Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jiannong Cao is active.

Publication


Featured researches published by Jiannong Cao.


sensor networks ubiquitous and trustworthy computing | 2006

A dynamic user authentication scheme for wireless sensor networks

Kirk H. M. Wong; Yuan Zheng; Jiannong Cao; Shengwei Wang

In this paper, we consider user authentication (UA) for wireless sensor networks. UA is a fundamental issue in designing dependable and secure systems. Imagine that a wireless sensor network is deployed in an intelligent building, a hospital, or even a university campus, to allow legitimate users to send queries and retrieve the respective result at any of the sensor nodes. Importantly, the system needs to provide a means of user authentication to verify if the user is valid. We propose a dynamic strong-password based solution to this access control problem and adapt it into a wireless sensor network environment. The proposed strong-password authentication approach imposes very light computational load and requires simple operations, such as one-way hash function and exclusive-OR operations. We present the design of the proposed scheme and discuss how to make use of the security features on MAC sublayer (medium access control) based on the IEEE 802.15.4 specification. Analysis on security and communication costs is presented to evaluate the effectiveness of the proposed scheme


Journal of Computer Science and Technology | 2008

Middleware for Wireless Sensor Networks: A Survey

Miaomiao Wang; Jiannong Cao; Jing Li; Sajal K. Dasi

Wireless Sensor Networks (WSNs) have found more and more applications in a variety of pervasive computing environments. However, how to support the development, maintenance, deployment and execution of applications over WSNs remains to be a nontrivial and challenging task, mainly because of the gap between the high level requirements from pervasive computing applications and the underlying operation of WSNs. Middleware for WSN can help bridge the gap and remove impediments. In recent years, research has been carried out on WSN middleware from different aspects and for different purposes. In this paper, we provide a comprehensive review of the existing work on WSN middleware, seeking for a better understanding of the current issues and future directions in this field. We propose a reference framework to analyze the functionalities of WSN middleware in terms of the system abstractions and the services provided. We review the approaches and techniques for implementing the services. On the basis of the analysis and by using a feature tree, we provide taxonomy of the features of WSN middleware and their relationships, and use the taxonomy to classify and evaluate existing work. We also discuss open problems in this important area of research.


international conference on cloud computing | 2012

A framework for partitioning and execution of data stream applications in mobile cloud computing

Lei Yang; Jiannong Cao; Yin Yuan; Tao Li; Andy Han; Alvin T. S. Chan

The advances in technologies of cloud computing and mobile computing enable the newly emerging mobile cloud computing paradigm. Three approaches have been proposed for mobile cloud applications: 1) extending the access to cloud services to mobile devices; 2) enabling mobile devices to work collaboratively as cloud resource providers; 3) augmenting the execution of mobile applications on portable devices using cloud resources. In this paper, we focus on the third approach in supporting mobile data stream applications. More specifically, we study the computation partitioning, which aims at optimizing the partition of a data stream application between mobile and cloud such that the application has maximum speed/throughput in processing the streaming data. To the best of our knowledge, it is the first work to study the partitioning problem for mobile data stream applications, where the optimization is placed on achieving high throughput of processing the streaming data rather than minimizing the make span of executions in other applications. We first propose a framework to provide runtime support for the dynamic partitioning and execution of the application. Different from existing works, the framework not only allows the dynamic partitioning for a single user but also supports the sharing of computation instances among multiple users in the cloud to achieve efficient utilization of the underlying cloud resources. Meanwhile, the framework has better scalability because it is designed on the elastic cloud fabrics. Based on the framework, we design a genetic algorithm to perform the optimal partition. We have conducted extensive simulations. The results show that our method can achieve more than 2X better performance over the execution without partitioning.


Sensors | 2009

An energy-aware routing protocol in wireless sensor networks.

Ming Liu; Jiannong Cao; Guihai Chen; Xiaomin Wang

The most important issue that must be solved in designing a data gathering algorithm for wireless sensor networks (WSNS) is how to save sensor node energy while meeting the needs of applications/users. In this paper, we propose a novel energy-aware routing protocol (EAP) for a long-lived sensor network. EAP achieves a good performance in terms of lifetime by minimizing energy consumption for in-network communications and balancing the energy load among all the nodes. EAP introduces a new clustering parameter for cluster head election, which can better handle the heterogeneous energy capacities. Furthermore, it also introduces a simple but efficient approach, namely, intra-cluster coverage to cope with the area coverage problem. We use a simple temperature sensing application to evaluate the performance of EAP and results show that our protocol significantly outperforms LEACH and HEED in terms of network lifetime and the amount of data gathered.


international symposium on pervasive computing and applications | 2006

An Intelligent Car Park Management System based on Wireless Sensor Networks

Vanessa W.S. Tang; Yuan Zheng; Jiannong Cao

Wireless sensor networks (WSNs) have attracted increasing attentions from both academic and industrial communities. It can be deployed in various kinds of environments to monitor and collect information. In this paper, we describe a WSN-based intelligent car parking system. In the system, low-cost wireless sensors are deployed into a car park field, with each parking lot equipped with one sensor node, which detects and monitors the occupation of the parking lot. The status of the parking field detected by sensor nodes is reported periodically to a database via the deployed wireless sensor network and its gateway. The database can be accessed by the upper layer management system to perform various management functions, such as finding vacant parking lots, auto-toll, security management, and statistic report. We have implemented a prototype of the system using crossbow motes. The system evaluation demonstrates the effectiveness of our design and implementation of the car parking system


