On Resiliency to Compromised Nodes A Case for Location Based Security in Sensor Networks

合集下载

219415437_森林_郑州中心

219415437_森林_郑州中心

森林郑州中心The ForestZhengzhou Headquarters中原地区是华夏文明的摇篮。

6世纪末,位于此地的郑州古城逐渐成为重要城市之一。

如今的郑州快速崛起,成为河南省的政治与经济中心,不懈地试图在未来图景中重塑昔日形象。

由如恩设计的郑州中心大楼位于城市一处待开发区域。

在这座城市中,文化遗产与现代化发展之间充斥着各样的矛盾。

郑州的历史古迹,如城墙和要塞塔楼,其建造形式和材料与这片土地密切相关。

而如今的郑州规划了新的城市中心,并用大片的玻璃塔楼群向天空示意,轻盈透亮并自带反射的外观仿佛在骄傲地宣告它们作为现代性标志的存在。

随着郑州开始对全新身份的追寻,如恩在城市中心设计了这栋具有前瞻性的占地近乎一个街区的多功能大楼。

它不仅与郑州丰富的历史和谐共存,也是当下充满活力的存在,将创造新的集体记忆。

如恩将项目设想为一片森林,使不同部分联系起来形成整体感。

整个项目由三栋独立的建筑组成,并在室内外设有多种公共便利设施,广阔通达的空间为使用者提供了充满活力的社交环境。

微微弯曲的屋顶轮廓是一种对古城要塞中瞭望塔屋顶形式的当代演绎,柔化了新区规划的严肃感。

结构构件的聚合带来了建筑的永恒感。

1600多个承重拱墙形成了开放的空间系统,可以满足室内外不同的功能需求。

而每个9平方米的独立隔间都可以根据不同需求灵活配置,比如,开放式的楼层提供了很大的空间来容纳多个工作区,而私人办公室、会议室和储藏间则只占据隔间1/4到1/2的空间。

在公共区域,如接待大厅和采光中庭,这些结构隔间又在垂直方向叠放,供集体聚会使用。

Arriving at the tabula rasa project site in the rapidly expanding city of Zhengzhou, the confrontation betweenheritage and modernity is striking. Historically, the Central Plain area, in which the dynastic city first gainedprominence by the end of the sixth century CE, was the cradle of ancient Chinese civilization. Zhengzhou today,as a fast-rising political and economic powerhouse, is in relentless pursuit of reinventing itself in the image of thefuture. Ancient monuments in the region, such as the city walls and fortress towers, often reveal a close relationshipto the land in their built forms and construction materials. The current city plan charts new urban centers and alsogestures towards the sky with clusters of glass towers, whose lightness, transparency and self-reflection proudlydeclare their existence as signs of modernity. For the commission to design a city block-sized, multi-use projectin the midst of Zhengzhou in search of a new identity, we envision a forward-looking edifice that could coexist inharmony with layers of history, as well as being a vibrant present where new collective memories can be created.The project is conceived as a forest, which allows for a sense of wholeness among heterogeneous parts of thisproject. Consisting of three separate buildings, the project creates outdoor and indoor public amenities to providea lively social environment throughout the expansive grounds for the occupants. The gently curved roof profilesoftens the severity of the new district’s zoning code, and hints at a contemporary interpretation of the eave formsderiving from the watchtowers of the historic city fortress.The building’s sense of permanence is imparted by the aggregation of structural elements. Comprising over 1,600load-bearing arch walls, the project is an open system receptive to a range of indoor and outdoor functions. Theindividual bays, measuring 9 × 9 m (30 × 30 ft), can be flexibly configured according to a range of requirements.In the office component of the project, for example, the open floor plans provide large expanses to accommodate workstations, whereas private offices, meeting rooms and storage spaces occupy half or quarter of a bay. In public areas, such as the arrival lobby and sky-lit atriums, these structural bays are vertically stacked to celebrate collective gatherings.Extending the rhythmic and adaptable logic outward, the façade is similarly considered as a space where the realms of the interior and exterior overlap, rather than a mere skin. The southern face of the building is punctured by either 4.5 m (15 ft)-or 9 m (30 ft)-deep verdant terraces, specifically designed for the use of office workers, as private residences, or for public functions. Intermittent glazing setbacks allow the hanging gardens to break up the scale of an otherwise brutal street wall, while also providing a sense of openness on the façade.Working in tandem with the massing articulation, the ground is sculpted to provide a varied landscape of seating, planters, reflecting pools and gardens. The sectional qualities and localized detailing suggest a sense of the past revealing itself. Bushhammered stone blocks, terrazzo, vegetation and water elements hint at a weathered environment where nature and artifice become one. The history referenced here is not one of the dead and gone, nor a literal invocation of memories. Rather, we posit a particularly durable form of architecture, with the co-existence of the past and present as an active, open-ended, archaeological process, within which a new kind of contemporary life is possible.Throughout the day, the play of light and shadow highlights the three-dimensional qualities of the concrete arches and the spaces within. Rigorous repetition of the structural members extends from the exterior hanging gardens, ground-level arcades and sunken courtyards to all interior grand lobbies, atriums and event spaces, creating a seamless integration of structure and space throughout. At times, the ambiguity is intentionally compounded, where nature is born out of artifice, and the manmade is embedded in the unrefined. The potentiality of the past resides in a utopic present, and the fleeting, visceral “now” finds home in the ruin-like ground.如恩将这样的建筑节奏与多功能逻辑延伸至建筑立面,其整体被视为室内外空间功能重叠的多层次场域,而不仅仅是一层外壳。

托福阅读TPO20(试题+答案+译文)第3篇:FossilPreservation

托福阅读TPO20(试题+答案+译文)第3篇:FossilPreservation

托福阅读TPO20(试题+答案+译文)第3篇:FossilPreservationTPO是我们常用的托福模考工具,对我们的备考很有价值,下面小编给大家带来托福阅读TPO20(试题+答案+译文)第3篇:Fossil Preservation。

