communication scheme
Recently Published Documents


TOTAL DOCUMENTS

779
(FIVE YEARS 221)

H-INDEX

35
(FIVE YEARS 10)

2022 ◽  
Vol 65 ◽  
pp. 103103
Author(s):  
Xiaohan Yue ◽  
Shuaishuai Zeng ◽  
Xibo Wang ◽  
Lixin Yang ◽  
Shi Bai ◽  
...  

2022 ◽  
Vol 308 ◽  
pp. 118294
Author(s):  
Xing-Chen Shangguan ◽  
Yong He ◽  
Chuan-Ke Zhang ◽  
Lin Jiang ◽  
Min Wu

Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 647
Author(s):  
Bin Ma ◽  
Shichun Yang ◽  
Zheng Zuo ◽  
Bosong Zou ◽  
Yaoguang Cao ◽  
...  

The rapid development of intelligent networked vehicles (ICVs) has brought many positive effects. Unfortunately, connecting to the outside exposes ICVs to security threats. Using secure protocols is an important approach to protect ICVs from hacker attacks and has become a hot research area for vehicle security. However, most of the previous studies were carried out on V2X networks, while those on in-vehicle networks (IVNs) did not involve Ethernet. To this end, oriented to the new IVNs based on Ethernet, we designed an efficient secure scheme, including an authentication scheme using the Scalable Service-Oriented Middleware over IP (SOME/IP) protocol and a secure communication scheme modifying the payload field of the original SOME/IP data frame. The security analysis shows that the designed authentication scheme can provide mutual identity authentication for communicating parties and ensure the confidentiality of the issued temporary session key; the designed authentication and secure communication scheme can resist the common malicious attacks conjointly. The performance experiments based on embedded devices show that the additional overhead introduced by the secure scheme is very limited. The secure scheme proposed in this article can promote the popularization of the SOME/IP protocol in IVNs and contribute to the secure communication of IVNs.


2022 ◽  
Vol 9 ◽  
Author(s):  
Xiangzi Zhang ◽  
Xiaobin Ding ◽  
Dandan Tong ◽  
Pengbin Chang ◽  
Jizhao Liu

Brain-Computer Interface (BCI) is a direct communication pathway between the brain and the external environment without using peripheral nerves and muscles. This emerging topic is suffering from serious issues such as malicious tampering and privacy leakage. To address this issue, we propose a novel communication scheme for BCI Systems. In particular, this scheme first utilizes high-dimensional chaotic systems with hyperbolic sine nonlinearity as the random number generator, then decorrelation operation is used to remove the physical characteristics of the output sequences. Finally, each of the sequences is applied in differential chaos shift keying (DCSK). Since each output sequence corresponds to a unique electrode, the communication data of different electrodes will not interfere with each other. Compared with popular multi-user DSCK schemes using Walsh code sequences, this scheme does not require the channel data of all electrodes while decoding. Therefore, this scheme has higher efficiency. Experimental results on communication data indicate that the proposed scheme can provide a high level of security.


2022 ◽  
Vol 1212 (1) ◽  
pp. 012040
Author(s):  
M A Setiawan ◽  
E Sulistyo

Abstract Voltage regulation is one of the main control issues in DC Microgrids (MGs). To achieve voltage regulation in MGs, exchange information between distributed generation units (DG) is inevitable. There are two types of data exchange proposed and discussed, centralised and decentralised data communication schemes. Many papers in the literature did not give attention to the type of data communication infrastructure that will have a significant impact on both centralised and decentralised schemes. This paper proposes centralised and decentralised data communication scheme and their impact on voltage regulation in DC MGs. The dynamic performance of a DC MG with loads fluctuations, operating with the proposed technique, is evaluated through simulation analyses, realized in MATLAB. Both the proposed centralised and decentralised methods are able to maintain the voltage within acceptable limit during loads fluctuations; however the centralised method is around five times faster than the decentralised method. The results show the superiority of the proposed method for the DC MGs operations during load demands fluctuations, loads varieties, communication delays and structures.


