Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Huansheng Ning is active.

Publication


Featured researches published by Huansheng Ning.


Sensors | 2012

A Survey on Gas Sensing Technology

Xiao Liu; Sitian Cheng; Hong Liu; Sha Hu; Daqiang Zhang; Huansheng Ning

Sensing technology has been widely investigated and utilized for gas detection. Due to the different applicability and inherent limitations of different gas sensing technologies, researchers have been working on different scenarios with enhanced gas sensor calibration. This paper reviews the descriptions, evaluation, comparison and recent developments in existing gas sensing technologies. A classification of sensing technologies is given, based on the variation of electrical and other properties. Detailed introduction to sensing methods based on electrical variation is discussed through further classification according to sensing materials, including metal oxide semiconductors, polymers, carbon nanotubes, and moisture absorbing materials. Methods based on other kinds of variations such as optical, calorimetric, acoustic and gas-chromatographic, are presented in a general way. Several suggestions related to future development are also discussed. Furthermore, this paper focuses on sensitivity and selectivity for performance indicators to compare different sensing technologies, analyzes the factors that influence these two indicators, and lists several corresponding improved approaches.


Archive | 2008

The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems

Lu Yan; Yan Zhang; Laurence T. Yang; Huansheng Ning

Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which todays Internet of People gives way to tomorrows Internet of Things where billions of objects will have the ability to report their location, identity, and history over wireless connections. Connectivity and Communication Anything, Anywhere, and Anytime An examination of the exciting expansion period in this research, The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies, experience reports, and best practice, it contains information on emerging technologies, market opportunities, and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things, this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs, itis a comprehensive technical and practical guide to recent advances in pervasive networked systems.


IEEE Computer | 2013

Cyberentity Security in the Internet of Things

Huansheng Ning; Hong Liu; Laurence T. Yang

A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.


Future Generation Computer Systems | 2016

A kernel machine-based secure data sensing and fusion scheme in wireless sensor networks for the cyber-physical systems

Xiong Luo; Dandan Zhang; Laurence T. Yang; Ji Liu; Xiaohui Chang; Huansheng Ning

Wireless sensor networks (WSNs) as one of the key technologies for delivering sensor-related data drive the progress of cyber-physical systems (CPSs) in bridging the gap between the cyber world and the physical world. It is thus desirable to explore how to utilize intelligence properly by developing the effective scheme in WSN to support data sensing and fusion of CPS. This paper intends to serve this purpose by proposing a prediction-based data sensing and fusion scheme to reduce the data transmission and maintain the required coverage level of sensors in WSN while guaranteeing the data confidentiality. The proposed scheme is called GM-KRLS, which is featured through the use of grey model (GM), kernel recursive least squares (KRLS), and Blowfish algorithm (BA). During the data sensing and fusion process, GM is responsible for initially predicting the data of next period with a small number of data items, while KRLS is used to make the initial predicted value approximate its true value with high accuracy. The KRLS as an improved kernel machine learning algorithm can adaptively adjust the coefficients with every input, while making the predicted value more close to actual value. And BA is used for data encoding and decoding during the transmission process due to its successful applications across a wide range of domains. Then, the proposed secure data sensing and fusion scheme GM-KRLS can provide high prediction accuracy, low communication, good scalability, and confidentiality. In order to verify the effectiveness and reasonableness of our proposed approach, we conduct simulations on actual data sets that are collected from sensors in the Intel Berkeley research lab. The simulation results have shown that the proposed scheme can significantly reduce redundant transmissions with high prediction accuracy. A novel data sensing and fusion scheme GM-KRLS is proposed in WSNs for the CPSs.GM-KRLS develops a prediction mechanism to reduce redundant transmissions in WSN.GM-KRLS improves the prediction accuracy with a kernel machine learning algorithm.Blowfish algorithm is employed to guarantee the confidentiality in our scheme.


Future Generation Computer Systems | 2016

Cybermatics: Cyber–physical–social–thinking hyperspace based science and technology

Huansheng Ning; Hong Liu; Jianhua Ma; Laurence T. Yang; Runhe Huang

Abstract The Internet of Things (IoT) is becoming an attractive system paradigm, in which physical perceptions, cyber interactions, social correlations, and even cognitive thinking can be intertwined in the ubiquitous things’ interconnections. It realizes a perfect integration of a new cyber–physical–social–thinking (CPST) hyperspace, which has profound implications for the future IoT. In this article, a novel concept Cybermatics is put forward as a broader vision of the IoT (called hyper IoT) to address science and technology issues in the heterogeneous CPST hyperspace. This article covers a broaden research field and presents a preliminary study focusing on its three main features (i.e., interconnection, intelligence, and greenness). Concretely, interconnected Cybermatics refers to the variants of Internet of anything, such as physical objects, cyber services, social people, and human thinking; intelligent Cybermatics considers the cyber–physical–social–thinking computing to provide algorithmic support for system infrastructures; green Cybermatics addresses energy issues to ensure efficient communications and networking. Finally, open challenging science and technology issues are discussed in the field of Cybermatics.