托福阅读原文【1】When one considers the many ways by which organisms are completely destroyed after death, it is remarkable that fossils are as common as they are. Attack by scavengers and bacteria, chemical decay, and destruction by erosion and other geologic agencies make the odds against preservation very high. However, the chances of escaping complete destruction are vastly improved if the organism happens to have a mineralized skeleton and dies in a place where it can be quickly buried by sediment. Both of these conditions are often found on the ocean floors, where shelled invertebrates (organisms without spines) flourish and are covered by the continuous rain of sedimentary particles. Although most fossils are found in marine sedimentary rocks, they also are found in terrestrial deposits left by streams and lakes. On occasion, animals and plants have been preserved after becoming immersed in tar or quicksand, trapped in ice or lava flows, or engulfed by rapid falls of volcanic ash.【2】The term "fossil" often implies petrifaction, literally a transformation into stone. After the death of an organism, the soft tissue is ordinarily consumed by scavengers and bacteria. The empty shell of a snail or clam may be left behind, and if it is sufficiently durable and resistant to dissolution, it may remain basically unchanged for a long period of time. Indeed, unaltered shells of marine invertebrates are known from deposits over 100million years old. In many marine creatures, however, the skeleton is composed of a mineral variety of calcium carbonate called aragonite. Although aragonite has the same composition as the more familiar mineral known as calcite, it has a different crystal form, is relatively unstable, and in time changes to the more stable calcite.【3】Many other processes may alter the shell of a clam or snail and enhance its chances for preservation. Water containing dissolved silica, calcium carbonate, or iron may circulate through the enclosing sediment and be deposited in cavities such as marrow cavities and canals in bone once occupied by blood vessels and nerves. In such cases, the original composition of the bone or shell remains, but the fossil is made harder and more durable. This addition of a chemically precipitated substance into pore spaces is termed "permineralization."【4】Petrifaction may also involve a simultaneous exchange of the original substance of a dead plant or animal with mineral matter of a different composition. This process is termed " replacement" because solutions have dissolved the original material and replaced it with an equal volume of the new substance. Replacement can be a marvelously precise process, so that details of shell ornamentation, tree rings in wood, and delicate structures in bone are accurately preserved.【5】Another type of fossilization, known as carbonization, occurs when soft tissues are preserved as thin films of carbon. Leaves and tissue of soft-bodied organisms such as jellyfish or worms may accumulate, become buried and compressed, and lose their volatile constituents. The carbon often remains behind as a blackened silhouette.【6】Although it is certainly true that the possession of hardparts enhances the prospect of preservation, organisms having soft tissues and organs are also occasionally preserved. Insects and even small invertebrates have been found preserved in the hardened resins of conifers and certain other trees. X-ray examination of thin slabs of rock sometimes reveals the ghostly outlines of tentacles, digestive tracts, and visual organs of a variety of marine creatures. Soft parts, including skin, hair, and viscera of ice age mammoths, have been preserved in frozen soil or in the oozing tar of oil seeps.【7】The probability that actual remains of soft tissue will be preserved is improved if the organism dies in an environment of rapid deposition and oxygen deprivation. Under such conditions, the destructive effects of bacteria are diminished. The Middle Eocene Messel Shale (from about 48 million years ago) of Germany accumulated in such an environment. The shale was deposited in an oxygen-deficient lake where lethal gases sometimes bubbled up and killed animals. Their remains accumulated on the floor of the lake and were then covered by clay and silt. Among the superbly preserved Messel fossils are insects with iridescent exoskeletons (hard outer coverings), frogs with skin and blood vessels intact, and even entire small mammals with preserved fur and soft tissue.托福阅读试题1.The word "agencies" in the passage (paragraph 1) is closest in meaning tobinations.B.problems.C.forces.D.changes.2.In paragraph 1, what is the author's purpose in providingexamples of how organisms are destroyed?A.To emphasize how surprising it is that so many fossils exist.B.To introduce a new geologic theory of fossil preservation.C.To explain why the fossil record until now has remained incomplete.D.To compare how fossils form on land and in water.3.The word "terrestrial" in the passage (paragraph 1) is closest in meaning tond.B.protected.C.alternative.D.similar.4.Which of the sentences below best expresses the essential information in the highlighted sentence in the passage (paragraph 2)? Incorrect choices change the meaning in important ways or leave out essential information.A.When snail or clam shells are left behind, they must be empty in order to remain durable and resist dissolution.B.Although snail and clam shells are durable and resist dissolving, over time they slowly begin to change.C.Although the soft parts of snails or clams dissolve quickly, their hard shells resist dissolution for a long time.D.Empty snail or clam shells that are strong enough not to dissolve may stay in their original state for a long time.5.Why does the author mention "aragonite" in the passage (paragraph 2)?A.To emphasize that some fossils remain unaltered for millions of years.B.To contrast fossil formation in organisms with soft tissue and in organisms with hard shells.C.To explain that some marine organisms must undergo chemical changes in order to fossilize.D.To explain why fossil shells are more likely to survive than are fossil skeletons.6.The word "enhance" in the passage (paragraph 3) is closest in meaning toA.control.B.limit.bine.D.increase.7.Which of the following best explains the process of permineralization mentioned in paragraph 3?A.Water containing calcium carbonate circulates through a shell and deposits sediment.B.Liquid containing chemicals hardens an already existing fossil structure.C.Water passes through sediment surrounding a fossil and removes its chemical content.D.A chemical substance enters a fossil and changes its shape.8.The word "precise" in the passage (paragraph 4) is closest in meaning toplex.B.quick.C.exact.D.reliable.9.Paragraph 5 suggests which of the following about the carbonization process?A.It is completed soon after an organism dies.B.It does not occur in hard-shell organisms.C.It sometimes allows soft-tissued organisms to bepreserved with all their parts.D.It is a more precise process of preservation than is replacement.10.The word "prospect" in the passage (paragraph 6) is closest in meaning topletion.B.variety.C.possibility.D.speed.11.According to paragraph 7, how do environments containing oxygen affect fossil preservation?A.They increase the probability that soft-tissued organisms will become fossils.B.They lead to more bacteria production.C.They slow the rate at which clay and silt are deposited.D.They reduce the chance that animal remains will be preserved.12.According to paragraph 7, all of the following assist in fossil preservation EXCEPTA.the presence of calcite in an organism's skeleton.B.the presence of large open areas along an ocean floor.C.the deposition of a fossil in sticky substances such as sap or tar.D.the rapid burial of an organism under layers of silt.13. Look at the four squares [■] that indicate where the following sentence can be added to the passage. Where would the sentence best fit? Click on a square [■] to insert the sentence in the passage. But the evidence of past organic life is not limited to petrifaction. ■【A】Another type of fossilization, known as carbonization, occurs when soft tissues are preserved as thinfilms of carbon. ■【B】Leaves and tissue of soft-bodied organisms such as jellyfish or worms may accumulate, become buried and compressed, and lose their vola tile constituents. ■【C】The carbon often remains behind as a blackened silhouette.■【D】14. Directions: An introductory sentence for a brief summary of the passage is provided below. Complete the summary by selecting the THREE answer choices that express the most important ideas in the passage. Some answer choices do not belong in the summary because they express ideas that are not presented in the passage or are minor ideas in the passage. This question is worth 2 points. The remains of ancient life are amazingly well preserved in the form of fossils.A.Environmental characteristics like those present on ocean floors increase the likelihood that plant and animal fossils will occur.B.Fossils are more likely to be preserved in shale deposits than in deposits of clay and silt.C.The shells of organisms can be preserved by processes of chemical precipitation or mineral exchange.D.Freezing enables the soft parts of organisms to survive longer than the hard parts.paratively few fossils are found in the terrestrial deposits of streams and lakes.F.Thin films of carbon may remain as an indication of soft tissue or actual tissue may be preserved if exposure to bacteria is limited.托福阅读答案1.agency代理,中介,作用,所以答案是force,选C。

consistency regularization 出处 -回复

consistency regularization 出处 -回复

consistency regularization 出处-回复Consistency Regularization: An Overview and ApplicationsIntroductionConsistency regularization has emerged as a powerful technique in machine learning, specifically in the field of deep learning. It aims to improve the generalization and robustness of models by encouraging consistency in their predictions. This regularization technique has found applications in various domains, including image classification, natural language processing, and speech recognition. In this article, we will provide an overview of consistency regularization, discuss its theoretical foundations, and explore its applications in different areas.Theoretical FoundationsConsistency regularization is rooted in the principle of encouraging smoothness and stability in model predictions. The underlying assumption is that small changes in the input should not significantly alter the output of a well-trained model. This principle is particularly relevant in scenarios where the training data maycontain noisy or ambiguous samples.One of the commonly used methods for achieving consistency regularization is known as consistency training. In this approach, two different input transformations are applied to the same sample, creating two augmented versions. The model is then trained to produce consistent predictions for the transformed samples. Intuitively, this process encourages the model to focus on the underlying patterns in the data rather than being influenced by specific input variations.Consistency regularization can be formulated using several loss functions. One popular choice is the mean squared error (MSE) loss, which measures the discrepancy between predictions of the original input and transformed versions. Other approaches include cross-entropy loss and Kullback-Leibler divergence.Applications in Image ClassificationConsistency regularization has yielded promising results in image classification tasks. One notable application is semi-supervised learning, where the goal is to leverage a small amount of labeleddata with a larger set of unlabeled data. By applying consistent predictions to both labeled and unlabeled data, models can effectively learn from the unlabeled data and improve their performance on the labeled data. This approach has been shown to outperform traditional supervised learning methods in scenarios with limited labeled samples.Additionally, consistency regularization has been explored in the context of adversarial attacks. Adversarial attacks attempt to fool a model by introducing subtle perturbations to the input data. By training models with consistent predictions for both original and perturbed inputs, their robustness against such attacks can be significantly improved.Applications in Natural Language ProcessingConsistency regularization has also demonstrated promising results in natural language processing (NLP) tasks. In NLP, models often face the challenge of understanding and generating coherent sentences. By applying consistency regularization, models can be trained to produce consistent predictions for different representations of the same text. This encourages the model tofocus on the meaning and semantics of the text rather than being influenced by superficial variations, such as different word order or sentence structure.Furthermore, consistency regularization can be used in machine translation tasks, where the goal is to translate text from one language to another. By enforcing consistency between translations of the same source text, models can generate more accurate and consistent translations.Applications in Speech RecognitionSpeech recognition is another domain where consistency regularization has found applications. One of the key challenges in speech recognition is handling variations in pronunciation and speaking styles. By training models with consistent predictions for different acoustic representations of the same speech utterance, models can better capture the underlying patterns and improve their accuracy in recognizing speech in different conditions. This can lead to more robust and reliable speech recognition systems in real-world scenarios.ConclusionConsistency regularization has emerged as an effective technique for improving the generalization and robustness of models in various machine learning tasks. By encouraging consistency in predictions, models can better learn the underlying patterns in the data and generalize well to unseen examples. This regularization technique has been successfully applied in image classification, natural language processing, and speech recognition tasks, among others. As research in consistency regularization continues to advance, we can expect further developments and applications in the future.。

高二英语区块链技术单选题50题

高二英语区块链技术单选题50题

高二英语区块链技术单选题50题1. The ______ of blockchain technology has brought significant changes to the financial industry.A. introductionB. productionC. conclusionD. decision答案:A。

本题考查名词的词义辨析。

“introduction”意为“引入,引进”;“production”意为“生产”;“conclusion”意为“结论”;“decision”意为“决定”。

区块链技术是被引入到金融行业,带来了重大变化,所以选择A 选项。

2. The company is trying to ______ a new blockchain-based system to improve its business processes.A. developB. destroyC. deliverD. decline答案:A。

本题考查动词的词义辨析。

“develop”意为“开发,发展”;“destroy”意为“破坏”;“deliver”意为“交付,投递”;“decline”意为“下降,拒绝”。

公司是要开发新的基于区块链的系统来改进业务流程,所以选A 选项。

3. The blockchain technology is highly ______ and secure.A. efficientB. expensiveC. exhaustedD. extensive答案:A。

本题考查形容词的词义辨析。

“efficient”意为“高效的”;“expensive”意为“昂贵的”;“exhausted”意为“精疲力竭的”;“extensive”意为“广泛的”。

区块链技术是高效且安全的,所以选A 选项。

4. We need to ______ the advantages of blockchain technology to solve this problem.A. utilizeB. uniteC. updateD. upset答案:A。

科技英语翻译1

科技英语翻译1
驱动这些机器的动力装置是一台50马力的感应电动机。
► 2)通顺易懂 ► 译文的语言符合译语语法结构及表达习惯,容易为读者所理解和接受。
► A. When a person sees, smells, hears or touches something, then he is perceiving.
2. Cramped(狭窄的) conditions means that passengers’ legs cannot move around freely.
空间狭窄,旅客的两腿就不能自由活动。
3. All bodies are known to possess weight and occupy space.
忠实、通顺(普遍观点)
► 科技英语文章特点:(well-knit structure;tight logic;various styles)结构严谨,逻辑严密,文体多样
1. 科技翻译的标准:准确规范,通顺易懂,简洁明晰 1)准确规范
所谓准确,就是忠实地,不折不扣地传达原文的全部信息内容。 所谓规范,就是译文要符合所涉及的科学技或某个专业领域的专业语言表
实验结果等,而不是介绍这是这些结果,理论或现象是由谁发 明或发现的。
► In this section, a process description and a simplified process flowsheet are given for each DR process to illustrate the types of equipment used and to describe the flow of materials through the plant. The discussion does not mention all the variations of the flowsheet which may exist or the current status of particular plants. In the majority of the DR processes described in this section, natural gas is reformed in a catalyst bed with steam or gaseous reduction products from the reduction reactor. Partial oxidation processes which gasify liquid hydrocarbons, heavy residuals and coal are also discussed. The reformer and partial oxidation gasifier are interchangeable for several of the DR processes.

Modern Application of mooc课后章节答案期末考试题库2023年

Modern Application of mooc课后章节答案期末考试题库2023年

Modern Application of Optoelectronic Technology_南京邮电大学中国大学mooc课后章节答案期末考试题库2023年1.Reconstructive spectrometer is based on compressive sensing theory.参考答案:正确2.Photoconductive detector gain depends on the difference of electron andhole drift speed参考答案:正确3.As tandem structure can increase solar cell efficiency, so we can add as manycells as possible to increase the overall absorption and energy conversionefficiency.参考答案:错误4.The solar cell performance can be degraded by参考答案:Series resistance_Defects in semiconductors_Shunt resistance5.The optical transition in silicon devices is usually indirect参考答案:正确6.Write the bandgap (300k) of silicon _______ eV.参考答案:1.117.The commercial solar cell panels are still dominated by silicon photovoltaics.参考答案:正确D means __________________________参考答案:charge coupled device9._____________________are the study and application of _________________ devices andsystems that source, detect and control ______________.参考答案:Optoelectronics, electronic, photon##%_YZPRLFH_%##Optoelectronics, electronic, light10.Which of the following factors affect the LED output spectrum?参考答案:Operation temperature_Semiconductor bandgap_Dopingconcentration_Applied voltage/current11.Conventional spectrometers used in laboratories are参考答案:Based on dispersive optics_High resolution12.Some typical research results show that graphene hybrid photodetectors can参考答案:Cover a wide detection bandwidth from UV to MIR._Have highresponsivity_Use both planar and vertical heterostructures._Have high detectivity13.The equation to express photoelastic effect is【图片】, which means therefractive index changes with strain参考答案:正确14.What are the four typical layers of optical fibers?____________,___________,____________,_____________.参考答案:core, cladding, protective polymeric coating, buffer tube15.Second harmonic generation happens when an intense light beam offrequency ω passing through an appropriate crystal (e.g., quartz) generates a light beam of half the frequency, 1/2ω参考答案:错误16.The two regimes in acousto-optic modulators are Raman-Nath regimeand___________参考答案:Bragg regime17.Optically anisotropic crystals are called __________ because an incident lightbeam may be doubly refracted. There is also a special direction in abirefringent crystal, called the optic axis.参考答案:birefringent18._____________ is the rotation of the plane of polarization by a substance参考答案:optical activity19.What efficiency is typical of a commercial PERC solar panel?参考答案:20%20.The advantages of perovskite materials include参考答案:High quantum yields_Low-cost_High quantum yields21.Typical optoelectronic process includes参考答案:Light transmission_Light modulation_Light detection_Light generation22.The two operation principles of photonic crystal fibers are ___________________and _____________________.参考答案:total internal reflection, photonic bandgap23.The propagation modes in waveguide can be classified in terms of____________________(TE) mode and ____________________(TM) mode?参考答案:transverse electric field, transverse magnetic field24.Kerr effect can be used to induce birefringence参考答案:正确25.The lattice constant of AlGaAs alloy follows nonlinear mixing rule参考答案:错误26.Which of the following is not a challenge for 2D semiconductor technology?参考答案:Materials choice27.In the space charge region, a high doping concentration results a shortdepletion width参考答案:正确28.CMOS means __________________________参考答案:complementary metal oxide semiconductor29.Photodetectors convert ___________________ to an electrical signal such asa____________________.参考答案:light, voltage or current##%_YZPRLFH_%##photon, voltage or current。

复旦大学考博英语模拟试卷15(题后含答案及解析)

复旦大学考博英语模拟试卷15(题后含答案及解析)

复旦大学考博英语模拟试卷15(题后含答案及解析)题型有:1. Structure and V ocabulary 2. Reading Comprehension 3. Cloze 4. Chinese-English Translation 5. WritingStructure and V ocabulary1.Many pure metals have little use because they are too soft, rust too easily, or have some other_____.A.bruisesB.blundersC.handicapsD.drawbacks正确答案:D解析:空格意思是:很多纯金属因为太软,易生锈,或有其他的缺陷而无法使用。

各项的意思是:bruises“瘀伤,擦伤”;blunders“大错,失误”;handicaps “妨碍,使不利,阻碍”;drawbacks“缺点,障碍”。

2.Some studies confirmed that this kind of eye disease was_____in tropic countries.A.prospectiveB.prevalentC.provocativeD.perpetual正确答案:B解析:空格意思是:一些研究证实,在热带国家这种眼疾很普遍。

各项的意思是:prospective“预期的”;prevalent“普遍的,流行”;provocative“煽动的,挑衅的”;perpetual“永久的,不断的”。

3.After several nuclear disasters, a_____has raged over the safety of nuclear energy.A.quarrelB.suspicionC.verdictD.controversy正确答案:D解析:空格意思是:经过多次核灾难后,展开了一场关于核能源安全性的辩论。

