- graph theory and CDMA systems
- Security in Wireless Sensor Networks
- Thermal Analysis in Power Transmission
- Green IT and Sustainability
- IoT Networks and Protocols
- Energy Harvesting in Wireless Networks
- Advanced Fiber Optic Sensors
- Coding theory and cryptography
- Semiconductor Lasers and Optical Devices
- Power Line Communications and Noise
- Energy Efficient Wireless Sensor Networks
- Network Security and Intrusion Detection
- Optical Network Technologies
- Indoor and Outdoor Localization Technologies
- Lightning and Electromagnetic Phenomena
- IoT and Edge/Fog Computing
- Mobile Ad Hoc Networks
- Bluetooth and Wireless Communication Technologies
- Caching and Content Delivery
- Smart Agriculture and AI
- UAV Applications and Optimization
- Advanced Malware Detection Techniques
- Smart Grid Security and Resilience
- Web Application Security Vulnerabilities
- Image and Video Quality Assessment
Donghua University
2014-2025
Northwestern Polytechnical University
2024
Institute of Electronics
2024
North China Electric Power University
2023
Beijing University of Posts and Telecommunications
1991-2022
Shandong Academy of Sciences
2022
Qilu University of Technology
2022
Wuhan University
2019-2022
University of South China
2021
Data Assurance and Communication Security
2019
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during process collection in network. However, because individual readings are lost per-hop process, compromised network may forge false values as results other nodes, tricking base station into accepting spurious results. Here fundamental challenge is: how can obtain good approximation fusion result when fraction compromised.To answer this challenge, we...
Sensors deployed to monitor the surrounding environment report such information as event type, location, and time when a real of interest is detected. An adversary may identify source through eavesdropping traffic analysis. Previous work has studied location privacy problem under local model. In this work, we aim provide stronger notion: unobservability, which promises that global cannot know whether ever occurred even if he capable collecting analyzing all messages in network at time....
Sensors that operate in an unattended, harsh or hostile environment are vulnerable to compromises because their low costs preclude the use of expensive tamper-resistant hardware. Thus, adversary may reprogram them with malicious code launch various insider attacks. Based on verifying genuineness running program, we propose two distributed software-based attestation schemes well tailored for sensor networks. These based a pseudorandom noise generation mechanism and lightweight block-based...
Modern mobile devices are equipped with multicore-based processors, which introduce new challenges on computation offloading. With the big.LITTLE architecture, instead of only deciding locally or remotely running a task in traditional we have to consider how exploit architecture minimize energy while satisfying application completion time constraints. In this paper, address problem energy-efficient offloading multiple applications. We first formalize as mixed-integer nonlinear programming...
Modern city construction focuses on developing smart transportation, but the recognition of large number non-motorized vehicles in is still not sufficient. Compared to fixed equipment, drones have advantages image acquisition due their flexibility and maneuverability. With dataset collected from aerial images taken by drones, this study proposed a novel lightweight architecture for small objection detection based YOLO framework, named EBR-YOLO. Firstly, since targets application scenario are...
Hop-by-hop data aggregation is a very important technique for reducing the communication overhead and energy expenditure of sensor nodes during process collection in network. However, because individual readings are lost per-hop process, compromised network may forge false values as results other nodes, tricking base station into accepting spurious results. Here fundamental challenge how can obtain good approximation fusion result when fraction compromised? To answer this challenge, we...
This paper explores the existing energy harvesting technologies, their stage of maturity and feasibility for powering sensor nodes. It contains a study requirements nodes that are part commercial domain. Further, it investigates methods concepts from electric magnetic fields present near utility assets through laboratory experimentation. The flux concentrator based approach scavenges field was considered to be most promising solution providing nearly 250 mW power sufficient node.
Maritime transportation has ushered in a period of vigorous development and been the most critical mode transport international trade. communication is also becoming increasingly complex. This trend needs IoT-enabled Transportation System (IMTS) to enhance its ability privacy-preserving, performance continuously, add function joint management. Although many aggregate signcryption (ASC) schemes have presented satisfy this requirement, they still suffer from deficiencies or security...
Because of cost and resource constraints, sensor nodes do not have a complicated hardware architecture or operating system to protect program safety. Hence, the notorious buffer-overflow vulnerability that has caused numerous Internet worm attacks could also be exploited attack networks. We call malicious code exploits in worm. Clearly, will serious threat, if most dangerous one, when an attacker simply send single packet compromise entire network. Despite its importance, so far little work...
Computationally intensive applications may quickly drain mobile device batteries. One viable solution to address this problem utilizes computation offloading. The tradeoff is that offloading introduces additional communication, with a corresponding energy cost. Yet, previous research into has failed account for the special characteristics of cellular networks impact consumption. In paper, we aim develop efficient algorithms networks. We analyze effects long tail on task offloading, formalize...
Significant work has been done on the sensing of utility assets. Most proposed approaches have based principle using few relatively expensive sensors and wireless communication links to provide a sample data status power line. This paper introduces concept distributed line sensornet (PLS) as an alternative approach realizing cost-effective grid monitoring. By way example sensor module is that can be clipped existing following four core functions: continuously monitoring critical parameters...
The task of monitoring asset status and optimizing utilization for the power grid, given millions assets hundreds thousands miles lines distributed over square miles, seems costly, if not impossible. Given traditionally high cost sensing communications, current grid has minimal dasiasmartspsila with much intelligence located at major substations. Dramatic reductions in sensor, computing communications costs, coupled significant performance enhancements increased possibility realizing widely...
Utilities require improved monitoring of their assets to ensure reliable power for customers. Sensors presently available in the market cater measuring multiple asset parameters and thus are expensive. This inhibits utilities' ability deploy such sensors on a large scale. paper addresses design implementation low cost self-powered "Stick-on" wireless current temperature sensor that can be mass deployed by utilities. Novel energy harvesting circuit techniques have been discussed shown operate...
LoRa provides new communication solution for wireless underground sensor network. A propagation testing node is presented in this paper. The configuration of the discussed detail. Tests about in-soil were carried out. characteristics related to volumetric water content, burial depth and payload are experimentally evaluated with node. And some suggestions proposed LoRa-based WUSN which applied soil.
A widely and massively distributed power line sensor network (PLSN) has been proposed to monitor such a utility asset's status for enhancing reliability maximizing the existing grid utilization. One of its important applications is evaluate real time dynamic overload current capacity overhead lines down `per span' level granularity. How predict conductor temperature ahead subject various conditions most critical challenging task thermal rating. This paper proposes an Echo State Network (ESN)...
The demand for efficient data dissemination/access techniques to find relevant from within a sensor network has led the development of data-centric (DCS) networks, where instead nodes are named based on attributes such as event type or geographic location. However, saving inside also creates security problems due lack tamper resistance and unattended nature network. For example, an attacker may simply locate compromise node storing his interest. To address these problems, we present pDCS,...
Smart Wires is a family of three Distributed FACTS (D-FACTS) technologies able to realize low-cost transmission line monitoring and power flow control in meshed networks. will allow utilities increase transfers networks by increasing average utilization. The technology projected have significantly lower cost lead time than alternatives, namely new construction, reconductoring, or conventional technology. This paper overviews the work done date demonstrate feasibility impact technology,...
One of the most important Internet Things applications is wireless body sensor network (WBSN), which can provide universal health care, disease prevention, and control. Due to large deployments small scale smart sensors in WBSNs, security, privacy guarantees (e.g., security safety-critical data, sensitive private information) are becoming a challenging issue because these nodes communicate using an open channel, i.e., Internet. We implement data integrity (to resist against malicious...
Abstract As an important branch of the Internet Things (IoT), Vehicular Ad Hoc Networks (VANETs) have attracted wide attention from industrial and academic. Due to opening wireless channel, security efficiency VANETs also become serious. To enhance efficiency, various batch verification schemes been proposed. However, most those suffer complicated certificate management problem or different kinds attacks. Also,the bilinear pairing which is intractable for lightweight devices in usually be...
Dramatic reductions in sensor, computing and communications costs, coupled with significant performance enhancements has increased the possibility of realizing widely massively distributed power line sensor networks (PLSNs) to monitor utility asset status for enhancing reliability utilization. One important applications such a PLSN is evaluate overhead dynamic current capacity down dasiaper spanpsila level granularity. Due inherent non-linearity conductor thermal behavior, it usually quite...
The energy consumed by video streaming includes the for data transmission and CPU processing, which are both affected frequency. High frequency can reduce time but it consumes more energy. Low reduces increases then consumption. In this paper, we aim to total of mobile adaptively adjusting Based on real measurement results, model effects TCP throughput system power. these models, propose an Energy-aware Frequency Scaling (EFS) algorithm selects that achieve a balance between saving Since...
A widely distributed power line sensor network (PLSN) has been proposed to monitor such a utility asset's status. One of its important applications is evaluate the real time dynamic current capacity overhead lines down `per span' level granularity, and thus maximize existing grid utilization. How predict conductor temperature ahead subject various overload conditions most critical challenging task thermal rating. This paper proposes an Echo State Network (ESN) adaptively identify nonlinear...