Anxi Wang
Nanjing University of Information Science and Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Anxi Wang.
IEEE Access | 2016
Jian Shen; Chen Wang; Chin-Feng Lai; Anxi Wang; Han-Chieh Chao
Healthcare data are becoming increasingly important in the life of people. By utilizing healthcare data in a proper and secure manner, the elderly may avoid some sudden diseases, whereas young people can monitor their health condition. In the hospital, for certain sizes of detection objects, an effective method of data transmission becomes very significant. In view of the movement of patients in the hospital, we introduce a type of network called incompletely predictable networks to describe such scenarios. The patients move in a certain trend or are only active in a certain limited range. To achieve high performance when transmitting healthcare data in such networks, a novel protocol called the direction density-based secure routing protocol is proposed in this paper. Both the moving direction and the influence of node group movement are considered. The novel protocol innovatively takes the density of the node moving direction into consideration, which makes full use of the relationships among the moving individuals. Moreover, the design of the secure routing with authenticated message transmission ensures secure healthcare data communication. The simulation shows that our protocol achieves a high packet delivery ratio with low overhead and end-to-end delay.
IEEE Access | 2017
Jian Shen; Anxi Wang; Chen Wang; Patrick C. K. Hung; Chin-Feng Lai
Wireless sensor networks (WSNs) distribute hundreds to thousands of inexpensive micro-sensor nodes in their regions, and these nodes are important parts of Internet of Things (IoT). In WSN-assisted IoT, the nodes are resource constrained in many ways, such as storage resources, computing resources, energy resources, and so on. Robust routing protocols are required to maintain a long network lifetime and achieve higher energy utilization. In this paper, we propose a new energy-efficient centroid-based routing protocol (EECRP) for WSN-assisted IoT to improve the performance of the network. The proposed EECRP includes three key parts: a new distributed cluster formation technique that enables the self-organization of local nodes, a new series of algorithms for adapting clusters and rotating the cluster head based on the centroid position to evenly distribute the energy load among all sensor nodes, and a new mechanism to reduce the energy consumption for long-distance communications. In particular, the residual energy of nodes is considered in EECRP for calculating the centroid′s position. Our simulation results indicate that EECRP performs better than LEACH, LEACH-C, and GEEC. In addition, EECRP is suitable for networks that require a long lifetime and whose base station (BS) is located in the network.
IEEE Transactions on Emerging Topics in Computing | 2017
Jian Shen; Anxi Wang; Chen Wang; Jiguo Li; Yan Zhang
Content-centric computing systems, which can obtain users’ attributes by analyzing information from content, have been widely used in many fields. In social networks, the computing resources of users are restricted. Group authentication schemes are required to ensure the validity of the user and the accuracy of the shared data. In this paper, we propose a content-centric group user authentication scheme to guarantee the security and accuracy of shared data. The proposed group user authentication scheme makes use of the users content to generate the users feature vector. Furthermore, the group authentication scheme based on the identity of each user can guarantee the network security before data sharing. In addition, regular operations in the network are not affected or damaged by incidents that occur during the authentication process. The security and performance analyses show that our scheme is secure against various attacks and has lower computational cost than the existing schemes.
international conference on cloud computing | 2016
Jian Shen; Anxi Wang; Chen Wang; Yongjun Ren; Xingming Sun
The localization technology takes an important role in real-time alarm and rapid response. In this paper, we propose a novel localization method for wireless sensor network which is based on Radio Frequency Identification technology (RBLOCA). This method combines above both techniques and achieves the localization in WSN. The method not only has the advantages of real-time monitoring and low cost of WSN, but also has the characteristics of fast and repeatable use of RFID technology. Experimental results show that the proposed method can achieve a higher positioning accuracy. At the same time, the energy consumption of nodes is also very low. Therefore, we can get the method has a wide range of applications in a number of scenarios such as the forest fire alarm system, underwater sensor network.
computational intelligence | 2015
Jian Shen; Anxi Wang; Chen Wang; Yongjun Ren; Jin Wang
Wireless sensor network (WSN) is a collection of mobile or fixed sensor nodes, where sensor nodes can communicate with each other or the base station (BS) to transmit the necessary information for different applications. The energy of the nodes is constrained and non-replaceable, which leads to design energy efficient protocols to extend the lifetime of WSN, such as the well-known Low Energy Adaptive Clustering Hierarchy (LEACH) protocol and the improved LEACH protocols. In this paper, LEACH, LEACH-C, TEEN and DEEC are simulated and compared to figure out the suitable application environment for them. Simulation is divided into two parts. The first part of simulation focuses on the discussion of the best percentage of nodes selected to be the cluster-heads. In addition, the location of BS inside or outside of the network has significant influence on the performances of different protocols. The second part of the simulation shows the performances of the number of sensors still alive, number of data signals received by BS and total energy dissipation in four different protocols.
Wireless Communications and Mobile Computing | 2018
Chen Wang; Wenying Zheng; Sai Ji; Qi Liu; Anxi Wang
Smart mobile devices are one of the core components of the wireless body area networks (WBANs). These devices shoulder the important task of collecting, integrating, and transmitting medical data. When a personal computer collects information from these devices, it needs to authenticate the identity of them. Some effective schemes have been put forward to the device authentication in WBANs. However, few researchers have studied the WBANs device authentication in emergency situations. In this paper, we present a novel system named emergency medical system without the assistance of doctors. Based on the system, we propose an identity-based fast authentication scheme for smart mobile devices in WBANs. The scheme can shorten the time of device authentication in an emergency to achieve fast authentication. The analysis of this paper proves the security and efficiency of the proposed scheme.
ieee international conference on cloud computing technology and science | 2017
Anxi Wang; Shuzhen Pan; Chen Wang; Jian Shen; Dengzhi Liu
Wireless Sensor Network (WSN) deploys a large amount number of nodes into its monitored range, where watchers can monitor the real-time environment parameter by compressing packets transferred by the cluster head nodes from local regions. In WSN, the resource of energy is restricted. Energy efficient clustering solutions are required to keep a long lifetime and enough data packets by extending the run time of CHs. In this paper, we propose a novel clustering solution to improve the selection and rotation of CHs. The presented solution includes two key parts: a new cluster selection based on the distance to the energy-centroid of the cluster and a new cluster rotation solution based on the residual energy level of the node in order to evenly distribute the energy load among all sensors nodes. In particular, the distance between the node and the energy-centroid in EEC when it comes to the rotation of the cluster head node. Our simulation is based on the platform NS-2. The simulate part presents the performance comparison among EEC and the conventional protocols such as LEACH and LEACH-C in terms of energy efficient, the network lifetime and data packets received by the BS. It is worth noting that EEC outperforms the existing protocols from our simulation results.
International Symposium on Cyberspace Safety and Security | 2017
Jian Shen; Jun Shen; Chen Wang; Anxi Wang
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch auditing to save resources in the auditor side, the design of methods to locate the specific positions of the corrupted data blocks is ignored. In this paper, we propose a novel batch auditing protocol based on the Fibonacci sequence to save resources in the cloud, which is an extension of our previous work. Experimental results and numerical analysis indicate that the proposed scheme is efficient.
Computer Communications | 2017
Jian Shen; Chen Wang; Anxi Wang; Xingming Sun; Sangman Moh; Patrick C. K. Hung
Future Generation Computer Systems | 2017
Jian Shen; Chen Wang; Anxi Wang; Qi Liu; Yang Xiang