Beijing, China
Beijing, China

Time filter

Source Type

Liu W.,Beijing University of Posts and Telecommunications | Liu H.,Run Technologies Co. | Wan Y.,Run Technologies Co. | Kong H.,Third Security | Ning H.,University of Science and Technology Beijing
Personal and Ubiquitous Computing | Year: 2016

Along with the development of IoT applications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. The wearable devices confront severe security issues compared with traditional short-range communications. Due to the limitations of computation capabilities and communication resources, it brings more challenges to design security solutions for the resource-constrained wearable devices in IoT applications. In this work, a yoking-proof-based authentication protocol (YPAP) is proposed for cloud-assisted wearable devices. In the YPAP, a physical unclonable function and lightweight cryptographic operators are jointly applied to realize mutual authentication between a smart phone and two wearable devices, and yoking-proofs are established for the cloud server to perform simultaneous verification. Meanwhile, Rubin logic-based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed YPAP is flexible for lightweight wearable devices in IoT applications. © 2016, Springer-Verlag London.


Wan Y.L.,Run Technologies Co. | Duan D.G.,Beijing Technology and Business University | Han Z.M.,Beijing Technology and Business University
Control Engineering and Information Systems - Proceedings of the International Conference on Control Engineering and Information System, ICCEIS 2014 | Year: 2015

For practical video surveillance in sensor networks, automatic channel allocation is required. In this paper, we derive a normalize topology from self-ID packets for channel allocation. A superior method is proposed to determine the unique identify of nodes by comparison of the normalize topologies, which doesn’t occupy bus bandwidth. Applying the algorithms and using Visual C++ and Windows XP DDK, network architecture visualization is realized. The results show that channels are allocated automatically and in real-time. It is beneficial to monitor network and optimize performance. © 2015 Taylor & Francis Group, London.


Ning H.,University of Science and Technology Beijing | Fu Y.,Beihang University | Hu S.,Beihang University | Liu H.,Run Technologies Co.
Telecommunication Systems | Year: 2015

The Internet of Things (IoT) is an emerging network paradigm, and realizes the interconnection among ubiquitous things, along with its corresponding applications and services in both Physical-world and Cyber-world. Some researches have been worked on IoT modeling and addressing, which are mainly based on objects with a unique identifier (ID). However, in practical scenarios, there are several objects without any available ID, namely non-ID (i.e., nID) physical objects, including the objects unattached any ID itself, and the objects attached unreadable or un-trusted ID. It turns out that the nID physical objects related issues become noteworthy. In this paper, we focus on the nID physical objects to present a modeling and addressing solution. Concretely, (1) nID physical objects are described along with the discussion of applying nID solution; (2) a tree-like code structure (i.e., Tree-Code) is introduced to establish a unified modeling scheme for the nID physical objects according to abstracted data elements, and also achieves the compatibility with the ID physical objects considering the ID based data elements; (3) Tree-Code based addressing scheme is presented with dynamic updating considerations. It indicates that the nID physical object modeling and addressing provide complements to the ID physical objects for ubiquitous interactions in the IoT. © 2014, The Author(s).


Ma J.,Hosei University | Ning H.,University of Science and Technology Beijing | Huang R.,Hosei University | Liu H.,Run Technologies Company | And 3 more authors.
IEEE Access | Year: 2015

Following the two trends of computerization and informatization, another emerging trend is cyberization in which numerous and various cyber entities in cyberspace will exist in cyber-enabled worlds, including the cyber world and cyber-conjugated physical, social, and mental worlds. Computer science and information science, as holistic fields, have, respectively, played important roles in computerization and informatization. Similarly, it is necessary for there to be a corresponding field for cyberization. Cybermatics is proposed as such a holistic field for the systematic study of cyber entities in cyberspace and cyber world, and their properties, functions, and conjugations with entities in conventional spaces/worlds. This paper sets out to explain the necessity and rationale for, and significance of, the proposed field of Cybermatics, what it is and what it encompasses, and how it is related to other fields and areas. © 2013 IEEE.


Ning H.,University of Science and Technology Beijing | Liu H.,Run Technologies Co. | Ma J.,Hosei University | Yang L.T.,Huazhong University of Science and Technology | And 2 more authors.
Future Generation Computer Systems | Year: 2015

The Internet of Things (IoT) is becoming an attractive system paradigm, in which physical perceptions, cyber interactions, social correlations, and even cognitive thinking can be intertwined in the ubiquitous things' interconnections. It realizes a perfect integration of a new cyber-physical-social-thinking (CPST) hyperspace, which has profound implications for the future IoT. In this article, a novel concept Cybermatics is put forward as a broader vision of the IoT (called hyper IoT) to address science and technology issues in the heterogeneous CPST hyperspace. This article covers a broaden research field and presents a preliminary study focusing on its three main features (i.e., interconnection, intelligence, and greenness). Concretely, interconnected Cybermatics refers to the variants of Internet of anything, such as physical objects, cyber services, social people, and human thinking; intelligent Cybermatics considers the cyber-physical-social-thinking computing to provide algorithmic support for system infrastructures; green Cybermatics addresses energy issues to ensure efficient communications and networking. Finally, open challenging science and technology issues are discussed in the field of Cybermatics. © 2015 Elsevier B.V.


