- 标题
- 摘要
- 关键词
- 实验方案
- 产品
-
[IEEE 2019 5th International Conference on Advances in Electrical Engineering (ICAEE) - Dhaka, Bangladesh (2019.9.26-2019.9.28)] 2019 5th International Conference on Advances in Electrical Engineering (ICAEE) - Effect of Thermally Evaporated n-CdTe Thin Film for Homojunction CdTe Solar Cell
摘要: The Internet of Things (IoT) is becoming an attractive system paradigm to realize interconnections through the physical, cyber, and social spaces. During the interactions among the ubiquitous things, security issues become noteworthy, and it is significant to establish enhanced solutions for security protection. In this work, we focus on an existing U2IoT architecture (i.e., unit IoT and ubiquitous IoT), to design an aggregated-proof based hierarchical authentication scheme (APHA) for the layered networks. Concretely, 1) the aggregated-proofs are established for multiple targets to achieve backward and forward anonymous data transmission; 2) the directed path descriptors, homomorphism functions, and Chebyshev chaotic maps are jointly applied for mutual authentication; 3) different access authorities are assigned to achieve hierarchical access control. Meanwhile, the BAN logic formal analysis is performed to prove that the proposed APHA has no obvious security defects, and it is potentially available for the U2IoT architecture and other IoT applications.
关键词: security,Internet of Things (IoT),U2IoT architecture,authentication protocol
更新于2025-09-19 17:13:59
-
A novel baseline-based method to detect local structural changes in masonry walls using dense terrestrial laser scanning point clouds
摘要: The ever-increasing advancement in communication technologies of modern smart objects brings with it a new era of application development for Internet of Things (IoT)-based networks. In particular, owing to the contactless-ness nature and ef?ciency of the data retrieval of mobile smart objects, such as wearable equipment or tailored bio-sensors, several innovative types of healthcare systems with body sensor networks (BSN) have been proposed. In this paper, we introduce a secure IoT-based healthcare system, which operates through the BSN architecture. To simultaneously achieve system ef?ciency and robustness of transmission within public IoT-based communication networks, we utilize robust crypto-primitives to construct two communication mechanisms for ensuring transmission con?dentiality and providing entity authentication among smart objects, the local processing unit and the backend BSN server. Moreover, we realize the implementation of the proposed healthcare system with the Raspberry PI platform to demonstrate the practicability and feasibility of the presented mechanisms.
关键词: Authentication,internet of things (IoT),body sensor networks,security
更新于2025-09-19 17:13:59
-
[IEEE 2019 International Conference on Optical MEMS and Nanophotonics (OMN) - Daejeon, Korea (South) (2019.7.28-2019.8.1)] 2019 International Conference on Optical MEMS and Nanophotonics (OMN) - Plasmonic Color Sheet with Al Nano Periodic Structure Formed by Transfer Technique
摘要: The ever-increasing advancement in communication technologies of modern smart objects brings with it a new era of application development for Internet of Things (IoT)-based networks. In particular, owing to the contactless-ness nature and efficiency of the data retrieval of mobile smart objects, such as wearable equipment or tailored bio-sensors, several innovative types of healthcare systems with body sensor networks (BSN) have been proposed. In this paper, we introduce a secure IoT-based healthcare system, which operates through the BSN architecture. To simultaneously achieve system efficiency and robustness of transmission within public IoT-based communication networks, we utilize robust crypto-primitives to construct two communication mechanisms for ensuring transmission confidentiality and providing entity authentication among smart objects, the local processing unit and the backend BSN server. Moreover, we realize the implementation of the proposed healthcare system with the Raspberry PI platform to demonstrate the practicability and feasibility of the presented mechanisms.
关键词: security,internet of things (IoT),Authentication,body sensor networks
更新于2025-09-19 17:13:59
-
[IEEE 2019 International Topical Meeting on Microwave Photonics (MWP) - Ottawa, ON, Canada (2019.10.7-2019.10.10)] 2019 International Topical Meeting on Microwave Photonics (MWP) - Tunable Low-Spurious Heterodyne-Dual-Injection-Locked Optoelectronic Oscillator
摘要: The use of fingerprint embedding at the physical layer enables a receiver to authenticate a transmitter by detecting a low-power authentication tag superimposed upon the message waveform; a theoretical framework for such fingerprinting has been outlined. We carry out single-carrier single-antenna software defined radio (SDR) experiments with a wireless communications link over which we transmit and receive packets with the embedded fingerprinting. We analyze these experimental results and find they match well with theoretical predictions. This paper demonstrates that the method of superimposed fingerprints can deliver high probability of authentication without additional bandwidth and with minimal impact on bit-error rate in SDR systems.
关键词: communication system security,Cognitive radio,message authentication
更新于2025-09-19 17:13:59
-
[IEEE 2019 24th Microoptics Conference (MOC) - Toyama, Japan (2019.11.17-2019.11.20)] 2019 24th Microoptics Conference (MOC) - Controlled Generation of Isolated C-points in Few-mode Optical Fiber
摘要: We present a large-scale study exploring the capability of temporal deep neural networks to interpret natural human kinematics and introduce the first method for active biometric authentication with mobile inertial sensors. At Google, we have created a first-of-its-kind data set of human movements, passively collected by 1500 volunteers using their smartphones daily over several months. We compare several neural architectures for efficient learning of temporal multi-modal data representations, propose an optimized shift-invariant dense convolutional mechanism, and incorporate the discriminatively trained dynamic features in a probabilistic generative framework taking into account temporal characteristics. Our results demonstrate that human kinematics convey important information about user identity and can serve as a valuable component of multi-modal authentication systems. Finally, we demonstrate that the proposed model can also be successfully applied in a visual context.
关键词: recurrent neural networks,mobile computing,biometrics (access control),Authentication,learning
更新于2025-09-19 17:13:59
-
[IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - A simple physical model for three-terminal tandem cell operation
摘要: We present a large-scale study exploring the capability of temporal deep neural networks to interpret natural human kinematics and introduce the first method for active biometric authentication with mobile inertial sensors. At Google, we have created a first-of-its-kind data set of human movements, passively collected by 1500 volunteers using their smartphones daily over several months. We compare several neural architectures for efficient learning of temporal multi-modal data representations, propose an optimized shift-invariant dense convolutional mechanism, and incorporate the discriminatively trained dynamic features in a probabilistic generative framework taking into account temporal characteristics. Our results demonstrate that human kinematics convey important information about user identity and can serve as a valuable component of multi-modal authentication systems. Finally, we demonstrate that the proposed model can also be successfully applied in a visual context.
关键词: recurrent neural networks,mobile computing,biometrics (access control),Authentication,learning
更新于2025-09-19 17:13:59
-
[IEEE 2019 18th International Conference on Optical Communications and Networks (ICOCN) - Huangshan, China (2019.8.5-2019.8.8)] 2019 18th International Conference on Optical Communications and Networks (ICOCN) - Security authentication based on generated address algorithm for software-defined optical communication network
摘要: Aiming at the rapid increase in the number of optical line terminals (OLTs) and optical network units (ONUs) connected to the control center in the software defined optical access network (SDOAN) environment, the security problems caused by the communication between devices and the high cost caused by the introduction of security schemes, we propose a lightweight identity two-way authentication scheme (LTWA) based on the cryptographically generated address (CGA) algorithm combined with the hash generated address (HGA) algorithm. The scheme introduces the CGA algorithm and the HGA algorithm without third party participation, so as to complete the first authentication binding and the non-first communication nodes respectively, which effectively prevents an attacker from forging or tampering with authentication interaction messages, thereby establishing an end-to-end trusted connection in the access network.