SCI写作句型汇总

SCI写作句型汇总

S C I论文写作中一些常用的句型总结(一)很多文献已经讨论过了一、在Introduction里面经常会使用到的一个句子:很多文献已经讨论过了。

它的可能的说法有很多很多,这里列举几种我很久以前搜集的:A.??Solar energy conversion by photoelectrochemical cells?has been intensively investigated.?(Nature 1991, 353, 737 - 740?)B.?This was demonstrated in a number of studies that?showed that composite plasmonic-metal/semiconductor photocatalysts achieved significantly higher rates in various photocatalytic reactions compared with their pure semiconductor counterparts.C.?Several excellent reviews describing?these applications are available, and we do not discuss these topicsD.?Much work so far has focused on?wide band gap semiconductors for water splitting for the sake of chemical stability.(DOI:10.1038/NMAT3151)E.?Recent developments of?Lewis acids and water-soluble organometalliccatalysts?have attracted much attention.(Chem. Rev. 2002, 102, 3641?3666)F.?An interesting approach?in the use of zeolite as a water-tolerant solid acid?was described by?Ogawa et al(Chem.Rev. 2002, 102, 3641?3666)G.?Considerable research efforts have been devoted to?the direct transition metal-catalyzed conversion of aryl halides toaryl nitriles. (J. Org. Chem. 2000, 65, 7984-7989) H.?There are many excellent reviews in the literature dealing with the basic concepts of?the photocatalytic processand the reader is referred in particular to those by Hoffmann and coworkers,Mills and coworkers, and Kamat.(Metal oxide catalysis,19,P755)I. Nishimiya and Tsutsumi?have reported on(proposed)the influence of the Si/Al ratio of various zeolites on the acid strength, which were estimated by calorimetry using ammonia. (Chem.Rev. 2002, 102, 3641?3666)二、在results and discussion中经常会用到的:如图所示A. GIXRD patterns in?Figure 1A show?the bulk structural information on as-deposited films.?B.?As shown in Figure 7B,?the steady-state current density decreases after cycling between 0.35 and 0.7 V, which is probably due to the dissolution of FeOx.?C.?As can be seen from?parts a and b of Figure 7, the reaction cycles start with the thermodynamically most favorable VOx structures(J. Phys. Chem. C 2014, 118, 24950?24958)这与XX能够相互印证:A.?This is supported by?the appearance in the Ni-doped compounds of an ultraviolet–visible absorption band at 420–520nm (see Fig. 3 inset), corresponding to an energy range of about 2.9 to 2.3 eV.B. ?This?is consistent with the observation from?SEM–EDS. (Z.Zou et al. / Chemical Physics Letters 332 (2000) 271–277)C.?This indicates a good agreement between?the observed and calculated intensities in monoclinic with space groupP2/c when the O atoms are included in the model.D. The results?are in good consistent with?the observed photocatalytic activity...E. Identical conclusions were obtained in studies?where the SPR intensity and wavelength were modulated by manipulating the composition, shape,or size of plasmonic nanostructures.?F.??It was also found that areas of persistent divergent surfaceflow?coincide?with?regions where convection appears to be consistently suppressed even when SSTs are above 27.5°C.(二)1. 值得注意的是...A.?It must also be mentioned that?the recycling of aqueous organic solvent is less desirable than that of pure organic liquid.B.?Another interesting finding is that?zeolites with 10-membered ring pores showed high selectivities (>99%) to cyclohexanol, whereas those with 12-membered ring pores, such as mordenite, produced large amounts of dicyclohexyl ether. (Chem. Rev. 2002, 102,3641?3666)C.?It should be pointed out that?the nanometer-scale distribution of electrocatalyst centers on the electrode surface is also a predominant factor for high ORR electrocatalytic activity.D.?Notably,?the Ru II and Rh I complexes possessing the same BINAP chirality form antipodal amino acids as the predominant products.?(Angew. Chem. Int. Ed., 2002, 41: 2008–2022)E. Given the multitude of various transformations published,?it is noteworthy that?only very few distinct?activation?methods have been identified.?(Chem. Soc. Rev., 2009,?38, 2178-2189)F.?It is important to highlight that?these two directing effects will lead to different enantiomers of the products even if both the “H-bond-catalyst” and the?catalyst?acting by steric shielding have the same absolute stereochemistry. (Chem. Soc. Rev.,?2009,?38, 2178-2189)G.?It is worthwhile mentioning that?these PPNDs can be very stable for several months without the observations of any floating or precipitated dots, which is attributed to the electrostatic repulsions between the positively charge PPNDs resulting in electrosteric stabilization.(Adv. Mater., 2012, 24: 2037–2041)2.?...仍然是个挑战A.?There is thereby an urgent need but it is still a significant challenge to?rationally design and delicately tail or the electroactive MTMOs for advanced LIBs, ECs, MOBs, and FCs.?(Angew. Chem. Int. Ed.2 014, 53, 1488 – 1504)B.?However, systems that are?sufficiently stable and efficient for practical use?have not yet been realized.C.??It?remains?challenging?to?develop highly active HER catalysts based on materials that are more abundant at lower costs. (J. Am. Chem.Soc.,?2011,?133, ?7296–7299)D.?One of the?great?challenges?in the twenty-first century?is?unquestionably energy storage. (Nature Materials?2005, 4, 366 - 377?)众所周知A.?It is well established (accepted) / It is known to all / It is commonlyknown?that?many characteristics of functional materials, such as composition, crystalline phase, structural and morphological features, and the sur-/interface properties between the electrode and electrolyte, would greatly influence the performance of these unique MTMOs in electrochemical energy storage/conversion applications.(Angew. Chem. Int. Ed.2014,53, 1488 – 1504)B.?It is generally accepted (believed) that?for a-Fe2O3-based sensors the change in resistance is mainly caused by the adsorption and desorption of gases on the surface of the sensor structure. (Adv. Mater. 2005, 17, 582)C.?As we all know,?soybean abounds with carbon,?nitrogen?and oxygen elements owing to the existence of sugar,?proteins?and?lipids. (Chem. Commun., 2012,?48, 9367-9369)D.?There is no denying that?their presence may mediate spin moments to align parallel without acting alone to show d0-FM. (Nanoscale, 2013,?5, 3918-3930)(三)1. 正如下文将提到的...A.?As will be described below(也可以是As we shall see below),?as the Si/Al ratio increases, the surface of the zeolite becomes more hydrophobic and possesses stronger affinity for ethyl acetate and the number of acid sites decreases.(Chem. Rev. 2002, 102, 3641?3666)B. This behavior is to be expected and?will?be?further?discussed?below. (J. Am. Chem. Soc.,?1955,?77, 3701–3707)C.?There are also some small deviations with respect to the flow direction,?whichwe?will?discuss?below.(Science, 2001, 291, 630-633)D.?Below,?we?will?see?what this implies.E.?Complete details of this case?will?be provided at a?later?time.E.?很多论文中,也经常直接用see below来表示,比如:The observation of nanocluster spheres at the ends of the nanowires is suggestive of a VLS growth process (see?below). (Science, 1998, ?279, 208-211)2. 这与XX能够相互印证...A.?This is supported by?the appearance in the Ni-doped compounds of an ultraviolet–visible absorption band at 420–520 nm (see Fig. 3 inset), corresponding to an energy range of about 2.9 to 2.3 eVB.This is consistent with the observation from?SEM–EDS. (Chem. Phys. Lett. 2000, 332, 271–277)C.?Identical conclusions were obtained?in studies where the SPR intensity and wavelength were modulated by manipulating the composition, shape, or size of plasmonic nanostructures.?(Nat. Mater. 2011, DOI: 10.1038/NMAT3151)D. In addition, the shape of the titration curve versus the PPi/1 ratio,?coinciding withthat?obtained by fluorescent titration studies, suggested that both 2:1 and 1:1 host-to-guest complexes are formed. (J. Am. Chem. Soc. 1999, 121, 9463-9464)E.?This unusual luminescence behavior is?in accord with?a recent theoretical prediction; MoS2, an indirect bandgap material in its bulk form, becomes a direct bandgapsemiconductor when thinned to a monolayer.?(Nano Lett.,?2010,?10, 1271–1275)3.?我们的研究可能在哪些方面得到应用A.?Our ?ndings suggest that?the use of solar energy for photocatalytic watersplitting?might provide a viable source for?‘clean’ hydrogen fuel, once the catalyticef?ciency of the semiconductor system has been improved by increasing its surface area and suitable modi?cations of the surface sites.B. Along with this green and cost-effective protocol of synthesis,?we expect that?these novel carbon nanodots?have potential applications in?bioimaging andelectrocatalysis.(Chem. Commun., 2012,?48, 9367-9369)C.?This system could potentially be applied as?the gain medium of solid-state organic-based lasers or as a component of high value photovoltaic (PV) materials, where destructive high energy UV radiation would be converted to useful low energy NIR radiation. (Chem. Soc. Rev., 2013,?42, 29-43)D.?Since the use of?graphene?may enhance the photocatalytic properties of TiO2?under UV and visible-light irradiation,?graphene–TiO2?composites?may potentially be usedto?enhance the bactericidal activity.?(Chem. Soc. Rev., 2012,?41, 782-796)E.??It is the first report that CQDs are both amino-functionalized and highly fluorescent,?which suggests their promising applications in?chemical sensing.(Carbon, 2012,?50,?2810–2815)(四)1. 什么东西还尚未发现/系统研究A. However,systems that are sufficiently stable and efficient for practical use?have not yet been realized.B. Nevertheless,for conventional nanostructured MTMOs as mentioned above,?some problematic disadvantages cannot be overlooked.(Angew. Chem. Int. Ed.2014,53, 1488 – 1504)C.?There are relatively few studies devoted to?determination of cmc values for block copolymer micelles. (Macromolecules 1991, 24, 1033-1040)D. This might be the reason why, despite of the great influence of the preparation on the catalytic activity of gold catalysts,?no systematic study concerning?the synthesis conditions?has been published yet.?(Applied Catalysis A: General2002, 226, ?1–13)E.?These possibilities remain to be?explored.F.??Further effort is required to?understand and better control the parameters dominating the particle surface passivation and resulting properties for carbon dots of brighter photoluminescence. (J. Am. Chem. Soc.,?2006,?128?, 7756–7757)2.?由于/因为...A.?Liquid ammonia?is particularly attractive as?an alternative to water?due to?its stability in the presence of strong reducing agents such as alkali metals that are used to access lower oxidation states.B.?The unique nature of?the cyanide ligand?results from?its ability to act both as a σdonor and a π acceptor combined with its negativecharge and ambidentate nature.C.?Qdots are also excellent probes for two-photon confocalmicroscopy?because?they are characterized by a very large absorption cross section?