Time filter

Source Type

Gong S.,CAS Shanghai Institute of Microsystem and Information Technology | Gong S.,University of Chinese Academy of Sciences | Gong S.,Wuxi Sensing Net Industrialization Research Institute | Wang Y.,CAS Shanghai Institute of Microsystem and Information Technology
2011 2nd International Conference on Mechanic Automation and Control Engineering, MACE 2011 - Proceedings | Year: 2011

With the increasing pollution of lake water environment and frequent outbreaks of blue-green algae, it is very significant to establish one kind of distributed real-time monitoring network on all typical locations of the lake. In this way, the pollution of lake water environment can be effectively controlled. Nowadays, the stability of data reporting and how to maximize the use of limited power are the biggest problems to the design of real-time monitoring networks. In this paper, according to characteristics of lake monitoring, the design of lake water quality detection system based on wireless sensor network is presented. Key technologies and issues were discussed in the paper based on lake monitoring sensor network topology design, network protocol design and node hardware and software design. Also the application of lake water quality detection system in the Taihu lake was discussed. © 2011 IEEE.


Gong S.,CAS Shanghai Institute of Microsystem and Information Technology | Gong S.,University of Chinese Academy of Sciences | Xing T.,CAS Shanghai Institute of Microsystem and Information Technology | Xing T.,Wuxi Sensing Net Industrialization Research Institute
2011 2nd International Conference on Mechanic Automation and Control Engineering, MACE 2011 - Proceedings | Year: 2011

A low-cost scissors gate control system was achieved in this paper,which has many front controllers based on real-time operating system of free FreeRTOS, open-source uIP,and ARM Cortex-M3 MCU. This system realized a ID interface by using rfid technology or twodimensional codes. Also TCP/IP data channel, gate control, information management and so on were carried out in this system. Moreover this paper described the implementation of the system. According to the actual situations, it indicated that this system runned reliably and stably. © 2011 IEEE.


Lu Z.,CAS Shanghai Institute of Microsystem and Information Technology | Yu Z.,Wuxi Sensing Net Industrialization Research Institute | Liu H.,CAS Shanghai Institute of Microsystem and Information Technology | Liu H.,Wuxi Sensing Net Industrialization Research Institute
Hsi-An Chiao Tung Ta Hsueh/Journal of Xi'an Jiaotong University | Year: 2012

A cooperating mechanism with dedicated cooperating nodes is studied to solve the unreliability problem of up links from users to cooperating nodes and destinations in wireless communication system. In the case that up links from users to cooperative nodes are not reliable, both channel coding and network coding are introduced into the cooperative communication system to propose a cooperating mechanism based on joint channel-network coding. As a measure of system performance, the system outage probability is analyzed and an expression for the probability is derived. Effects of energy allocation and rate allocation on the system performance are analyzed based on the system outage probability, and then an appropriate allocation method is proposed. Analysis and simulation show that even though up links are not reliable, the proposed cooperating mechanism can still achieve spatial diversity, and improve the system performance.


Xiaopeng L.,Beijing University of Posts and Telecommunications | Wendong W.,Beijing University of Posts and Telecommunications | Xiangyang G.,Beijing University of Posts and Telecommunications | Jian M.,Beijing University of Posts and Telecommunications | Jian M.,Wuxi Sensing Net Industrialization Research Institute
China Communications | Year: 2011

To address cross-ISP traffic problem caused by BitTorrent, we present our design and evaluation of a proximity-aware BitTorrent system. In our approach, clients generate global proximityaware information by using landmark clustering; the tracker uses this proximity to maintain all **peers in an orderly way and hands back a biased subset consisting of the peers who are physically closest to the requestor. Our approach requires no co-operation between P2P users and their Internet infra structures, such as ISPs or CDNs, no constantly path monitoring or probing their neighbors. The simulation results show that our approach can not only reduce unnecessary cross- ISP traffic, but also allow downloadsing fast.


Zhang J.,Beijing University of Posts and Telecommunications | Wang W.,Beijing University of Posts and Telecommunications | Ma J.,Beijing University of Posts and Telecommunications | Ma J.,Wuxi Sensing Net Industrialization Research Institute | Li X.,Beijing University of Posts and Telecommunications
Journal of Convergence Information Technology | Year: 2012

RFID, capable of non-contact automatic identification using the small, low-cost RFID tags, is taking the place of barcodes to become electronic tags of the new generation. EPCglobal Class-1 Generation-2 specification (Gen2 in brief) has been approved as ISO18000-6C for global use, but the identity of tag (TID) is delivered in plaintext which makes insecurity. Several solutions have been proposed based on Cyclic Redundancy Check (CRC). Due to the bad properties of the CRC function used in the protocol; the claimed security objectives are not met. In this paper, we propose a novel authentication protocol based on Gen2 for low-cost RFID tags which use the Pseudo-Random Number Generator (PRNG in brief) function instead of the CRC function. The advantages of the novel authentication is that the proposed protocol could withstand de-synchronization attack, disclosure attack and cloning attack, furthermore, it also could provide anonymity and mutual authentication.


Deng H.,East China Normal University | Deng H.,Wuxi Sensing Net Industrialization Research Institute | Zhang B.,University of Chinese Academy of Sciences | Jiao Z.,University of Chinese Academy of Sciences | Li C.,Memorial University of Newfoundland
Wireless Communications and Mobile Computing | Year: 2014

Achieving high data quality and efficient network resource utilization is two major design objectives of wireless sensor networks (WSNs). However, these two objectives are often conflictive. By allowing sensors to report sampled data at high rates, fine-grained data quality can be obtained. However, the limited resources of a WSN make it difficult to support very high traffic rate. Therefore, the capability of adaptively adjusting sensor nodes' traffic-generating rates on the basis of the availability of network resources and application requirements is critical. This issue has attracted much attention recently, and some work has been carried out.To achieve high data quality and improved utilization of network resources, in this paper, we propose rate-based adaptive precision setting (RAPS) protocol, which works in a way that each sensor can adaptively adjust its traffic-generating rate on the basis of the current network resources availability and application requirements. RAPS introduces the following two key factors into its design: application's precision requirement and packet arrival rate. Analytical and simulation results show that RAPS can achieve improved data quality while reducing packet delivery latency. Copyright © 2012 John Wiley & Sons, Ltd.


Gong S.,CAS Shanghai Institute of Microsystem and Information Technology | Li X.,University of Chinese Academy of Sciences | Xing T.,Beijing University of Posts and Telecommunications | Ma J.,Wuxi Sensing Net Industrialization Research Institute
Advances in Information Sciences and Service Sciences | Year: 2011

Trust and reputation model is a basic mean to protect the security of Wireless Sensor Networks (WSNs). Although various trust and reputation models for WSNs have been proposed, as we know, none of them can achieve high accurate estimation of trustworthiness. In this paper, we present a new least-squares estimates based trust and reputation model for WSNs (LsTrust). The model uses historical samples to estimate the trustworthiness of the node, and calculates the reputation evaluation by combining the average algorithm and the least-squares algorithm. Furthermore, considering that the computation abilities of sensor nodes are limited, we propose a recursive algorithm to simplify the computation. Finally, experiments show that compared with some previous models, the proposed Ls Trust model is more accurate in trust evaluation under three typical changing states of trustworthiness, i.e. ascending state, descending state and fluctuating state.


Wang W.,Beijing University of Posts and Telecommunications | Lv X.,Beijing University of Posts and Telecommunications | Gong X.,Beijing University of Posts and Telecommunications | Ma J.,Beijing University of Posts and Telecommunications | Ma J.,Wuxi Sensing Net Industrialization Research Institute
Proceedings - 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology, IC-BNMT 2011 | Year: 2011

BitTorrent has generated a significant and continuously increasing portion of Internet traffic. Several designs have been recently proposed to reduce the BitTorrent traffic without sacrificing user downloading performance. However, Most of these designs only consider IPv4-only Internet, not thinking about IPv4/IPv6 hybrid network. With the exhaustion of IPv4 addresses and the development of IPv6, the Internet is being converted from IPv4-only into IPv4/IPv6 hybrid. Thus, this paper examines a new approach to making BitTorrent system suitable to IPv4/IPv6 hybrid network, in which the dual-stack peers can share file via IPv4 or IPv6 connection. We present a simulation-based study in a special IPv4/IPv6 hybrid network topology based on CERNET and CERNET2. The simulation results show that our approach can effectively transfer BitTorrent traffic from IPv4 network to IPv6 network. © 2011 IEEE.


Zhu J.,CAS Shanghai Institute of Microsystem and Information Technology | Zhu J.,Wuxi Sensing Net Industrialization Research Institute | Cao H.,Wuxi Sensing Net Industrialization Research Institute | Liang Q.,CAS Shanghai Institute of Microsystem and Information Technology | Liang Q.,Wuxi Sensing Net Industrialization Research Institute
Journal of Information and Computational Science | Year: 2012

Aiming at the problems that when common algorithms are adopted to detect foreground objects in traffic surveillance videos, there are more false detection results with higher memory and time cost, an algorithm based on the approximated median filter is proposed for vehicle object detection under complex traffic scenes. The algorithm, which can suppress noise effectively without setting complicated parameters, takes full advantage of the information between adjacent video frames and sets up a dynamic model of the background updating rate to adjust the background updating rate adaptively in different regions of the background. It effectively decreases the complexity of computation and solves the problem of object ghost in the background caused by slow motion of the objects during the process of the background updating. The experimental results show that the proposed algorithm not only improves the accuracy of the foreground objects detection but also improves the real-time performance of the detection. © 2012 Binary Information Press.


Ma R.,CAS Shanghai Institute of Microsystem and Information Technology | Yu Z.,Wuxi Sensing Net Industrialization Research Institute | Liu H.,Wuxi Sensing Net Industrialization Research Institute
Journal of Information and Computational Science | Year: 2012

There are some problems on the neighbor nodes selection method in Wireless Sensor Networks. The Neighbors Selection Algorithm, based on the communication energy consumption between pairs of nodes, is proposed and applied to enhance the DV routing protocol and DV-Hop localization algorithm. According to the simulation results, in the networks where the node radio range is larger than the average distance between adjacent nodes, the modified routing method could cut down the routing energy consumption, and the modified localization algorithm could achieve better localization accuracy. Copyright © 2012 Binary Information Press.

Loading Wuxi Sensing Net Industrialization Research Institute collaborators
Loading Wuxi Sensing Net Industrialization Research Institute collaborators