ID 原文 译文
5324 安全性分析表明,所提方案在随机预言机模型下基于计算性 Diffie-Hellman 困难问题假设具有强抗密钥泄露、机密性、可检测性以及认证标签和证明值的不可伪造性。 Security analysis indicates that the proposed scheme is strong key-exposure resilient, confidentiality, detectability, and unforgeability of authentication tagsand tokens under the computation Diffie-Hellman hardness assumption in the random oracle model.Key words: cloud storage, integrity auditing, key-exposure resilient, encrypted data, client-side dedupl
5325 针对窄带物联网(NB-IoT)的 3 种典型业务场景(周期自动报告、异常自动报告和软件升级/重配置业务),为 NB-IoT 扩展型非连续接收(eDRX)机制建立了以终端工作状态为状态变量的马尔可夫模型,并给出相应的功耗与时延模型。 To extend the battery life of massive machine type devices (MTD), narrow-band Internet of things (NB-IoT)system extended discontinuous reception (eDRX) mechanism of LTE to the maximum as well as introduced a lowerpower state named as power saving mode (PSM). Three Markov models were established for three typical NB-IoT trafficscenarios, which called mobile autonomous reporting periodic report (MAR-P), mobile autonomous reporting exceptionreport (MAR-E), software update/reconfiguration (SUR).
5326 其中,连接态被分为随机接入态和数据收发态,以细化因海量用户并发入网产生碰撞而带来的额外能耗。 The states of each Markov model were the working status ofMTDs, including connected, idle and PSM state, in which the connected state was divided into random access state and data translating/receiving state to further evaluate the additional power consumption caused by collisions from massiveMTDs concurrent access. Thereby, the power consumption and delay models with respect to each traffic scenarios were derived.
5327 鉴于周期自动报告(MAR-P)业务的发生频次最高,重点分析了 MAR-P 业务激励时 NB-IoT eDRX机制的电池使用寿命及其优化设计方案。 Since the frequency of MAR-P traffic was far greater than the other two, the battery life of this traffic case withits optimal design choice was comprehensively analyzed.
5328 数值表明,传输周期、最大随机接入次数、最大数据重传次数和系统负载直接决定电池使用寿命,上述参数合理配置可有效延长电池使用寿命。 Numerical results show that, the battery life is mostly influ-enced by transmission period, maximum number of random access attempts, maximum number of data transmissions andtraffic load, which can be maximized by appropriate parameters setting up.
5329 这为 NB-IoT 终端行为级建模与优化设计提供了参考。 These works provide good references forNB-IoT device behavior modeling and optimization design.
5330 为合理选取和调整威胁处置方式,需要对威胁处置效果进行评估。 In order to appropriately select and adjust response countermeasures, it is necessary to evaluate response effec-tiveness.
5331 现有的评估方法主要针对风险和威胁态势,很少评估威胁处置效果,且这些方法的前提条件之一是用于评估的所有信息完全,这一条件在实际环境中难以实现。 Although a large amount of effort has been spent on the evaluation of risk and threat situations, the existing schemesare not suitable to evaluate response effectiveness, because the sechems require that all the information used for evaluation iscomplete, which is difficult to implement in the real environment.
5332 针对该问题,提出了一种不完全信息下的威胁处置效果模糊评估方法。 To address the problem, a fuzzy scheme was proposed todeal with incomplete information (i.e., missing elements of judgment matrix and missing data of indicators) and the responseeffectiveness was evaluate.
5333 首先,综合考虑攻防双方设计层次化评估指标树; Firstly, a hierarchical indicator tree was design to characterize the effectiveness from the perspec-tives of both attack and defense.