Ning H.S.,University of Science and Technology Beijing | Liu H.,RUN Technologies Co.
Science China Information Sciences | Year: 2015

The Internet of Things (IoT) as an emerging network paradigm is bringing the next scientific and technological revolution for ubiquitous things’ interactions in cyber-physical-social spaces. The IoT influences the current science and technology system by enabling its relatively stable interrelations for an inevitable architecture reconfiguration. In this paper, we aim to explore an updated science and technology framework for the IoT. Particularly, a novel cyber-physical-social-thinking (CPST) space is established by involving an attractive concept of the Internet of Thinking (IoTk), and a science and technology framework is accordingly proposed referring to both scientific aspect (i.e., cyber-physical, social, and noetic sciences) and technological aspect (i.e., fundamental, physical, cyber, and social technologies). According to the perspective of the traditional Chinese culture, we explain the established science and technology framework, in which the “Five Elements” (i.e., wood, fire, earth, metal, and water) have common properties with the restructured cyber-physical science in the IoT. Moreover, we introduce a scenario of smart city to identify the technological aspect in the IoT, and discuss the key enabling technologies, including resource management, energy management, data management, session management, security and privacy, loop control, space-time consistency, nanotechnology, and quantum technology. It turns out that the established science and technology framework will launch an innovation for academia and industry communities. © 2015, Science China Press and Springer-Verlag Berlin Heidelberg.


Liu H.,Run Technologies Co. | Yu R.,Run Technologies Co. | Wan Y.,Run Technologies Co.
Proceedings - 2015 IEEE 12th International Conference on Ubiquitous Intelligence and Computing, 2015 IEEE 12th International Conference on Advanced and Trusted Computing, 2015 IEEE 15th International Conference on Scalable Computing and Communications, 2015 IEEE International Conference on Cloud and Big Data Computing, 2015 IEEE International Conference on Internet of People and Associated Symposia/Workshops, UIC-ATC-ScalCom-CBDCom-IoP 2015 | Year: 2015

Along with the development of wireless communications, wearable devices are becoming popular for monitoring user data to provide intelligent service support. It makes that the wearable devices confront severe security issues compared with the traditional short-range communications. Due to limitations of computation capabilities and communication resources, it brings more challenges to design security schemes for the wearable devices. In this work, a yoking-proofs based authentication protocol (YPAP) is proposed for the wearable devices during secure wireless communications. In the YPAP, lightweight cryptographic operators are applied to realize authentication between a smart phone and two wearable devices, and yoking-proofs are established for the remote cloud server to perform simultaneous identification during a session. Meanwhile, Rubin logic based security formal analysis is performed to prove that the YPAP has theoretical design correctness. It indicates that the proposed protocol is flexible for ubiquitous wearable device applications. © 2015 IEEE.


Yang G.,Run Technologies Co. | Lin Z.-Y.,Run Technologies Co. | Chang Y.-X.,Run Technologies Co. | Wang L.,Run Technologies Co. | And 2 more authors.
Proceedings of 2nd International Conference on Computer Science and Network Technology, ICCSNT 2012 | Year: 2012

Feature selection is an important preprocessing step for data in the classification and regression learning. Many feature selection algorithms have been proposed using the different information criteria based on mutual information. However, there is no such comparative study conducted to analyse the effectiveness of these methods under a specific application framework. In this paper, we select 6 different feature selection algorithms, i.e, RelFss, MIFS-U, FCBF, CMIM, mRMR, and mMIFS-U, to compare their reduction capabilities and classification performances in the application of naive Bayesian based text classification. We collect a lot of documents belonging to ten different domains from the Chinese News Web site (www.people.com.cn) as the experimental data, where each of documents includes 1,000 Chinese characters at least. From the experimental results, we can conclude that naive Bayesian with the features selected by mRMR can obtain the highest classification accuracy. The summarized conclusions give some guidelines for feature selection in text classification application. © 2012 IEEE.


Yao X.,University of Science and Technology Beijing | Liu H.,Run Technologies Co. | Ning H.,University of Science and Technology Beijing | Yang L.T.,St. Francis Xavier University | Xiang Y.,Deakin University
IEEE Cloud Computing | Year: 2015

In the cloud, data is usually stored in ciphertext for security. Attribute-based encryption (ABE) is a popular solution for allowing legal data users to access encrypted data, but it has high overhead and is vulnerable to data leakage. The authors propose an anonymous authorization credential and Lagrange interpolation polynomial-based access control scheme in which an access privilege and one secret share are applied for reconstructing the user's decryption key. Because the credential is anonymously bounded with its owner, only the legal authorized user can access and decrypt the encrypted data without leaking any private information. © 2014 IEEE.


Patent
Run Technologies Co. | Date: 2012-03-21

This application discloses distributed image processing methods and system with massive data flow. The image processing system can include three structures: from the top level to the lower level, a file server, a forwarding server and an image processing server. The servers are connected by Ethernet with hardware and socket interface of TCP/IP protocol. When processing a large amount of image data, many forwarding servers can be implemented for file processing in conjunction with one or more file servers. Image analysis servers and forwarding servers can be added to increase processing capacity. A high-level forwarding server can be added for receiving, formatting, transmitting, and distributing image data.

Loading Run Technologies Co. collaborators
Loading Run Technologies Co. collaborators