Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guowei Wu is active.

Publication


Featured researches published by Guowei Wu.


green computing and communications | 2010

iCare: A Mobile Health Monitoring System for the Elderly

Ziyu Lv; Feng Xia; Guowei Wu; Lin Yao; Zhikui Chen

This paper describes a mobile health monitoring system called iCare for the elderly. We use wireless body sensors and smart phones to monitor the well being of the elderly. It can offer remote monitoring for the elderly anytime anywhere and provide tailored services for each person based on their personal health condition. When detecting an emergency, the smart phone will automatically alert pre-assigned people who could be the old peoples family and friends, and call the ambulance of the emergency centre. It also acts as the personal health information system and the medical guidance which offers one communication platform and the medical knowledge database so that the family and friends of the served people can cooperate with doctors to take care of him/her. The system also features some unique functions that cater to the living demands of the elderly, including regular reminder, quick alarm, medical guidance, etc. iCare is not only a real-time health monitoring system for the elderly, but also a living assistant which can make their lives more convenient and comfortable.


Journal of Computer and System Sciences | 2012

Energy efficient ant colony algorithms for data aggregation in wireless sensor networks

Chi Lin; Guowei Wu; Feng Xia; Mingchu Li; Lin Yao; Zhongyi Pei

In energy-constrained wireless sensor networks, energy efficiency is critical for prolonging the network lifetime. A family of ant colony algorithms called DAACA for data aggregation are proposed in this paper. DAACA consists of three phases: initialization, packets transmissions and operations on pheromones. In the transmission phase, each node estimates the remaining energy and the amount of pheromones of neighbor nodes to compute the probabilities for dynamically selecting the next hop. After certain rounds of transmissions, the pheromones adjustments are performed, which take the advantages of both global and local merits for evaporating or depositing pheromones. Four different pheromones adjustment strategies which constitute DAACA family are designed to prolong the network lifetime. Experimental results indicate that, compared with other data aggregation algorithms, DAACA shows higher superiority on average degree of nodes, energy efficiency, prolonging the network lifetime, computation complexity and success ratio of one hop transmission. At last, the features of DAACA are analyzed.


Journal of Network and Computer Applications | 2014

Human mobility in opportunistic networks: Characteristics, models and prediction methods

Poria Pirozmand; Guowei Wu; Behrouz Jedari; Feng Xia

Abstract Opportunistic networks (OppNets) are modern types of intermittently connected networks in which mobile users communicate with each other via their short-range devices to share data among interested observers. In this setting, humans are the main carriers of mobile devices. As such, this mobility can be exploited by retrieving inherent user habits, interests, and social features for the simulation and evaluation of various scenarios. Several research challenges concerning human mobility in OppNets have been explored in the literature recently. In this paper, we present a thorough survey of human mobility issues in three main groups (1) mobility characteristics, (2) mobility models and traces, and (3) mobility prediction techniques. Firstly, spatial, temporal, and connectivity properties of human motion are explored. Secondly, real mobility traces which have been captured using Bluetooth/Wi-Fi technologies or location-based social networks are summarized. Furthermore, simulation-based mobility models are categorized and state-of-the art articles in each category are highlighted. Thirdly, new human mobility prediction techniques which aim to forecast the three aspects of human mobility, i.e.; users׳ next walks, stay duration and contact opportunities are studied comparatively. To conclude, some major open issues are outlined.


Sensors | 2010

Dynamical Jumping Real-Time Fault-Tolerant Routing Protocol for Wireless Sensor Networks

Guowei Wu; Chi Lin; Feng Xia; Lin Yao; He Zhang

In time-critical wireless sensor network (WSN) applications, a high degree of reliability is commonly required. A dynamical jumping real-time fault-tolerant routing protocol (DMRF) is proposed in this paper. Each node utilizes the remaining transmission time of the data packets and the state of the forwarding candidate node set to dynamically choose the next hop. Once node failure, network congestion or void region occurs, the transmission mode will switch to jumping transmission mode, which can reduce the transmission time delay, guaranteeing the data packets to be sent to the destination node within the specified time limit. By using feedback mechanism, each node dynamically adjusts the jumping probabilities to increase the ratio of successful transmission. Simulation results show that DMRF can not only efficiently reduce the effects of failure nodes, congestion and void region, but also yield higher ratio of successful transmission, smaller transmission delay and reduced number of control packets.


ubiquitous computing | 2013

Protecting the sink location privacy in wireless sensor networks

Lin Yao; Lin Kang; Pengfei Shang; Guowei Wu

Wireless sensor networks (WSNs) are widely deployed to collect data in military and civilian applications today. Due to the open nature of a WSN, it is relatively easy for an adversary to eavesdrop and trace packets in order to capture the receiver. Therefore, location privacy, particularly the location privacy of the sink node, requires ultimate protection because of its critical position in WSNs. In this paper, we propose a sink location privacy protection scheme by injecting fake packets, but every real packet is still routed along its shortest path. The fake packets are routed to some random destinations and some fake sinks in order to provide the path diversity. It is difficult for an attacker to distinguish the real packets from the fake packets. Thus, the chance of finding the real sink by packet-tracing attack is reduced. Privacy analysis shows that the sink location privacy can be protected better with higher successful probability. We examine the packet travel delay, safe time, and energy consumption by both mathematical analysis and simulations.


Journal of Systems and Software | 2016

Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks

Chi Lin; Guowei Wu; Mohammad S. Obaidat; Chang Wu Yu

Merging and clustering charging algorithms named HCCA and HCCA-TS are proposed for WRSN.HCCA combines K-means clustering and hierarchical clustering for enhancing charging efficiency.HCCA-TS optimizes the performance of HCCA from a task splitting view. As the interdiscipline of wireless communication and control engineering, the periodical charging issue in Wireless Rechargeable Sensor Networks (WRSNs) is a popular research problem. However, existing techniques for periodical charging neglect to focus on the location relationship and topological feature, leading to large charging times and long traveling time. In this paper, we develop a hybrid clustering charging algorithm (HCCA), which firstly constructs a network backbone based on a minimum connected dominating set built from the given network. Next, a hierarchical clustering algorithm which takes advantage of location relationship, is proposed to group nodes into clusters. Afterward, a K-means clustering algorithm is implemented to calculate the energy core set for realizing energy awareness. To further optimize the performance of HCCA, HCCA-TS is proposed to transform the energy charging process into a task splitting model. Tasks generated from HCCA are split into small tasks, which aim at reducing the charging time to enhance the charging efficiency. At last, simulations are carried out to demonstrate the merit of the schemes. Simulation results indicate that HCCA can enhance the performance in terms of reducing charging times, journey time and average charging time simultaneously. Moreover, HCCA-TS can further improve the performance of HCCA.


International Journal of Distributed Sensor Networks | 2011

A Biometric Key Establishment Protocol for Body Area Networks

Lin Yao; Guowei Wu; Kai Yao; Jia Wang

Current advances in semiconductor technology have made it possible to implant a network of biosensors inside the human body for health monitoring. In the context of a body area network (BAN), the confidentiality and integrity of the sensitive health information is particularly important. In this paper, we present an ECG (electrocardiogram)-signal-based key establishment protocol to secure the communication between every sensor and the control unit before the physiological data are transferred to external networks for remote analysis or diagnosis. The uniqueness of ECG signal guarantees that our protocol can provide long, random, distinctive and temporal variant keys. Biometric Encryption technique is applied to achieve the mutual authentication and derive a non-linkable session key between every sensor and the control unit. The correctness of the proposed key establishment protocol is formally verified based on SVO logic. Security analysis shows that our protocol can guarantee data confidentiality, authenticity and integrity. Performance analysis shows that it is a lightweight protocol.


Journal of Medical Systems | 2016

Differential Privacy Preserving in Big Data Analytics for Connected Health

Chi Lin; Zihao Song; Houbing Song; Yanhong Zhou; Yi Wang; Guowei Wu

In Body Area Networks (BANs), big data collected by wearable sensors usually contain sensitive information, which is compulsory to be appropriately protected. Previous methods neglected privacy protection issue, leading to privacy exposure. In this paper, a differential privacy protection scheme for big data in body sensor network is developed. Compared with previous methods, this scheme will provide privacy protection with higher availability and reliability. We introduce the concept of dynamic noise thresholds, which makes our scheme more suitable to process big data. Experimental results demonstrate that, even when the attacker has full background knowledge, the proposed scheme can still provide enough interference to big sensitive data so as to preserve the privacy.


Journal of Systems Architecture | 2016

TADP: Enabling temporal and distantial priority scheduling for on-demand charging architecture in wireless rechargeable sensor Networks

Chi Lin; Zhiyuan Wang; Ding Han; Youkun Wu; Chang Wu Yu; Guowei Wu

Abstract Recently, adopting mobile energy chargers to replenish the energy supply of sensor nodes in wireless sensor networks has gained increasing attentions from the research community. The utilization of the mobile energy chargers provides a more reliable energy supply than systems harvesting dynamic energy from the surrounding environment. Wireless power transfer technique provides a new alternative for solving the limited power capacity problem for so many popular mobile wireless devices, and makes wireless rechargeable sensor networks (WRSNs) promising. However, mainly due to the underestimate of the unbalanced influences of spatial and temporal constraints posed by charging requests, traditional scheduling strategies for on-demand WRSNs architecture achieve rather low charging request throughput or successful rate, posing as a major bottleneck for further improvements. In this paper, we propose a T empor A l & D istantial P riority charging scheduling algorithm (TADP), which takes both the distance between nodes and the mobile charger and the arrival time of charging requests into consideration, and quantizes these two factors step by step. TADP forms a mixed priority queue which directs mobile charger to replenish the energy for nodes. At last extensive simulations are conducted to demonstrate the advantages of TADP. Simulation results reveal that TADP can achieve better scheduling performance in guaranteeing the scheduling success of the high-priority tasks and improving stability of the system.


The Journal of Supercomputing | 2013

Enhancing the attacking efficiency of the node capture attack in WSN: a matrix approach

Chi Lin; Guowei Wu

In the node capture attack, the adversary intelligently captures nodes and extracts the cryptographic keys from their memories to destroy the security, reliability and confidentiality of the wireless sensor networks. However, it suffers from low attacking efficiency and high resource expenditure. In this paper, we approach this attack from an adversarial view and develop a matrix-based method to model the process of the node capture attack. We establish a matrix to indicate the compromising relationship between the nodes and the paths. We propose a Matrix-based node capture attack Algorithm (MA in short), which can maximize the destructiveness while consuming the minimum resource expenditure. We conduct several experiments to show the performance of MA. Experimental results manifest that MA can reduce the attacking round, shorten the execution time, enhance the attacking efficiency and conserve the energy cost.

Collaboration


Dive into the Guowei Wu's collaboration.

Top Co-Authors

Avatar

Lin Yao

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Chi Lin

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Feng Xia

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jing Deng

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Jiankang Ren

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zichuan Xu

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tie Qiu

Dalian University of Technology

View shared research outputs
Top Co-Authors

Avatar

Zuosong Liu

Dalian University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge