- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Opportunistic and Delay-Tolerant Networks
- Network Traffic and Congestion Control
- Mobile Ad Hoc Networks
- Distributed and Parallel Computing Systems
- Advanced Authentication Protocols Security
- Cryptography and Data Security
- User Authentication and Security Systems
- Satellite Communication Systems
- Mobile Agent-Based Network Management
- RFID technology advancements
- Service-Oriented Architecture and Web Services
- Parallel Computing and Optimization Techniques
- Cloud Computing and Resource Management
- Privacy-Preserving Technologies in Data
- Advanced Wireless Communication Technologies
- Transportation Planning and Optimization
- UAV Applications and Optimization
- Advanced Data Storage Technologies
- Molecular Communication and Nanonetworks
- Evacuation and Crowd Dynamics
- Traffic Prediction and Management Techniques
- Energy Efficient Wireless Sensor Networks
- Distributed systems and fault tolerance
Central China Normal University
2013-2025
Wuhan University
2006-2008
With the increasing popularity and wide application of Internet, users (such as managers data consumers) in Industrial Internet Things (IIoT) can remotely analyze control real-time collected by various smart sensor devices. However, there are many security privacy issues process transmitting through public channels IIoT environment. In order to against illegal access opponents, a novel anonymous user authentication key agreement scheme based on hash elliptic curve encryption is proposed this...
Traffic prediction is vital to traffic planning, control, and optimization, which necessary for intelligent management. Existing methods mostly capture spatiotemporal correlations on a fine-grained graph, cannot make full use of cluster information in coarse-grained graph. However, the flow variation clusters graph more stable compared with nodes And node generally consistent trend belongs. Thus can guide feature learning To this end, we propose Spatiotemporal Multiscale Graph Convolutional...
In this paper, we propose a novel ant colony optimization algorithm based on improved brainstorm (IBSO-ACO) to solve the vehicle routing problem with soft time windows. Compared traditional algorithm, proposed IBSO-ACO can better address local optimum problem, since have carefully designed an brainstorming update solutions obtained by which enhance solution diversity and global search ability. Furthermore, use classification method accelerate convergence of algorithm. The extensive...
The Internet of Things is one the new emerging application domains that require delay tolerant network (DTN) support, where an end-to-end path between source and destination may not always exist. Due to intermittent connectivity DTN, design efficient routing algorithm main challenge. In this paper, we first define a metric called message handling capacity determine ability node forward messages. Then, introduce concept connection strength reflect time nodes then integrate into delivery...
Reconfigurable intelligent surface (RIS) is playing a growing and ever-more significant role in constructing six-generation (6G) wireless networks due to its properties of low-cost easy-integration. Current studies about RIS-assisted communication generally assume the RISs are deployed at fixed position or devices, however with rapid development unmanned aerial vehicle (UAV) technology, this readily flying access platform increasingly used realize reliable communication. If mounted on random...
With the rapid developments of Internet Things (IoT) technologies, security sensitive data has attracted more and attention for many resource-asymmetric smart environments, such as home, agriculture so on. The resource-asymmetry environment refers to uneven distribution resources on different devices side, which is specifically manifested gateway side resource-rich, user device are resource-restricted. Hence, a secure practical authentication key establishment scheme environments urgently...
Opportunistic mobile networks, as an important supplement to the traditional communication methods in unique environments, are composed of devices. It is a network form that realizes message transmission by using opportune encounter these Consequently, devices necessitate periodic contact detection order identify potential opportunities, thereby leading substantial reduction already limited battery life such Previous studies on opportunistic networks have often utilized geographic...
In delay-tolerant networks(DTN), the timeliness of node's social circle and encounter time between nodes have a different effect in designing router algorithms. Considering these factors, this paper proposes an improved spray wait algorithm based on node tree (TNST). Specifically, we will first combine own attributes with ability to calculate delivery capability value. Followed by it, build update for each node. Finally, predict nodes, which their motion information. The select as relay if...
Reservation in advance provides a solution for the need of reserving network resource future. Advance reservation global grids becomes an important research area as it allows users to gain concurrent access their applications be executed parallel, and guarantees availability resources at specified future times. But performance grid was seldom considered. In this paper, adaptive is introduced. It can modify not only parameters latest request but also that admitted requests because sometimes...
In the past several years, alert correlation methods have been advocated to discover high-level attack scenarios by correlating low-level alerts. The causal method based on prerequisites and consequences has great advantages in process of But it must depend complicated background knowledge base some limits discovering new attacks. cluster can aggregate relational alerts computing similarity between attributes, as well simple However, is difficult establish attribute weights membership...
Clustering technology used in routing protocols can reduce energy consumption and prolong the lifetime of wireless sensor networks. Cluster head selection is one most important parts clustering routing. An Energy Prediction based method on LEACH (LEACH-EP) proposed this paper. Its core to maintain structure clusters unchanged K rounds. In first round, cluster heads are selected according LEACH, then prediction remaining K-1 LEACH-EP reduces updates clusters’ delays dead time nodes....
How to select proper relay nodes ensure the successful delivery of messages is still a hot topic in delay tolerant networks (DTN). In this paper, we propose probabilistic Spray-and-Wait routing algorithm based on node interest preference (called NIP-PSW). Firstly, considering influence social attributes nodes, define metric called (NIP) measure probability becoming friends. Secondly, view quality and connection time between message forwarding, (DP). Finally, according historical information...
In delay tolerant networks(DTN), non-social attributes and social relating to nodes have a different effect in designing router algorithms, we can combine these two design algorithms. our paper, put forward an improved spray-and-wait routing algorithm (NSSAWRouter) based on relationship between DTN, which mainly selects relay by adopting transmission values assigns message copies dynamically the spray stage. Specifically, will first build circle for each node record dynamic its nodes....
UDDI acts a very important role in the web service. It can be used to publish and lookup services. Most of current models are centralized so that performance will decrease if there too many services registered or queried. In this paper, an interoperable model distributed is proposed. The divides whole servers into types: root server, super domain server normal server. simulation results show get better performance.
Application-layer multicast (ALM) can easily address most of the problems IP-based such as forwarding state scalability, full router dependence and so on. The topology-aware approach ALM is more attractive because it exploits underlying network topology data to construct overlay networks. In this paper, a efficient mechanism construction called subnet grouping (STAG) introduced. Under mechanism, new node who wants join tree will broadcast JOIN message in firstly or at same time when sends...