in mountainous terrains, due to geometric distortions in the synthetic aperture radar (SAR) image input. To evaluate the terrain effect on the applicability of InSAR in landslide monitoring, a variety of visibility evaluation models have been developed, among which the R-index models are quite popular. In consideration of the poor performance of the existing R-index models in the passive layover region, this study presents an improved R-index model, in which a coefficient for improving the visibility evaluation in the far passive layover regions is incorporated. To demonstrate the applicability of the improved R-index model, the terrain visibility of SAR images in Fengjie, a county in the Three Gorges Reservoirs region, China, is studied. The effectiveness of the improved R-index model is demonstrated through comparing the visibility evaluation results with those obtained from the existing R-index models and P-NG method. Further, the effects of the line-of-sight (LOS) parameters of SAR images and the resolution of the digital elevation model (DEM) on the terrain visibility are discussed

    Intrusion detection based on k-coverage in mobile sensor networks with empowered intruders

    No full text
    Intrusion detection is one of the important applications of Wireless Sensor Networks (WSNs). Prior research indicated that the barrier coverage method combined with Mobile Sensor Networks (MSNs) can enhance the effectiveness of intrusion detection by mitigating coverage holes commonly appeared in stationary WSNs. However, the trajectories of moving sensors and moving intruders have not been investigated thoroughly, where the impact between two adjacent moving sensors and between a moving sensor and a moving intruder are still underdetermined. In order to address these open problems, in this paper, we firstly discuss the virtual potential field between sensors as well as between sensors and intruders. We then propose to formulate the mobility pattern of sensor node using elastic collision model and that of intruder using point charge model. The point charge model describes an hitherto-unexplored mobility pattern of empowered-intruders, which are capable of acting upon the virtual repulsive forces from sensors in order to hide them away from being detected. With the aid of the two models developed, analytical expressions and simulation results demonstrate that our proposed design achieves a higher k -barrier coverage probability in intrusion detection when compared to that of the conventional designs. It is also worth mentioning that these improvements are achieved with shorter average displacement distance and under the much more challenging MSNs settings.</p
    corecore