IEEE Transactions on Parallel and Distributed Systems | 2011

TASA: Tag-Free Activity Sensing Using RFID Tag Arrays

Daqiang Zhang; Jingyu Zhou; Minyi Guo; Jiannong Cao; Tianbao Li

Radio Frequency IDentification (RFID) has attracted considerable attention in recent years for its low cost, general availability, and location sensing functionality. Most existing schemes require the tracked persons to be labeled with RFID tags. This requirement may not be satisfied for some activity sensing applications due to privacy and security concerns and uncertainty of objects to be monitored, e.g., group behavior monitoring in warehouses with privacy limitations, and abnormal customers in banks. In this paper, we propose TASA-Tag-free Activity Sensing using RFID tag Arrays for location sensing and frequent route detection. TASA relaxes the monitored objects from attaching RFID tags, online recovers and checks frequent trajectories by capturing the Received Signal Strength Indicator (RSSI) series for passive RFID tag arrays where objects traverse. In order to improve the accuracy for estimated trajectories and accelerate location sensing, TASA introduces reference tags with known positions. With the readings from reference tags, TASA can locate objects more accurately. Extensive experiment shows that TASA is an effective approach for certain activity sensing applications.


IEEE Journal on Selected Areas in Communications | 2010

Random-walk based approach to detect clone attacks in wireless sensor networks

Yingpei Zeng; Jiannong Cao; Shigeng Zhang; Shanqing Guo; Li Xie

Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, and inserts arbitrary number of replicas into the network. Consequently, the adversary can carry out many internal attacks. Previous solutions on detecting clone attacks have several drawbacks. First, some of them require a central control, which introduces several inherent limits. Second, some of them are deterministic and vulnerable to simple witness compromising attacks. Third, in some solutions the adversary can easily learn the critical witness nodes to start smart attacks and protect replicas from being detected. In this paper, we first show that in order to avoid existing drawbacks, replica-detection protocols must be non-deterministic and fully distributed (NDFD), and fulfill three security requirements on witness selection. To our knowledge, only one existing protocol, Randomized Multicast, is NDFD and fulfills the requirements, but it has very high communication overhead. Then, based on random walk, we propose two new NDFD protocols, RAndom WaLk (RAWL) and Table-assisted RAndom WaLk (TRAWL), which fulfill the requirements while having only moderate communication and memory overheads. The random walk strategy outperforms previous strategies because it distributes a core step, the witness selection, to every passed node of random walks, and then the adversary cannot easily find out the critical witness nodes. We theoretically analyze the required number of walk steps for ensuring detection. Our simulation results show that our protocols outperform an existing NDFD protocol with the lowest overheads in witness selection, and TRAWL even has lower memory overhead than that protocol. The communication overheads of our protocols are higher but are affordable considering their security benefits.


vehicular technology conference | 2010

Adaptive Traffic Light Control in Wireless Sensor Network-Based Intelligent Transportation System

Binbin Zhou; Jiannong Cao; Xiaoqin Zeng; Hejun Wu

We investigate the problem of adaptive traffic light control using real-time traffic information collected by a wireless sensor network (WSN). Existing studies mainly focused on determining the green light length in a fixed sequence of traffic lights. In this paper, we propose an adaptive traffic light control algorithm that adjusts both the sequence and length of traffic lights in accordance with the real time traffic detected. Our algorithm considers a number of traffic factors such as traffic volume, waiting time, vehicle density, etc., to determine green light sequence and the optimal green light length. Simulation results demonstrate that our algorithm produces much higher throughput and lower vehicles average waiting time, compared with a fixed-time control algorithm and an actuated control algorithm. We also implement proposed algorithm on our transportation testbed, iSensNet, and the result shows that our algorithm is effective and practical.


IEEE Computer | 2002

Mailbox-based scheme for mobile agent communications

Jiannong Cao; Xinyu Feng; Jian Lu; Sajal K. Das

In various situations, mobile agents at different hosts must cooperate with one another by sharing information and making decisions collectively. To ensure effective interagent communication, communication protocols must track target agent locations and deliver messages reliably. Researchers have proposed a wide range of schemes for agent tracking and reliable message delivery. However, each scheme has its own assumptions, design goals, and methodology. As a result, no uniform or structured methods exist for characterizing current protocols, making it difficult to evaluate their relative effectiveness and performance. The authors propose a mailbox-based scheme for designing mobile agent communication protocols. This scheme assigns each agent a mailbox to buffer messages, but decouples the agent and mailbox to let them reside at different hosts and migrate separately.


IEEE Transactions on Computers | 2015

Deploying Wireless Sensor Networks with Fault-Tolerance for Structural Health Monitoring

Zakirul Alam Bhuiyan; Guojun Wang; Jiannong Cao; Jie Wu

Structural health monitoring (SHM) systems are implemented for structures (e.g., bridges, buildings) to monitor their operations and health status. Wireless sensor networks (WSNs) are becoming an enabling technology for SHM applications that are more prevalent and more easily deployable than traditional wired networks. However, SHM brings new challenges to WSNs: engineering-driven optimal deployment, a large volume of data, sophisticated computing, and so forth. In this paper, we address two important challenges: sensor deployment and decentralized computing. We propose a solution, to deploy wireless sensors at strategic locations to achieve the best estimates of structural health (e.g., damage) by following the widely used wired sensor system deployment approach from civil/structural engineering. We found that faults (caused by communication errors, unstable connectivity, sensor faults, etc.) in such a deployed WSN greatly affect the performance of SHM. To make the WSN resilient to the faults, we present an approach, called

Collaboration


Dive into the Jiannong Cao's collaboration.

Top Co-Authors

Avatar

Xuefeng Liu

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Alvin T. S. Chan

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Weigang Wu

Sun Yat-sen University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Minyi Guo

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xingwei Wang

Northeastern University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sajal K. Das

Missouri University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Keith C. C. Chan

Hong Kong Polytechnic University

View shared research outputs
Top Co-Authors

Avatar

Ming Liu

University of Electronic Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge