Friday, February 2, 2018

Implement access control in a simple iot system using ethereum smart contracts.

This post presents the code used for our paper "Smart Contract-Based Access Control for the Internet of Thins" (arxiv.org),including the ACC, RCJC, JavaScript at the subject and JavaScript at the object.

Steps to run the code.
1. Deploy the ACC, RC and JC on the Ethereum blockchain network. In my case, I just built a local private Ethereum blockchain network using three devices, i.e., a desktop PC and two Raspberry Pi's. Each device has the geth client installed.

2. Add the address of the ACC into the lookuptable of the RC and store the address of the JC to the jc variable of the ACC. This is to enable the interactions among the contracts.

3. Add the required information for access control to the smart contracts, e.g., access control policies.

4. Run the monitor.js javascript on the object side and the requester.js on the subject side to test the access control.

Sunday, December 4, 2016

C++ simulator for mode selection and spectrum partition in D2D communications underlaying cellular networks with PHY security consideration

Please kindly download the C++ simulator for friendship-based cooperative jamming in Poisson networks used in the paper "Mode Selection and Spectrum Partition for D2D
Inband Communications: A Physical Layer Security Perspective". This simulator is composed of five files, namely, network.h, network.cpp, randGenerator.h, randGenerator.cpp, main.cpp.

Sunday, January 3, 2016

C++ simulator for friendship-based cooperative jamming in Poisson networks.

Please kindly download the C++ simulator for friendship-based cooperative jamming in Poisson networks used in the paper "Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks". This simulator is composed of five files, namely, network.h, network.cpp, randGenerator.h, randGenerator.cpp, main.cpp . 

Monday, March 16, 2015

simulator for 2-hop with colluding eavesdroppers

Please kindly download the C++ simulator for the 2-hop cooperative transmission with colluding eavesdroppers,
which contains files, main.cpp,network.h,network.cpp,randGenerator.h and randGenerator.cpp

Thursday, May 8, 2014

C++ simulator for the 2HR-(l,k,r,tau) protocol

Please kindly download the C++ simulator for the 2HR-(l,k,r,tau) protocol, considered in the paper "Transmission Protocol for Secure Big Data in Two-Hop Wireless Networks with Cooperative Jamming", which contains files, main.cpp,randGenerator.cpp and randGenerator.h.

Thursday, November 28, 2013

C++ simulator for two-hop transmission with cooperative jamming and opportunistic relaying

Please kindly download the C++ simulator for the 2-hop cooperative transmission with cooperative jamming and opportunistic relaying, considered in the paper "On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks
", which contains files, main.cpp,network.h,network.cpp,randGenerator.h,randGenerator.cpp.

Sunday, July 7, 2013

C++ simulator for 2-hop transmission via cooperative jamming

Please kindly download the C++ simulator for the 2-hop cooperative transmission, considered in the paper "Eavesdropper-Tolerance Capability in Two-Hop Wireless Networks via Cooperative Jamming", which contains files, main.cpp,network.cpp,network.h,randGenerator.cpp and randGenerator.h.