(Science ?2005,?307, 538-544).D.?As a result of?the reductive strategy we used and of the strong bonding between the surface and the aryl groups, low residual currents (similar to those observed at a bare electrode) were obtained over a large window of potentials, the same as for the unmodified parent GC electrode. (J. Am. Chem. Soc. 1992, 114, 5883-5884)E.?The small Tafel slope of the defect-rich MoS2 ultrathin nanosheets is advantageous for practical?applications,?since?it will lead to a faster increment of HER rate with increasing overpotential.(Adv. Mater., 2013, 25: 5807–5813)F. Fluorescent carbon-based materials have drawn increasing attention in recent years?owing to?exceptional advantages such as high optical absorptivity, chemical stability, biocompatibility, and low toxicity.(Angew. Chem. Int. Ed., 2013, 52: 3953–3957)G.??On the basis of?measurements of the heat of immersion of water on zeolites, Tsutsumi etal. claimed that the surface consists of siloxane bondings and is hydrophobicin the region of low Al content. (Chem. Rev. 2002, 102, 3641?3666)H.?Nanoparticle spatial distributions might have a large significance for catalyst stability,?given that?metal particle growth is a relevant deactivation mechanism for commercial catalysts.?3. ...很重要A.?The inhibition of additional nucleation during growth, in other words, the complete separation?of nucleation and growth,?is?critical(essential, important)?for?the successful synthesis of monodisperse nanocrystals. (Nature Materials?3, 891 - 895 (2004))B.??In the current study,?Cys,?homocysteine?(Hcy) and?glutathione?(GSH) were chosen as model?thiol?compounds since they?play important (significant, vital, critical) roles?in many biological processes and monitoring of these?thiol?compounds?is of great importance for?diagnosis of diseases.(Chem. Commun., 2012,?48, 1147-1149)C.?This is because according to nucleation theory,?what really matters?in addition to the change in temperature ΔT?(or supersaturation) is the cooling rate.(Chem. Soc. Rev., 2014,?43, 2013-2026)(五)1. 相反/不同于A.?On the contrary,?mononuclear complexes, called single-ion magnets (SIM), have shown hysteresis loops of butterfly/phonon bottleneck type, with negligiblecoercivity, and therefore with much shorter relaxation times of magnetization. (Angew. Chem. Int. Ed., 2014, 53: 4413–4417)B.?In contrast,?the Dy compound has significantly larger value of the transversal magnetic moment already in the ground state (ca. 10?1?μB), therefore allowing a fast QTM. (Angew. Chem. Int. Ed., 2014, 53: 4413–4417)C.?In contrast to?the structural similarity of these complexes, their magnetic behavior exhibits strong divergence.?(Angew. Chem. Int. Ed., 2014, 53: 4413–4417)D.?Contrary to?other conducting polymer semiconductors, carbon nitride ischemically and thermally stable and does not rely on complicated device manufacturing. (Nature materials, 2009, 8(1): 76-80.)E.?Unlike?the spherical particles they are derived from that Rayleigh light-scatter in the blue, these nanoprisms exhibit scattering in the red, which could be useful in developing multicolor diagnostic labels on the basis not only of nanoparticle composition and size but also of shape. (Science 2001,? 294, 1901-1903)2. 发现,阐明,报道,证实可供选择的词包括:verify, confirm, elucidate, identify, define, characterize, clarify, establish, ascertain, explain, observe, illuminate, illustrate,demonstrate, show, indicate, exhibit, presented, reveal, display, manifest,suggest, propose, estimate, prove, imply, disclose,report, describe,facilitate the identification of?举例:A. These stacks appear as nanorods in the two-dimensional TEM images, but tilting experiments?confirm that they are nanoprisms.?(Science 2001,? 294, 1901-1903)B. Note that TEM?shows?that about 20% of the nanoprisms are truncated.?(Science 2001,? 294, 1901-1903)C. Therefore, these calculations not only allow us to?identify?the important features in the spectrum of the nanoprisms but also the subtle relation between particle shape and the frequency of the bands that make up their spectra.?(Science 2001,? 294, 1901-1903)D. We?observed?a decrease in intensity of the characteristic surface plasmon band in the ultraviolet-visible (UV-Vis) spectroscopy for the spherical particles at λmax?= 400 nm with a concomitant growth of three new bands of λmax?= 335 (weak), 470 (medium), and 670 nm (strong), respectively. (Science 2001,? 294, 1901-1903)E. In this article, we present data?demonstrating?that opiate and nonopiate analgesia systems can be selectively activated by different environmental manipulationsand?describe?the neural circuitry involved. (Science 1982, 216, 1185-1192)F. This?suggests?that the cobalt in CoP has a partial positive charge (δ+), while the phosphorus has a partial negative charge (δ?),?implying?a transfer of electron density from Co to P.?(Angew. Chem., 2014, 126: 6828–6832)3. 如何指出当前研究的不足A. Although these inorganic substructures can exhibit a high density of functional groups, such as bridging OH groups, and the substructures contribute significantly to the adsorption properties of the material,surprisingly little attention has been devoted to?the post-synthetic functionalization of the inorganic units within MOFs. (Chem. Eur. J., 2013, 19: 5533–5536.)B.?Little is known,?however, about the microstructure of this material. (Nature Materials 2013,12, 554–561)C.?So far, very little information is available, and only in?the absorber film, not in the whole operational devices. (Nano Lett.,?2014,?14?(2), pp 888–893)D.?In fact it should be noted that very little optimisation work has been carried out on?these devices. (Chem. Commun., 2013,?49, 7893-7895)E. By far the most architectures have been prepared using a solution processed perovskite material,?yet a few examples have been reported that?have used an evaporated perovskite layer. (Adv. Mater., 2014, 27: 1837–1841.)F. Water balance issues have been effectively addressed in PEMFC technology through a large body of work encompassing imaging, detailed water content and water balance measurements, materials optimization and modeling,?but very few of these activities have been undertaken for?anion exchange membrane fuel cells,? primarily due to limited materials availability and device lifetime. (J. Polym. Sci. Part B: Polym. Phys., 2013, 51: 1727–1735)G. However,?none of these studies?tested for Th17 memory, a recently identified T cell that specializes in controlling extracellular bacterial infections at mucosal surfaces. (PNAS, 2013,?111, 787–792)H. However,?uncertainty still remains as to?the mechanism by which Li salt addition results in an extension of the cathodic reduction limit. (Energy Environ. Sci., 2014,?7, 232-250)I.?There have been a number of high profile cases where failure to?identify the most stable crystal form of a drug has led to severe formulation problems in manufacture. (Chem. Soc. Rev., 2014,?43, 2080-2088)J. However,?these measurements systematically underestimate?the amount of ordered material. ( Nature Materials 2013, 12, 1038–1044)(六)1.?取决于a.?This is an important distinction, as the overall activity of a catalyst will?depend on?the material properties, synthesis method, and other possible species that can be formed during activation.?(Nat. Mater.?2017,16,225–229)b.?This quantitative partitioning?was determined by?growing crystals of the 1:1 host–guest complex between?ExBox4+?and corannulene. (Nat. Chem.?2014,?6177–178)c.?They suggested that the Au particle size may?be the decisive factor for?achieving highly active Au catalysts.(Acc. Chem. Res.,?2014,?47, 740–749)d.?Low-valent late transition-metal catalysis has?become indispensable to?chemical synthesis, but homogeneous high-valent transition-metal catalysis is underdeveloped, mainly owing to the reactivity of high-valent transition-metal complexes and the challenges associated with synthesizing them.?(Nature2015,?517,449–454)e.?The polar effect?is a remarkable property that enables?considerably endergonic C–H abstractions?that would not be possible otherwise.?(Nature?2015, 525, 87–90)f.?Advances in heterogeneous catalysis?must rely on?the rational design of new catalysts. (Nat. Nanotechnol.?2017, 12, 100–101)g.?Likely, the origin of the chemoselectivity may?be also closely related to?the H?bonding with the N or O?atom of the nitroso moiety, a similar H-bonding effect is known in enamine-based nitroso chemistry. (Angew. Chem. Int. Ed.?2014, 53: 4149–4153)2.?有很大潜力a.?The quest for new methodologies to assemble complex organic molecules?continues to be a great impetus to?research efforts to discover or to optimize new catalytic transformations. (Nat. Chem.?2015,?7, 477–482)b.?Nanosized faujasite (FAU) crystals?have great potential as?catalysts or adsorbents to more efficiently process present and forthcoming synthetic and renewablefeedstocks in oil refining, petrochemistry and fine chemistry. (Nat. Mater.?2015, 14, 447–451)c.?For this purpose, vibrational spectroscopy?has proved promising?and very useful.?(Acc Chem Res. 2015, 48, 407–413.)d.?While a detailed mechanism remains to be elucidated and?there is room for improvement?in the yields and selectivities, it should be remarked that chirality transfer upon trifluoromethylation of enantioenriched allylsilanes was shown. (Top Catal.?2014,?57: 967.?)e.?The future looks bright for?the use of PGMs as catalysts, both on laboratory and industrial scales, because the preparation of most kinds of single-atom metal catalyst is likely to be straightforward, and because characterization of such catalysts has become easier with the advent of techniques that readily discriminate single atoms from small clusters and nanoparticles. (Nature?2015, 525, 325–326)f.?The unique mesostructure of the 3D-dendritic MSNSs with mesopore channels of short length and large diameter?is supposed to be the key role in?immobilization of active and robust heterogeneous catalysts, and?it would have more hopeful prospects in?catalytic applications. (ACS Appl. Mater. Interfaces,?2015,?7, 17450–17459)g.?Visible-light photoredox catalysis?offers exciting opportunities to?achieve challenging carbon–carbon bond formations under mild and ecologically benign conditions. (Acc. Chem. Res.,?2016, 49, 1990–1996)3. 因此同义词:Therefore, thus, consequently, hence, accordingly, so, as a result这一条比较简单,这里主要讲一下这些词的副词词性和灵活运用。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

On Resiliency to Compromised Nodes:A Casefor Location Based Security in Sensor NetworksHao Yang,Fan Ye,Jerry Cheng,Haiyun Luo,Songwu Lu,Lixia ZhangTechnical Report,TR040025Computer Science Department,UCLAE-mails:{hyang,yefan,chengje,hluo,slu,lixia}@AbstractNode compromise poses severe security threats in sensor networks.Unfortunately,existing security designs can address only a small,fixedthreshold of compromised nodes;the security protection completely breaksdown when the threshold is exceeded.This paper studies how to achieveresiliency against an increasing number of compromised nodes.To thisend,we propose a novel location-based approach where the secret keys arebound to geographic locations,and each node stores a few keys based onits own location.The location-binding property constrains the purposesfor which individual keys can be used,and decouples the keys bound to dif-ferent locations,thus limiting the damages caused by a group of compro-mised nodes.We illustrate this approach through the problem of reportfabrication attacks,where compromised nodes forge non-existent events.We evaluate our approach through extensive analysis,implementation,and simulations,and demonstrate its graceful performance degradationwhen more and more nodes are compromised.1IntroductionWireless sensor networks are ideal candidates to monitor the environment and enable a variety of applications such as military surveillance,forestfire monitor-ing,etc.In such a network,a large number of sensor nodes are deployed over a remote terrain to detect events of interest(e.g.,enemy vehicles,forestfires),and deliver data reports over multihop paths to the user.Security is essential for these mission-critical applications working in an adverse or hostile environment.One severe security threat in sensor networks is node compromise.Sen-sor nodes are typically unattended and subject to security compromise,upon which the adversary can obtain the secret keys stored in the nodes,and usethe compromised nodes to launch insider attacks.This threat is aggravated asthe adversary compromises more nodes and secret keys.Unfortunately,most existing security designs[32,28,4]exhibit a threshold behavior:The design is secure against t or less compromised nodes,but completely breaks down when1more than t nodes are compromised,where t is afixed threshold.In reality, however,there is little constrait that prevents the attacker from compromising more than the threshold number of nodes.In this work,our goal is to overcome the threshold limitation and achieve graceful performance degradation to an increasing number of compromised nodes.To this end,we exploit the static and location-aware nature of sen-sor nodes,and propose a novel approach of location-based security through two techniques:location-binding keys and location-based key assignment.In this approach,we bind secret keys to geographic locations,as opposed to sensor nodes,and assign such location-binding keys to nodes based on their locations. We illustrate these concepts in the context of report fabrication attacks,where compromised nodes forge non-existent events that cause both false alarms and network resource waste(more details in Section2).Our design,a Location-Based Lie Detector(LBLD),demonstrates that such a location-based approach can effectively limit the damage caused by a group of compromised nodes.In LBLD,the terrain is divided into a regular geographic grid,and each cell on the grid is associated with multiple keys.Based on its location,a node stores one key for each of its local neighboring cells and a few randomly chosen remote cells.To limit the damage of false alarms,we require that a detected event be endorsed through keys bound to the specific location of the event.An attacker compromising multiple nodes may obtain keys bound to different cells,but he cannot combine such keys to fabricate any events without being detected.To limit the damage of resource waste,each node uses its keys of remote cells to verify and drop forged reports passing through it.Our location-based security design is highly resilient to compromised nodes for three reasons.First,it prevents the attacker from arbitrarily abusing a com-promised key,because a key bound to a geographic location can only be used for purposes related to that particular location(e.g.,to endorse events detected there).Second,it constraints the damage when the attacker compromises mul-tiple nodes and accumulates their keys,because a collection of keys bound to different locations cannot be used together for any meaningful purpose.Finally, it limits the keys stored by individual nodes.because each node is randomly as-signed only a few keys based on its location.As a result,the security protection offered by our design degrades gracefully,without any threshold break-down, when more and more nodes are compromised.We have evaluated our design through extensive analysis,implementation, and simulations.The results shows that LBLD is resilient,efficient and scalable. For example,in a network of4,000nodes with each node storing less than8 keys,LBLD can drop fabricated reports after4.2hops on average.When the adversary have compromised100nodes scattered in the network,LBLD can still prevent false alarms in99%of thefield.1.1Related WorkKey management is a fundamental problem in large-scale,resource-limited sen-sor networks.Several pairwise key establishment schemes[4,7,8,9,14,31]have2been proposed to enable mutual authentication between sensor nodes.However, these designs use node-based keys and do not handle insider attacks such as re-port fabrication,because the compromised nodes possess the required keying material to authenticate its messages.Our design differs from them in both the nature and the usage of secret keys.SEF[28]and Hop-by-Hop Authentication[32]provide limited defense against report fabrication attacks through key space partitioning and interleaved au-thentication,respectively.However,both schemes completely lose their security protection when the number of compromised nodes exceeds afixed threshold. In contrast,LBLD eliminates such threshold behavior and achieves graceful performance degradation against an increasing number of compromised nodes.Numerous security solutions have been proposed to address different prob-lems in sensor network,to name a few,secure broadcast[16],secure routing [12],secure in-network processing[17,5],and DoS countermeasures[24].Our design is complementary to the literature in securing the protocol stack in sensor networks.A few recent security designs also involve geographic locations.Echo[19] uses an on-site verifier with ultrasound transceiver to verify a location claim. TRANS[22]monitors the node behavior and bypass the areas of misbehaving nodes in a routing protocol.A location-aware deployment model is used in[7] to establish pairwise keys between nearby nodes.However,to the best of our knowledge,this is thefirst work that exhibits graceful performance degradation and provides resiliency against an increasing number of compromised sensor nodes.1.2OrganizationThe rest of the paper is organized as follows.In Section2we describe our models and assumptions,and highlight the design challenges.We present our location-based security design in details in Section3,and analyze its performance in Section4.We further evaluate our design using implementation and simulations in Section5,and discuss a few design issues in Section6.We conclude the paper in Section7.2BackgroundIn this section,we describe our network,threat models and the problem context, overview an en-routefiltering framework,and highlight the design challenges.2.1Network ModelWe consider a static sensor network that monitors a remote terrain using a large number of sensor nodes.Each node is battery-powered and embedded with limited sensing,computation and wireless communication capabilities.The user queries the network through a data collection unit,called the sink,which can3be a powerful workstation.The nodes detect events of interest in thefield,and deliver data reports over multihop paths to the sink.The sensor deployment is dense to supportfine-grained collaborative sensing and provide robustness against node failures.We assume that a sensor node can obtain its geographic location soon after it is deployed.Sensor localization is required by many applications to determine the locations of the events,and is currently an active researchfield[20,21,30]. We also assume that some form of geographic routing[10,13]is used to deliver the reports to the sink.There are only a small number of static sinks in the network,and their locations are known when the nodes are deployed.Finally, we assume that a rough estimation on the size and shape of the terrain is knowna prior.2.2Threat ModelWe consider an attacker who can compromise multiple nodes in the network, and we do not impose any bound on the number of compromised nodes.The attacker can extract all secret keys,data,and codes stored on a compromised node,and have full control over its actions.The attacker can aggregate the secret keys obtained from multiple nodes,and store these keys back into each node.We term this as collusion among compromised nodes.We assume that the attacker cannot compromise the sink,and it takes him longer time to compromise a node than it takes for