IEEE Transactions on Parallel and Distributed Systems | 2015

Aggregated-Proof Based Hierarchical Authentication Scheme for the Internet of Things

Huansheng Ning; Hong Liu; Laurence T. Yang

The Internet of Things (IoT) is becoming an attractive system paradigm to realize interconnections through the physical, cyber, and social spaces. During the interactions among the ubiquitous things, security issues become noteworthy, and it is significant to establish enhanced solutions for security protection. In this work, we focus on an existing U2IoT architecture (i.e., unit IoT and ubiquitous IoT), to design an aggregated-proof based hierarchical authentication scheme (APHA) for the layered networks. Concretely, 1) the aggregated-proofs are established for multiple targets to achieve backward and forward anonymous data transmission; 2) the directed path descriptors, homomorphism functions, and Chebyshev chaotic maps are jointly applied for mutual authentication; 3) different access authorities are assigned to achieve hierarchical access control. Meanwhile, the BAN logic formal analysis is performed to prove that the proposed APHA has no obvious security defects, and it is potentially available for the U2IoT architecture and other IoT applications.


IEEE Transactions on Information Forensics and Security | 2014

Role-Dependent Privacy Preservation for Secure V2G Networks in the Smart Grid

Hong Liu; Huansheng Ning; Yan Zhang; Qingxu Xiong; Laurence T. Yang

Vehicle-to-grid (V2G), involving both charging and discharging of battery vehicles (BVs), enhances the smart grid substantially to alleviate peaks in power consumption. In a V2G scenario, the communications between BVs and power grid may confront severe cyber security vulnerabilities. Traditionally, authentication mechanisms are solely designed for the BVs when they charge electricity as energy customers. In this paper, we first show that, when a BV interacts with the power grid, it may act in one of three roles: 1) energy demand (i.e., a customer); 2) energy storage; and 3) energy supply (i.e., a generator). In each role, we further demonstrate that the BV has dissimilar security and privacy concerns. Hence, the traditional approach that only considers BVs as energy customers is not universally applicable for the interactions in the smart grid. To address this new security challenge, we propose a role-dependent privacy preservation scheme (ROPS) to achieve secure interactions between a BV and power grid. In the ROPS, a set of interlinked subprotocols is proposed to incorporate different privacy considerations when a BV acts as a customer, storage, or a generator. We also outline both centralized and distributed discharging operations when a BV feeds energy back into the grid. Finally, security analysis is performed to indicate that the proposed ROPS owns required security and privacy properties and can be a highly potential security solution for V2G networks in the smart grid. The identified security challenge as well as the proposed ROPS scheme indicates that role-awareness is crucial for secure V2G networks.


Archive | 2013

Unit and Ubiquitous Internet of Things

Huansheng Ning

Although the Internet of Things (IoT) will play a key role in the development of next generation information, network, and communication technologies, many are still unclear about what makes IoT different from similar concepts.Answering fundamental questions about IoT architectures and models, Unit and Ubiquitous Internet of Things introduces essential IoT concepts from the perspectives of mapping and interaction between the physical world and the cyber world. It addresses key issues such as strategy and education, particularly around unit and ubiquitous IoT technologies. Supplying a new perspective on IoT, the book covers emerging trends and presents the latest progress in the field. It also: Outlines a fundamental architecture for future IoT together with the IoT layered model Describes various topological structures, existence forms, and corresponding logical relationships Establishes an IoT technology system based on the knowledge of IoT scientific problems Provides an overview of the core technologies, including basic connotation, development status, and open challenges The book examines ubiquitous sensing, networking, and communications, as well as information management involved in unit IoT. It describes global IoT applications and includes coverage of ubiquitous, local, industrial, national, and transnational IoT. Presenting detailed case studies that illustrate various application scenarios, the text considers the main IoT supporting technologies including resource management, loop control in actuation, session management, space-time consistency, security and privacy, energy management, spectrum management, nanotechnology, quantum technology, and big data.


IEEE Wireless Communications | 2013

Securing vehicle-to-grid communications in the smart grid

Yan Zhang; Stein Gjessing; Hong Liu; Huansheng Ning; Laurence T. Yang; Mohsen Guizani

Using vehicle-to-grid (V2G) services, battery vehicles (BVs) may help the smart grid alleviate peaks in power consumption. However, wireless communications infrastructure between BVs and the smart grid also introduce severe and unprecedented security vulnerabilities. In this article, we discuss V2G network architectures and present state-of-the-art security, including different security challenges during V2G power and communications interactions. Then we report on our context-aware authentication solution for V2G communications in the smart grid. Finally, we describe several open issues for secure V2G networks.


IEEE Transactions on Parallel and Distributed Systems | 2013

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

Hong Liu; Huansheng Ning; Yan Zhang; Daojing He; Qingxu Xiong; Laurence T. Yang

Along with radio frequency identification (RFID) becoming ubiquitous, security issues have attracted extensive attentions. Most studies focus on the single-reader and single-tag case to provide security protection, which leads to certain limitations for diverse applications. This paper proposes a grouping-proofs-based authentication protocol (GUPA) to address the security issue for multiple readers and tags simultaneous identification in distributed RFID systems. In GUPA, distributed authentication mode with independent subgrouping proofs is adopted to enhance hierarchical protection; an asymmetric denial scheme is applied to grant fault-tolerance capabilities against an illegal reader or tag; and a sequence-based odd-even alternation group subscript is presented to define a function for secret updating. Meanwhile, GUPA is analyzed to be robust enough to resist major attacks such as replay, forgery, tracking, and denial of proof. Furthermore, performance analysis shows that compared with the known grouping-proof or yoking-proof-based protocols, GUPA has lower communication overhead and computation load. It indicates that GUPA realizing both secure and simultaneous identification is efficient for resource-constrained distributed RFID systems.

Collaboration


Dive into the Huansheng Ning's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Laurence T. Yang

St. Francis Xavier University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xuanxia Yao

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Zahid Mahmood

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Tao Zhu

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Tie Qiu

Dalian University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge