It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a signific...It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily.展开更多
HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The se...HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks.展开更多
With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and inf...With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV.展开更多
For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels tha...For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.展开更多
In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carrie...In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.展开更多
Most of current wireless packet scheduling algorithms aim at resource allocation as fairly as possible or maximizing throughput. This paper proposed a new packet scheduling algorithm that aims at satisfying delay requ...Most of current wireless packet scheduling algorithms aim at resource allocation as fairly as possible or maximizing throughput. This paper proposed a new packet scheduling algorithm that aims at satisfying delay requirement and is the improvement of earliest due first (EDF) algorithm in wired networks. The main idea is to classify the packets based on their delay bound, scheduling the most "urgent" class of user and the users that have the best channel condition with higher priority. This algorithm can easily integrate with common buffer management algorithms, when buffer management algorithm cannot accept new arrival packets, try to modify scheduling policy. Packet scheduling algorithms in multiple bottleneck wireless networks were also discussed. A new variable multi-hop factor was defined to estimate the congestion situation (including channel condition) of future hops. Multi-hop factor can be integrated into packet scheduling algorithms as assistant and supplement to improve its performance in multi-bottleneck wireless networks.展开更多
The paper design mobile information collection system based on lnternet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual infor...The paper design mobile information collection system based on lnternet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual information based on ZigBee wireless sensor networks. On the one hand, For information sensitivity of the sensor network, we design the mobile terminal through the gateway access authentication protocol, and effective solute the authentication and infbnnation between mobile devices and gateways, gateway and sensor network nodes obtain permission problem; on the other hand, according to the practical application of mobile information collection characteristics, the paper proposed information collection strategy based on historical data movement path to solve the problem for too long the device connection is established when the mobile smart devices collecting information along fixed lines, increasing the actual data transmission time and improve the efficiency of information transmission.展开更多
Aiming at the tourism informationization is difficult to meet the needs of passengers and massive data processing changes day by day, this paper puts forward a solution based on WSN wisdom travel. The scheme will be t...Aiming at the tourism informationization is difficult to meet the needs of passengers and massive data processing changes day by day, this paper puts forward a solution based on WSN wisdom travel. The scheme will be the tourism resources virtualization to frame a wisdom tourism cloud platform based on cloud computing IAAS, PAAS and SAAS model, and use cloud computing and open source software OpenStack, Hadoop architecture design. The purpose enable the tourism resources of wisdom navel cloud system into one unified management, unified sales, unified treatment and unified service. Thus the system implement the tourism industry cluster and the collaborative development of tourism resources, improve the information processing capacity and reliability.展开更多
基金supported by National Basic Research Program of China (NO 2012CB316002)China’s 863 Project (NO 2014AA01A703)+2 种基金National Major Projec (NO. 2014ZX03003002-002)Program for New Century Excellent Talents in University (NCET-13-0321)Tsinghua University Initiative Scientific Research Program (2011THZ02-2)
文摘It is extensively approved that Channel State Information(CSI) plays an important role for synergetic transmission and interference management. However, pilot overhead to obtain CSI with enough precision is a significant issue for wireless communication networks with massive antennas and ultra-dense cell. This paper proposes a learning- based channel model, which can estimate, refine, and manage CSI for a synergetic transmission system. It decomposes the channel impulse response into multiple paths, and uses a learning-based algorithm to estimate paths' parameters without notable degradation caused by sparse pilots. Both indoor measurement and outdoor measurement are conducted to verify the feasibility of the proposed channel model preliminarily.
基金Project(07JJ1010) supported by Hunan Provincial Natural Science Foundation of ChinaProjects(2006AA01Z202, 2006AA01Z199) supported by the National High-Tech Research and Development Program of China+2 种基金Project(7002102) supported by the City University of Hong Kong, Strategic Research Grant (SRG)Project(IRT-0661) supported by the Program for Changjiang Scholars and Innovative Research Team in UniversityProject(NCET-06-0686) supported by the Program for New Century Excellent Talents in University
文摘HashQuery,a Hash-area-based data dissemination protocol,was designed in wireless sensor networks. Using a Hash function which uses time as the key,both mobile sinks and sensors can determine the same Hash area. The sensors can send the information about the events that they monitor to the Hash area and the mobile sinks need only to query that area instead of flooding among the whole network,and thus much energy can be saved. In addition,the location of the Hash area changes over time so as to balance the energy consumption in the whole network. Theoretical analysis shows that the proposed protocol can be energy-efficient and simulation studies further show that when there are 5 sources and 5 sinks in the network,it can save at least 50% energy compared with the existing two-tier data dissemination(TTDD) protocol,especially in large-scale wireless sensor networks.
文摘With the advancements in wireless sensor networks, Internet of Vehicles(IOV) has shown great potential in aiding to ease traffic congestion. In IOV, vehicles can easily exchange information with other vehicles and infrastructures, thus, the development of IOV will greatly improve vehicles safety, promote green information consumption and have a profound impact on many industries. The purpose of this paper is to promote the innovation and development of IOV. Firstly, this paper presents general requirements of IOV such as guidelines, basic principles, and the goal of development. Secondly, we analyze critical applications, crucial support, and business model to promote the industrial development of IOV. Finally, this paper proposes some safeguard measures to further promote the development of IOV.
基金the National Natural Science Foundation of China under Grant No.61172068,6137317 0.The Fundamental Research Funds for the Central Universities,Program for New Century Excellent Talents in University
文摘For the discontinuous occupancy of primary users in cognitive radio networks(CRN),the time-varying of spectrum holes becomes more and more highlighted.In the dynamic environment,cognitive users can access channels that are not occupied by primary users,but they have to hand off to other spectrum holes to continue communication when primary users come back,which brings new security problems.Tracking user attack(TUA) is a typical attack during spectrum handoff,which will invalidate handoff by preventing user accessing,and break down the whole network.In this paper,we propose a Channel Selection Information Hiding scheme(CSIH) to defense TUA.With the proposed scheme,we can destroy the routes to the root node of the attack tree by hiding the information of channel selection and enhance the security of cognitive radio networks.
基金Projects(61173169,61103203,70921001)supported by the National Natural Science Foundation of ChinaProject(NCET-10-0798)supported by Program for New Century Excellent Talents in University of China
文摘In sensor networks,the adversaries can inject false data reports from compromised nodes.Previous approaches to filter false reports,e.g.,SEF,only verify the correctness of the message authentication code (MACs) carried in each data report on intermediate nodes,thus cannot filter out fake reports that are forged in a collaborative manner by a group of compromised nodes,even if these compromised nodes distribute in different geographical areas.Furthermore,if the adversary obtains keys from enough (e.g.,more than t in SEF) distinct key partitions,it then can successfully forge a data report without being detected en-route.A neighbor information based false report filtering scheme (NFFS) in wireless sensor networks was presented.In NFFS,each node distributes its neighbor information to some other nodes after deployment.When a report is generated for an observed event,it must carry the IDs and the MACs from t detecting nodes.Each forwarding node checks not only the correctness of the MACs carried in the report,but also the legitimacy of the relative position of these detecting nodes.Analysis and simulation results demonstrate that NFFS can resist collaborative false data injection attacks efficiently,and thus can tolerate much more compromised nodes than existing schemes.
文摘Most of current wireless packet scheduling algorithms aim at resource allocation as fairly as possible or maximizing throughput. This paper proposed a new packet scheduling algorithm that aims at satisfying delay requirement and is the improvement of earliest due first (EDF) algorithm in wired networks. The main idea is to classify the packets based on their delay bound, scheduling the most "urgent" class of user and the users that have the best channel condition with higher priority. This algorithm can easily integrate with common buffer management algorithms, when buffer management algorithm cannot accept new arrival packets, try to modify scheduling policy. Packet scheduling algorithms in multiple bottleneck wireless networks were also discussed. A new variable multi-hop factor was defined to estimate the congestion situation (including channel condition) of future hops. Multi-hop factor can be integrated into packet scheduling algorithms as assistant and supplement to improve its performance in multi-bottleneck wireless networks.
文摘The paper design mobile information collection system based on lnternet of Things, implemented access gateway by smart mobile devices through a variety of ways, such as Wi-Fi and access the underlying perceptual information based on ZigBee wireless sensor networks. On the one hand, For information sensitivity of the sensor network, we design the mobile terminal through the gateway access authentication protocol, and effective solute the authentication and infbnnation between mobile devices and gateways, gateway and sensor network nodes obtain permission problem; on the other hand, according to the practical application of mobile information collection characteristics, the paper proposed information collection strategy based on historical data movement path to solve the problem for too long the device connection is established when the mobile smart devices collecting information along fixed lines, increasing the actual data transmission time and improve the efficiency of information transmission.
文摘Aiming at the tourism informationization is difficult to meet the needs of passengers and massive data processing changes day by day, this paper puts forward a solution based on WSN wisdom travel. The scheme will be the tourism resources virtualization to frame a wisdom tourism cloud platform based on cloud computing IAAS, PAAS and SAAS model, and use cloud computing and open source software OpenStack, Hadoop architecture design. The purpose enable the tourism resources of wisdom navel cloud system into one unified management, unified sales, unified treatment and unified service. Thus the system implement the tourism industry cluster and the collaborative development of tourism resources, improve the information processing capacity and reliability.