Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guorui Li is active.

Publication


Featured researches published by Guorui Li.


Computer Communications | 2008

Group-based intrusion detection system in wireless sensor networks

Guorui Li; Jingsha He; Yingfang Fu

Many mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection algorithm to identify malicious attackers. In this paper, we propose a distributed group-based intrusion detection scheme that meets all the above requirements by partitioning the sensor networks into many groups in which the sensors in each group are physically close to each other and are equipped with the same sensing capability. Our intrusion detection algorithm takes simultaneously into consideration of multiple attributes of the sensor nodes to detect malicious attackers precisely. We show through experiments with real data that our algorithm can decrease the false alarm rate and increase the detection accuracy compared with existing intrusion detection schemes while lowering the computation and transmission power consumption.


international conference on distributed computing systems workshops | 2008

A Distributed Intrusion Detection Scheme for Wireless Sensor Networks

Guorui Li; Jingsha He; Yingfang Fu

Many mission critical wireless sensor networks require an efficient, lightweight and flexible intrusion detection algorithm to identify malicious attackers. In this paper, we propose a distributed group-based intrusion detection scheme that meets all the above requirements by partitioning the sensor networks into many groups in which the sensors in each group are physically close to each other and are equipped with the same sensing capability. Our intrusion detection algorithm takes into consideration of multiple attributes of the sensor nodes simultaneously to detect malicious attackers precisely. We show through experiments with real data that our algorithm can decrease the false alarm rate and increase the detection accuracy rate compared with existing intrusion detection schemes while lowering the power consumption.


international conference on parallel processing | 2006

A hexagon-based key predistribution scheme in sensor networks

Guorui Li; Jingsha He; Yingfang Fu

Sensor networks are widely used in environment exploration and disaster recovery and in military applications due to their self-organization characteristics and distributed nature. As a fundamental requirement for providing security functionality in sensor networks, key management plays a central role in authentication and encryption. In this paper, we present a hexagon-based key predistribution scheme and show that it can improve the key management in sensor network through the use of the bivariate polynomial in a hexagonal coordinate system based on deployment information about expected locations of the sensor nodes. We show that the scheme presented here can improve the probability of establishing pairwise keys between sensor nodes of up to two hops apart by more than 40% over previous schemes


international conference on communications | 2008

Mutual Authentication in Wireless Mesh Networks

Yingfang Fu; Jingsha He; Rong Wang; Guorui Li

A wireless mesh network (WMN) is a new wireless network technology and there is a trend to adopt the technology to build commercial mobile ad hoc networks. Since a WMN is such a network without fixed infrastructure and is operated in an open medium, any user within the range covered by radio wave may access the network. Therefore, a critical requirement for the security in WMN is the authentication of a new user who is trying to join the network. In this paper, we present a new authentication scheme based on a combination of techniques, such as zone-based hierarchical topology structure, virtual certification authority (CA), off-line CA, identity-based cryptosystem and multi-signature. We show that our scheme would improve authentication in security, computational overhead, traffic, authentication latency and storage space.


computer software and applications conference | 2007

A Distributed Intrusion Detection Scheme for Mobile Ad Hoc Networks

Yingfang Fu; Jingsha He; Guorui Li

A mobile ad hoc network is a multi-path autonomous system comprised of many mobile nodes with wireless transmission capability. In this paper, we first review current research in intrusion detection in ad hoc networks. Then, by considering the characteristics of such networks in which free movement of mobile nodes can lead to frequent topological changes, especially network separation and convergence, we propose an intrusion detection scheme based on a combination of techniques, such as hierarchical topology structure, distributed voting, off-line CA and composite key management, and show that the proposed scheme could improve intrusion detection in the areas of security, expandability, validity, fault tolerance and usability.


grid and pervasive computing | 2008

A Group-Based Intrusion Detection Scheme in Wireless Sensor Networks

Guorui Li; Jingsha He; Yingfang Fu

Wireless sensor networks are susceptible to many types of attacks because of their constrained capacity, such as limitation in computation power, memory and battery lifetime. In this paper, we propose a group- based intrusion detection scheme that meets the efficient, lightweight and flexible requirements by partitioning the sensor networks into many groups in which the sensors in each group are physically close to each other and are equipped with the same sensing capability. Our intrusion detection algorithm takes into consideration of multiple attributes of the sensor nodes simultaneously to detect malicious attackers precisely. We show through experiments with real data that our algorithm can decrease the false alarm rate and increase the detection accuracy rate compared with existing intrusion detection schemes while lowering the power consumption.


computer software and applications conference | 2008

A Zone-Based Distributed Key Management Scheme for Wireless Mesh Networks

Yingfang Fu; Jingsha He; Liangyu Luan; Rong Wang; Guorui Li

A wireless mesh network (WMN) presents a new wireless network technology for building commercial mobile ad hoc networks. However, security in WMN has not received enough attention in the research community. One main challenge in designing WMNs is the vulnerability of such networks to malicious attacks. In this paper, we propose a zone-based distributed key management scheme for WMNs in which we show that the proposed scheme would improve key management in security, expandability, validity, fault tolerance and usability.


wireless algorithms systems and applications | 2006

Key management in sensor networks

Guorui Li; Jingsha He; Yingfang Fu

Sensor networks are widely used in a variety of commercial and military applications due to their self-organization characteristics and distributed nature. As a basic requirement for supporting security in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we describe the hexagon-based key predistribution scheme and show that it can improve the effectiveness of key management in sensor networks. We show that this key management scheme can improve the probability of establishing pairwise keys between sensor nodes of up to two hops apart by more than 40% over other schemes. We also show that the security of a sensor network would decrease with the increase in sensor node deployment density or in signal propagation distance.


advanced information networking and applications | 2007

A Group-Based Dynamic Key Management Scheme in Wireless Sensor Networks

Guorui Li; Jingsha He; Yingfang Fu

Sensor networks are widely used in a variety of commercial and military applications. As a fundamental requirement for providing security functionality in sensor networks, key management plays an essential role in authentication and encryption. In this paper, we propose a group-based dynamic key management scheme in wireless sensor networks. In our scheme, there is no requirement for such infrastructure as base stations and cluster heads and the dynamic key update feature ensures the security of the network without tampering the compromised sensor nodes. We also analyze the connectivity and security of the proposed scheme.


international conference on move to meaningful internet systems | 2006

A composite key management scheme for mobile ad hoc networks

Yingfang Fu; Jingsha He; Guorui Li

An Ad Hoc network is a multi-path autonomous system comprised of a group of mobile nodes with wireless transceivers In this paper, we first review the present research in key management in Ad Hoc networks Then, by considering the characteristics of Ad Hoc networks in which the free movement of nodes can lead to a variety of topological changes, especially network separation and convergence, we propose a new key management scheme based on a combination of techniques, such as hierarchical topology structure, virtual CA (certification authority), offline CA and certificate chain We show that the proposed scheme would improve key management in security, expandability, validity, fault tolerance and usability.

Collaboration


Dive into the Guorui Li's collaboration.

Top Co-Authors

Avatar

Yingfang Fu

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jingsha He

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Rong Wang

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Liangyu Luan

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Wang Rong

Beijing University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge