- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Security in Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Mobile Crowdsensing and Crowdsourcing
- Mobile Ad Hoc Networks
- Privacy-Preserving Technologies in Data
- Opportunistic and Delay-Tolerant Networks
- UAV Applications and Optimization
- Blockchain Technology Applications and Security
- Vehicular Ad Hoc Networks (VANETs)
- Network Security and Intrusion Detection
- Indoor and Outdoor Localization Technologies
- Human Mobility and Location-Based Analysis
- Age of Information Optimization
- Cloud Computing and Resource Management
- Caching and Content Delivery
- Wireless Body Area Networks
- Cloud Data Security Solutions
- Software-Defined Networks and 5G
- Distributed and Parallel Computing Systems
- Cooperative Communication and Network Coding
- Advanced MIMO Systems Optimization
- IoT Networks and Protocols
- Context-Aware Activity Recognition Systems
Central South University
2016-2025
Nanjing Forestry University
2016-2020
National Dong Hwa University
2004-2019
ORCID
2018-2019
State Key Laboratory of Industrial Control Technology
2018
Zhejiang University of Technology
2018
Muroran Institute of Technology
2018
Anhui Agricultural University
2018
Zhejiang University
2018
Zero to Three
2016
Wireless sensor networks (WSNs) are increasingly being deployed in security-critical applications. Because of their inherent resource-constrained characteristics, they prone to various security attacks, and a black hole attack is type that seriously affects data collection. To conquer challenge, an active detection-based trust routing scheme named ActiveTrust proposed for WSNs. The most important innovation it avoids holes through the creation number detection routes quickly detect obtain...
Mobile edge computing (MEC) is a promising technique to enhance computation capacity at the of mobile networks. The joint problem partial offloading decision, scheduling, and resource allocation for MEC systems challenging issue. In this paper, we investigate scheduling with multiple independent tasks. A power (POSP) in single-user formulated. goal minimize weighted sum execution delay energy consumption while guaranteeing transmission constraint tasks running both device considered. task...
The Internet of Things (IoT)-Cloud combines the IoT and cloud computing, which not only enhances IoT's capability but also expands scope its applications. However, it exhibits significant security efficiency problems that must be solved. Internal attacks account for a large fraction associated problems, however, traditional strategies are capable addressing these effectively. Moreover, as repeated/similar service requirements become greater in number, IoT-Cloud services is seriously...
We propose a novel event data collection approach named reliability and multipath encounter routing (RMER) for meeting energy efficiency requirements. The contributions of the RMER are as follows. 1) Fewer monitor nodes selected in hotspot areas that close to Sink, more nonhotspot areas, which can lead increased network lifetime detection reliability. 2) sends Sink by converging routes monitoring into one-path route aggregate data. Thus, consumption be greatly reduced, thereby enabling...
Network lifetime is a crucial performance metric to evaluate data-gathering wireless sensor networks (WSNs) where battery-powered nodes periodically sense the environment and forward collected samples sink node. In this paper, we propose an analytic model estimate entire network from initialization until it completely disabled, determine boundary of energy hole in WSN. Specifically, theoretically traffic load, consumption, during lifetime. Furthermore, investigate temporal spatial evolution...
With the advent of 5G, industrial Internet Things has developed rapidly. The sensor-cloud system (SCS) also received widespread attention. In future, a large number integrated sensors that simultaneously collect multifeature data will be added to SCS. However, collected big are not trustworthy due harsh environment sensor. If at bottom networks directly uploaded cloud for processing, query and mining results inaccurate, which seriously affect judgment feedback cloud. traditional method...
As an enabler for smart industrial Internet of Things (IoT), sensor cloud facilitates data collection, processing, analysis, storage, and sharing on demand. However, compromised or malicious nodes may cause the collected to be invalid even endanger normal operation entire IoT system. Therefore, designing effective mechanism ensure trustworthiness is a critical issue. existing computing models cannot provide direct management nodes. Meanwhile, insufficient computation storage ability makes...
With the development of Internet Things (IoT) technologies, increasingly many devices are connected, and large amounts data produced. By offloading computing-intensive tasks to edge devices, cloud-based storage technology has become mainstream. However, if end IoT send all their cloud, then privacy becomes a great issue. In this paper, we propose new architecture for synchronization based on fog computing. part computing work servers, can be guaranteed. Moreover, decrease communication cost...
The development of the Internet Things (IoT) and intelligent vehicles brings a comfortable environment for users. Various emerging vehicular applications using artificial intelligence (AI) technologies are expected to enrich users' daily life. However, how execute computation-intensive on resource-constrained based AI still faces great challenges. In this article, we consider computation offloading problem in mobile-edge computing (MEC), which multiple mobile select nearby MEC servers...
Mobile edge computing (MEC) is an emergent architecture, which brings computation and storage resources to the of mobile network provides rich services applications near end users. The joint problem task offloading resource allocation in multi-user collaborative (C-MEC) based on Orthogonal Frequency-Division Multiple Access (OFDMA) a challenging issue. In this paper, we investigate decision, collaboration communication C-MEC. delay-sensitive tasks users can be computed locally, offloaded...
The high mobility of Internet Unmanned Aerial Vehicles (IUAVs) has attracted attention in the field data collection. With rapid development Things (IoT), more and are generated by IoT networks. IUAV-aided networks can efficiently collect specific areas, which is great significance disaster relief. In collection task, it necessary to plan flight trajectory for collector—IUAV, so that IUAV efficiently. However, existing research basically only considers efficiency IUAVs, but rarely safety...
UAVs-enabled Mobile Crowdsensing (UMCS) has gained considerable attention recently, but it is challenging to meet the data collection needs of entire city using only UAV with limited energy. Furthermore, how effectively minimize Age-of-Information (AoI) and ensure quality not been well solved in previous studies. Therefore, this paper proposes a hybrid optimization framework for AoI minimization, which recruits massive distributed workers as main force collection, while acts collaborator...
Internet of Things (IoT) applications have been growing significantly in recent years, however, the security issue has not well studied literature for IoT ecosystem. The sinkhole attack is one serious destructive attacks as it easy to launch and difficult defend it. In this paper, a Probe Route based Defense Sinkhole Attack (PRDSA) scheme proposed resist guarantee IoT, which first work that can detect, bypass locate at same time. PRDSA proposes routing mechanism combining far-sink reverse...
The catalytic transfer hydrogenation of furfural to the fuel additives 2-methylfuran (2-MF) and 2-methyltetrahydrofuran (2-MTHF) was investigated over various bimetallic catalysts in presence hydrogen donor 2-propanol. Of all as-prepared catalysts, Cu-Pd showed highest activities towards formation 2-MF 2-MTHF with a total yield up 83.9 % at 220 °C 4 h. By modifying Pd ratios catalyst, or could be obtained selectively as prevailing product. other reaction conditions also had great influence...
This paper first presents an analysis strategy to meet requirements of a sensing application through trade-offs between the energy consumption (lifetime) and source-to-sink transport delay under reliability constraint wireless sensor networks. A novel data gathering protocol named Broadcasting Combined with Multi-NACK/ACK (BCMN/A) is proposed based on strategy. The BCMN/A achieves efficiency during process both in intra-cluster inter-cluster. In intra-cluster, after each round TDMA...
Billions of devices are connected to the Internet Things (IoT). These generate a large volume data, which poses an enormous burden on conventional networking infrastructures. As effective computing model, edge is collaborative with cloud by moving part intensive computation and storage resources devices, thus optimizing network latency energy consumption. Meanwhile, software-defined networks (SDNs) technology promising in improving quality service (QoS) for complex IoT-driven applications....
Billions of sensors and devices are connecting to the Internet Thing (IoT) generating massive data which benefit for smart network systems. However, low-cost, secure, efficient collection from billions IoT in city is a huge challenge. Recruiting mobile vehicles (MVs) has been proved be an effective scheme. previous approaches rarely considered security. In this paper, novel Baseline Data based Verifiable Trust Evaluation (BD-VTE) scheme proposed guarantee security at low cost. BD-VTE...
The rapid and convenient travel of people the timely transportation goods depend on correct decision Intelligent Transportation Systems (ITS). Due to decision-making ITS requires a large amount data support, UAV-enabled periodic collection is an effective method. However, due limited resources UAV, UAV cannot directly collect from all storage devices, resulting in unfair collection. Therefore, we propose Speed Control based Fairness Data Collection (USCFDC) scheme. First, since fairness will...
Recent advances in microelectromechanical system (MEMS) technology have boosted the deployment of wireless sensor networks (WSNs). Limited by energy storage capability nodes, it is crucial to jointly consider security and efficiency data collection WSNs. The disjoint multipath routing scheme with secret sharing widely recognized as one effective strategies ensure safety information. This kind transforms each packet into several shares enhance transmission. However, many-to-one WSNs, high...
Real-time surveillance systems with green wireless sensor networks (WSNs) are vital for maintaining high energy efficiency in many situations. This paper considers a scenario utilizing WSNs to monitor the situation of Internet Things (IoT), which constitute one most crucial sources electricity consumption information and communications technologies (ICT). More specifically, we focus on optimizing cluster structure minimize delay aggregation convergecast WSNs. We first find optimal value...