a node to bootstrap itself, including obtaining its location and deriving location-binding keys.Given the state-of-art fast localization protocols[10],this can be done in a short period of time because key derivation only requires local computation1.Similar as-sumptions are also adopted in an earlier proposal[31].We also assume that the localization protocol is secure.As a show-case example,we focus on one specific attack,namely report fab-rication attack,in which the compromised nodes inject many fabricated reports on non-existent events into the network.Such forged reports not only cause false alarms that deceit the application into wrong reactions,but also waste network resources(e.g.,energy)along the forwarding paths.Note that the forged events could“appear”not only where nodes are compromised,but also at arbitrary locations because the compromised node can pretend to be“forwarding”the re-ports.We do not consider other attacks such as DoS[24](e.g.,channel jamming, packet dropping)in this work.More security analysis is provided in Section4.2.3En-route FilteringWe adopt a general en-routefiltering framework to defend against event fabrica-tion attacks.The injected bogus reports are dropped en-route as they traverse the network to save network resources,and the eluded ones are rejected at the sink to prevent false alarms.In this framework,each node is assigned severalsymmetric keys.The node uses its keys to endorse its own reports and verify other nodes’reports passing through itself.The sink further verifies any reports that it receives.The en-routefiltering part of our design,as well as SEF[28] and Hop-by-Hop Authentication[32],are all specific instances using different approaches under this framework.2.4ChallengesIn the above framework,there exists a fundamental tradeoffbetween the en-routefiltering power and the resiliency to compromised nodes.Intuitively,to increase thefiltering power,each node should store more keys so that it has larger chances to detect and drop fabricated reports.However,to improve the resiliency,each node should store less keys to minimize the damage of com-promise nodes,which may abuse their keys to endorse bogus reports.How to resolve this conflict and achieve both resiliency and effective en-routefiltering is the primary challenge that our design faces.The characteristics of sensor networks also pose scalability and efficiency challenges on our design.The design should scale well to a large network(e.g., with tens of thousands of sensor nodes),and work well with low-end sensor nodes that have stringent computation and storage limitations.3DesignIn this section,we present the design of a Location-Based Lie Detector(LBLD) that defends against report fabrication attacks.LBLD achieves resiliency to compromised nodes through two novel techniques:location-binding keys and location-based key assignment.As shown in Figure1,we bind multiple keys to each cell on a geographic grid that covers the terrain,and assign these location-binding keys to nodes in a location-based manner.Specifically,each node stores one key for each local cell in its sensing range,which is used to endorse its own reports.In addition,each node also stores one key for each of a few randomly chosen remote cells,which is used to verify the reports passing through it.A legitimate report is endorsed by multiple distinct MACs,jointly generated by the detecting nodes using the keys bound to the event’s cell.The forwarding nodes verify the MACs based on the claimed event location,and probabilisticallyfilter the fabricated reports.The rest of this section will answer the following questions:How are keys bound to locations,and what are their advantages?How are the keys assigned to nodes in a location-based manner?How are the reports generated?How are the fabricated reportsfiltered?3.1Location-Binding KeysIn order to assign keys,we divide the terrain into a virtual,pre-defined geo-graphic square grid.Note that we do not build or maintain any grid infrastruc-5Sensing RangeFigure1:Each square cell on the geographic grid is associated with multiple keys. Each node stores a few local and remote cell keys based on its own location.ture[27]in the network;instead,we only use the grid to delineate cells and bind keys.The square grid is uniquely defined by two parameters:a cell size c and a reference point(X0,Y0).Accordingly,we denote a cell by the location of its center(see Figure1),which is(X i,Y j)such that{X i=X0+i·c,Y j=Y0+j·c;i,j=0,±1,±2,···} We bind L distinct keys to each cell on the grid.The keys of a cell are determined by the cell location(X i,Y j),together with L master secret keys K I s, through a secure one-way function H(·)[23]:K Xi ,Y j,s=H K Is(X i||Y j)(1)where s is an index ranging from1to L,and||denotes concatenation.3.1.1Why Location-binding KeysThe motivation of location-binding keys is to prevent the compromised nodes from abusing their keys.As described later,each report must be endorsed by multiple distinct MACs using keys bound to the claimed event location.To successfully inject a bogus report,the attacker must collect enough keys from a single cell,because a collection of keys from different cells are useless.This is extremely difficult due to the randomized key assignment scheme(Section3.2). More importantly,even when the attacker has collected enough keys from one cell,he can only fabricate reports“appearing”in that particular cell.Such con-straints not only reveal diagnostic information to the sink,but also quarantine the damaged area,in terms of false alarms,in thefield.This is exactly why our design can be highly resilient to node compromise.6In contrast,the traditional node-based keys are not as effective because there is no such constraints on the key usage and accumulation.When a report is required to be endorsed by multiple,say t,nodes,a group of t+1or more compromised nodes can freely collude to inject any reports on bogus events “happening”at arbitrary locations.One may think that a complete map of each node’s location could remedy this problem.However,in a large-scale sensor network,the nodes may not afford the storage overhead of such a map,and the construction and maintenance of this map are also very expensive.We bind keys to cells instead of the locations of individual nodes,so that each node can independently derive,without any message exchange,the keys based on the pre-defined grid structure.The cell size c is an important parameter, which affects both the key storage overhead and the impact of compromised nodes.We will analyze this in Section4.3.1.2Deriving Keys from LocationsWe exploit a short bootstrapping phase to allow a node to derive keys from locations.Before deployment,each node is preloaded with one of the L master secrets,K I s,as well as the grid parameters c and(X0,Y0).Once it is deployed (e.g.,via aerial scattering),itfirst obtains its geographic location through a localization component[30,20].It then uses the location-based key assignment scheme,which we will describe shortly,to pick up a few cells from the grid,and derives one key for each cell using Equation1.This ends the bootstrapping phase,and the node permanently removes the master secret from its memory [31].The key derivation is efficient because it involves only local computation of light-weight one-way functions,without any message exchange.This makes the bootstrapping phase very fast,so that the attacker cannot compromise a node before itfinishes the bootstrapping.Therefore,the attacker never knows the master secrets,and as long as the program loaded in sensor nodes works correctly,a node will not derive additional cell keys.3.2Location-based Key AssignmentThe cell keys that a node derives and stores in the bootstrapping phase are chosen based on its own location.The node stores two types of keys.One type is for the local cells within its sensing range,called sensing cells2.The node determines its sensing cells based on its sensing range R s,cell size c and its location,and derives one key for each sensing cell.These keys will be used to endorse the events the node itself observes.The node also randomly picks up a few remote cells,called verifiable cells,and derives one key for each of them. These keys will be used by the node to verify the reports passing through it.Now we describe which strategy the node should use in selecting its verifiable cells.In the absence of any a priori information,perhaps the best strategy isFigure2:A report is forwarded inside a beam of width b from the source to the sink. Thus each node can estimate its upstream region based on the locations of itself and the sink.to uniformly randomly select them from the grid.However,when the sink is static and geographic routing protocols[10,13]are used to deliver packets,we can adopt more intelligent strategy to allow each node to store less keys,while retaining thefiltering power.Note that such reduction has two-fold benefits. It decreases the key storage overhead yet retains the desirablefiltering power, and more importantly,it improves the system resiliency by limiting the keys exposed to individual nodes.The idea is that if a node can estimate its upstream region,i.e.,those remote cells for which it may potentially forward reports,it only needs to pick up a few verifiable cells from this region.Below we