关键词: Software-defined network,Authentication,Optical access network,Optical network unit,Optical line terminal
更新于2025-09-16 10:30:52
-
Laser-induced breakdown spectroscopy for food authentication
摘要: With the globalisation of food markets, food authentication has become a significant concern worldwide to ensure food safety and to avoid origin and quality fraud. A multi-elemental fingerprint is a powerful tool for detection of adulterants and geographical origin of foods. Laser-induced breakdown spectroscopy (LIBS) is a promising technique that can provide a mineral fingerprint of food products. LIBS allows a rapid, high-throughput, micro-destructive and multi-elemental analysis of a wide range of samples type. It has already been demonstrated by several authors that LIBS can be successfully used for food authentication. Although LIBS shows excellent potential for at-line or portable applications, improvement in sensitivity of trace elements detection, sample preparation, data analysis and instrument miniaturisation are needed.
关键词: LIBS,Laser-induced breakdown spectroscopy,multi-elemental analysis,food authentication,fraud detection
更新于2025-09-16 10:30:52
-
Bridging R2R Printed Wireless 1 Bit‐Code Generator with an Electrophoretic QR Code Acting as WORM for NFC Carrier Enabled Authentication Label
摘要: Printed electronics are challenged for showing the working concept of the roll-to-roll (R2R) printed 13.56 MHz passive radio frequency identification (RFID) tag for the application in wireless identification (ID) and authentication to prevent counterfeits with the cost of a penny. However, the concept of the penny RFID tag is not successful yet because of the major limit in integrating a number logic gates by a high throughput R2R printing method. Herein, a new way of printed electronics is developed by integrating an electrophoretic quick response (QR) code as write once read many type of memory circuitry to integrate with a R2R printed wireless 1-bit code generator. Through the electrophoretic QR code integration with the wireless 1-bit code generator, only six logic gates (12 thin film transistors) are enough to wirelessly provide 2953 bytes of authentic information by utilizing two functions of smartphone, near field communication, and camera.
关键词: R2R printing,QR code,NFC label,CMOS clock,authentication
更新于2025-09-12 10:27:22
-
Application of Spectroscopic UV-Vis and FT-IR Screening Techniques Coupled with Multivariate Statistical Analysis for Red Wine Authentication: Varietal and Vintage Year Discrimination
摘要: One of the most important issues in the wine sector and prevention of adulterations of wines are discrimination of grape varieties, geographical origin of wine, and year of vintage. In this experimental research study, UV-Vis and FT-IR spectroscopic screening analytical approaches together with chemometric pattern recognition techniques were applied and compared in addressing two wine authentication problems: discrimination of (i) varietal and (ii) year of vintage of red wines produced in the same oenological region. UV-Vis and FT-IR spectra of red wines were registered for all the samples and the principal features related to chemical composition of the samples were identi?ed. Furthermore, for the discrimination and classi?cation of red wines a multivariate data analysis was developed. Spectral UV-Vis and FT-IR data were reduced to a small number of principal components (PCs) using principal component analysis (PCA) and then partial least squares discriminant analysis (PLS-DA) and linear discriminant analysis (LDA) were performed in order to develop qualitative classi?cation and regression models. The ?rst three PCs used to build the models explained 89% of the total variance in the case of UV-Vis data and 98% of the total variance for FR-IR data. PLS-DA results show that acceptable linear regression ?ts were observed for the varietal classi?cation of wines based on FT-IR data. According to the obtained LDA classi?cation rates, it can be a?rmed that UV-Vis spectroscopy works better than FT-IR spectroscopy for the discrimination of red wines according to the grape variety, while classi?cation of wines according to year of vintage was better for the LDA based FT-IR data model. A clear discrimination of aged wines (over six years) was observed. The proposed methodologies can be used as accessible tools for the wine identity assurance without the need for costly and laborious chemical analysis, which makes them more accessible to many laboratories.
关键词: chemometrics,FT-IR,wine authentication,spectroscopic techniques,UV-Vis
更新于2025-09-11 14:15:04