SPE Journal ◽  
2022 ◽  
pp. 1-13
Author(s):  
Md Shahriar Islam ◽  
B. Berscheid ◽  
T. Wiens

Summary For the purpose of exploration and extraction, the drilling process in the mining and oil and gas industries is very complicated because of the obvious invisibility of the operation of the drill bit. Acoustic/vibrational telemetry has been of keen interest because it is so far the only method that allows a high data transfer rate as well as less data loss, over other methods. The method certainly depends on the use of the right communication tools and efficient communication schemes to achieve the highest data transfer rate. Although the acoustic method provides a very high data transmission rate, it also has its limitations. However, limitations can be overcome through certain approaches and the use of technologies. The proper use of a communication device with the steel pipe is the most important factor to consider so that the transducer works as the right actuator for the pipeline. The type of sensor that is used to pick up the data also plays a major role because signals are most likely to attenuate, and a sensitive sensor is necessary to collect these attenuated signals. This research demonstrates the use of a transducer as a communication device and oil and gas pipe as the medium of data transmission. The transducer can be used both as an actuator driver and as a receiver sensor. A new piezoelectric transducer was manufactured for this research, which was used with a test setup of a total 184 ft length of six oil and gas pipes. The test setup performed well and data were sent through this setup successfully. A communication scheme is developed using novel theories to achieve the highest data transfer rate. The scheme is tested with the transfer function data obtained from the experimental system. The communication scheme developed outputs a signal, which is a type of binary phase-shift keying signal data along with an equalizer filter. Then the signals developed from the scheme are used in the actual experimental setup to test the speed of the transmission and bit error rate (BER). For the six oil and gas pipes setup, the scheme provides a data transmission of 153 bits/sec (bps) with zero error percentage, which is high enough to use in any oil and gas industry.


2021 ◽  
Vol 15 ◽  
Author(s):  
Hui Zhao ◽  
Aidi Liu ◽  
Qingjié Wang ◽  
Mingwen Zheng ◽  
Chuan Chen ◽  
...  

This paper explores the realization of a predefined-time synchronization problem for coupled memristive neural networks with multi-links (MCMNN) via nonlinear control. Several effective conditions are obtained to achieve the predefined-time synchronization of MCMNN based on the controller and Lyapunov function. Moreover, the settling time can be tunable based on a parameter designed by the controller, which is more flexible than fixed-time synchronization. Then based on the predefined-time stability criterion and the tunable settling time, we propose a secure communication scheme. This scheme can determine security of communication in the aspect of encrypting the plaintext signal with the participation of multi-links topology and coupled form. Meanwhile, the plaintext signals can be recovered well according to the given new predefined-time stability theorem. Finally, numerical simulations are given to verify the effectiveness of the obtained theoretical results and the feasibility of the secure communication scheme.


2021 ◽  
Vol 2021 ◽  
pp. 1-17
Author(s):  
Shanyun Huang ◽  
Wenyin Zhang ◽  
Xiaomei Yu ◽  
Jiuru Wang ◽  
Wanshui Song ◽  
...  

Due to the unique characteristics of blockchain, such as decentralization, anonymity, high credibility, and nontampering, blockchain technologies have become an integral part of public data platforms and public infrastructure. The communication between the stakeholders of a given blockchain can be used as a carrier for covert communication under cover of legal transactions, which has become a promising research direction of blockchain technology. Due to the special mechanism of blockchain, some traditional blockchain covert communication schemes are not mature enough. They suffer from various drawbacks, such as weak concealment of secret information, cumbersome identification and screening of special transactions, poor availability, and low comprehensive performance. Therefore, this paper designs a scheme of covert communication in the Bitcoin blockchain, which takes normal transactions as a mask and leverages the Bitcoin transaction mechanism to embed secret information in the public key hash field. Specifically, we propose a novel key update mechanism combined with the hash algorithm to construct a covert channel. It ensures security and can update the channel to prevent the related problems caused by address reuse. We are taking advantage of the feature of Bitcoin that cannot be double-spent to solve the problem of burning bitcoin when paying bitcoin to a fake public key hash. In our scheme, both parties to the communication are anonymous, and the attacker cannot detect the covert data or track the transaction and address. Our proposed scheme was tested in real Bitcoin blockchain network, and the experimental results were analyzed to verify its security, availability, and efficiency.


Sign in / Sign up

Export Citation Format

Share Document