describe how this can be achieved.3.2.1Estimating Upstream RegionWe exploit the properties of geographic routing to estimate the upstream re-gion of a node.Such routing protocols typically forward packets in a greedy manner whenever possible,and use perimeter routing to bypass the“holes”en-countered.The resulted forwarding paths statistically center around a straight line connecting the source to the sink.Therefore,we model the forwarding path using a general beam model.In this model,the possible forward paths form a beam,the width of which is b,connecting from the source to the sink(illustrated in Figure2).The intuition here is to accommodate a“hole”up to a diameter of b in the forwarding path.We will validate this model and discuss its impact in Section5.With the beam model,a node can estimate its upstream region using simple geometry.As illustrated in Figure2,a node A’s upstream region is the shaded8area between the two radiating lines l1and l2,and away from the sink.From geometry we can calculate the spanning angle between l1and l2asbα=2arcsin(3)D maxwhere d is the node’s distance to the sink,and D max is the maximum distance between network edge and the sink.Given that the terrain size and shape are known,D max can be preloaded in the nodes.There are several features in the above random distribution that are worthy mentioning.First,the verifiable cells are chosen in a probabilistic manner.This is because any deterministic scheme could be exploited by the attacker:If he knows which verifiable cell a node selects,he can fool the node by fabricat-ing events in other locations.Second,the probability is decided solely by the node’s location.That is,all cells in the upstream region are considered equally important and chosen with the same probability.This maximizes the worst-case filtering performance.For any non-uniform strategy that gives more chance to some upstream cells and less to others,the attacker can increase his chance of success by fabricating events in the unfavored cells.Finally,the probability increases as the node becomes farther away to the sink.This is because such a node has a smaller upstream region,so it can pick up verifiable cells at a higher probability without exceeding its storage budget.We point out that Equation3is only one possible strategy in selecting ver-ifiable cells;a full exploration is yet to be carried out.However,our evaluation results show that it can indeed provide effectivefiltering,strong resilience,with only moderate overhead.3.3Report GenerationTo be forwarded and accepted,a legitimate report must carry m distinct MACs, generated using keys bound to the event’s cell.Because every node has one key for each of its sensing cells,it can endorse any events itself has observed.When a real event occurs,multiple detecting nodes can jointly generate the required m MACs.9The detecting nodesfirst reach agreement on the event description,including the event’s location,through techniques such as[26,29].After that,each nodeindependently generates a MAC using its own key bound to the event’s cell, and broadcasts a tuple{s,MAC s},where s is the key index(between1and L).Each node also records all such tuples announced by its neighbors,andconstructs a complete report after it has received m distinct MAC tuples.Nodes overhear to avoid duplicate reports.Each node sets a random timer,and thefirst node thatfires the timer sends out thefinal report to the sink. An overhearing node checks the report and updates a counter about how many tuples in its overheard list are sent.If the counter reaches m,it cancels the timer because there are enough MACs in the report.Otherwise,upon timer expiration,it sends out its own report that carries m distinct MAC tuples,with higher priority on the unused ones.Note that a legitimate node participates in report generation only when it has sensed the event by itself.Thus a compromised node cannot deceit its neighbors into endorsing a fabricated report.The number of MACs in a report, m,provides a tradeoffbetween overhead and security strength,which will be evaluated in Section4.3.4En-route and Sink FilteringWhen an intermediate node receives a report,it verifies the report as follows: Itfirst checks whether the report carries m distinct MACs and indexes.It then retrieves the event’s location from the report,and checks whether the event resides in its upstream region.If the event’s cell happens to be its verifiable cell,i.e.,it has a key for that cell,it checks the carried MACs when its own key index appears in the report.It drops the report when any of the above checks fail.Otherwise,it forwards the report as usual.The probabilistic en-routefiltering cannot guarantee to drop all fabricated reports.The sink serves as thefinal guard in verifying and rejecting any eluded ones.Because the sink knows all master secrets,it can derive any cell key.When it receives a report,it retrieves the event’s location,derives the cell keys,and checks how many correct MACs are carried.Note that there might be multiple reports for a same event.The sink decides whether to accept the event based on the total number of correct MACs it has received.If this number reaches m, the event is accepted;otherwise it is rejected.4AnalysisIn this section we analyze the performance of our design.We start with the filtering power of LBLD against single compromised node,then analyze its re-siliency when more and more nodes are compromised.We also provide an overhead analysis and a security analysis on relevant attacks,and discuss on the impact of several design para-meters.Our analysis results quantify the resiliency,efficiency,and scalability of LBLD.10Default total number of nodes in the networkR1Km∼10Km node density(ρ=N/πR2)C100m communication range of a nodeb150m number of keys bound to a cellm5length of each MAC in bytesRelative distance from compromised nodes to the sink (d0/R)E x p e c t e d n u m b e r o f f o r w a r d i n g h o p sFigure 3:LBLD can quickly filter fabricated reports en-route,and its filtering powerscales well as the network size increases.Figure 4:LBLD significantly saves energy by filtering fabricated reports en-route,especially in large-scale networks.4.1.2Filtering PositionLBLD can quickly filter the fabricated reports en-route by accumulating the fil-tering power along the forwarding path.This is shown by the following theorem (proof in Appendix).Theorem 1The filtering position h ,defined as the expected number of hops that a fabricated report can traverse,is upper bounded as:h≤1+h i =2i −1j =1(1−(m −1)(d 0−jR c )(see Table1for other parameter settings).We can see that in a1Km-radius network,a forged report traverses only4.2hops on average,and6hops at most. In contrast,without LBLD,a forged report can traverse as many as20hops. Moreover,when the terrain radius increases from1Km to10Km,leading to an 100-fold increase in node population,the average distance traversed by a forged report only doubles(from4.2hops to7.2hops),while the worst-case distance only triples(from6hops to18hops).This shows that thefiltering power of LBLD scales very well when the network size increases.4.1.3Energy SavingThe early dropping of forged reports leads to significant energy savings,espe-cially in large-scale sensor networks.Assuming that all nodes in the network use the same transmission power,we plot in Figure4the energy consumption ratio between the LBLD-protected paths and the unprotected paths,i.e.,h /h.The figure shows that LBLD can save energy by a ratio of43.7%in a1Km-radius network,and81.3%in a10Km-radius network.Such an increase in the energy saving ratio is because thefiltering position in LBLD increases much slower than the network size.Figure4also shows that the energy savings of LBLD also depends on the compromised node’s location.This is because each node picks up its verifiable cells in a probability proportional to its distances to the sink(Equation3). As a result,when the compromised node is further away from the sink,the downstream nodes along the forwarding path have larger chances to detect the fabricated reports,which are dropped more quickly.4.2Resiliency AnalysisNow we analyze the resiliency of LBLD to an increasing number of compromised nodes.We consider a general case where the attacker compromises N c nodes and fabricates reports on bogus events“happening”in cell(X,Y).The results show that the security protection offered by LBLD degrades gracefully,rather than completely breaking down in the entire network as in existing designs[28,32].4.2.1Graceful Performance DegradationThe attacker cannot arbitrarily abuse the keys due to their location-binding nature.To fabricate reports without being detected,the attacker must collect m distinct keys bound to cell(X,Y).We term this as cell compromise.Even in such cases,the attacker cannot use these keys to forge events in other cells. Thus the fabricated reports reveal important diagnostic information to the sink. The sink can quarantine the compromised cells by informing the nodes not to forward any reports for them.This way,the sink may lose monitoring capability in a few cells,but the rest of the network is still protected by LBLD.The location-based key assignment ensures that the compromised cells rep-resent only a tiny fraction of the terrain.When the compromised nodes are13。

相关文档
最新文档