Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 2 de 2
Filtrar
Más filtros




Base de datos
Asunto de la revista
Intervalo de año de publicación
1.
BMC Geriatr ; 23(1): 871, 2023 12 19.
Artículo en Inglés | MEDLINE | ID: mdl-38114919

RESUMEN

BACKGROUND: The competing interests of the government, smart senior care technology service providers, and older adults have led to a serious fragmentation of governance in China. This study aims to identify the collaboration mechanisms and evolutionary stabilization strategies for these agents. METHODS: An evolutionary game model is developed to analyze the strategic decisions made by the government, smart senior care technology service providers, and older adults. A sensitivity analysis is conducted using data from Anhui Province, China, to verify the effects of relevant parameters on the strategy decisions of each agent. RESULTS: The results of the simulation and sensitivity analysis indicated that, first, despite changes in the initial willingness values of the tripartite agents, the system eventually converges on 1. Second, the collaboration mechanism of the tripartite agents in the smart senior care system is related to government incentives, penalties, and subsidies, smart senior care service costs, and the additional benefits provided to smart senior care technology service providers. CONCLUSION: The strategy decisions of the government, providers, and older adults interact with each other. To promote collaboration among the tripartite agents and improve governance effectiveness, the government should strengthen the regulations for providers, increase penalties for providers that engage in a breach of trust, provide moderate incentives and subsidies, and control smart senior care service costs.


Asunto(s)
Confianza , Humanos , Anciano , China , Simulación por Computador
2.
Sensors (Basel) ; 22(19)2022 Sep 29.
Artículo en Inglés | MEDLINE | ID: mdl-36236523

RESUMEN

With the development of the Industrial Internet of Things (IIoT), industrial wireless sensors need to upload the collected private data to the cloud servers, resulting in a large amount of private data being exposed on the Internet. Private data are vulnerable to hacking. Many complex wireless-sensor-authentication protocols have been proposed. In this paper, we proposed an efficient authentication protocol for IIoT-oriented wireless sensor networks. The protocol introduces the PUF chip, and uses the Bloom filter to save and query the challenge-response pairs generated by the PUF chip. It ensures the security of the physical layer of the device and reduces the computing cost and communication cost of the wireless sensor side. The protocol introduces a pre-authentication mechanism to achieve continuous authentication between the gateway and the cloud server. The overall computational cost of the protocol is reduced. Formal security analysis and informal security analysis proved that our proposed protocol has more security features. We implemented various security primitives using the MIRACL cryptographic library and GMP large number library. Our proposed protocol was compared in-depth with related work. Detailed experiments show that our proposed protocol significantly reduces the computational cost and communication cost on the wireless sensor side and the overall computational cost of the protocol.


Asunto(s)
Seguridad Computacional , Internet de las Cosas , Redes de Comunicación de Computadores
SELECCIÓN DE REFERENCIAS
DETALLE DE LA BÚSQUEDA