Junqi Duan
Beijing Jiaotong University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Junqi Duan.
International Journal of Distributed Sensor Networks | 2014
Junqi Duan; Dong Yang; Haoqing Zhu; Sidong Zhang; Jing Zhao
In recent years, trust-aware routing protocol plays a vital role in security of wireless sensor networks (WSNs), which is one of the most popular network technologies for smart city. However, several key issues in conventional trust-aware routing protocols still remain to be solved, such as the compatibility of trust metric with QoS metrics and the control of overhead produced by trust evaluation procedure. This paper proposes a trust-aware secure routing framework (TSRF) with the characteristics of lightweight and high ability to resist various attacks. To meet the security requirements of routing protocols in WSNs, we first analyze features of common attacks on trust-aware routing schemes. Then, specific trust computation and trust derivation schemes are proposed based on analysis results. Finally, our design uses the combination of trust metric and QoS metrics as routing metrics to present an optimized routing algorithm. We show with the help of simulations that TSRF can achieve both intended security and high efficiency suitable for WSN-based networks.
ad hoc networks | 2013
Junqi Duan; Deyun Gao; Chuan Heng Foh; Hongke Zhang
Access control is one of the major security concerns for wireless sensor networks. However, applying conventional access control models that rely on the central Certificate Authority and sophisticated cryptographic algorithms to wireless sensor networks poses new challenges as wireless sensor networks are highly distributed and resource-constrained. In this paper, a distributed and fine-grained access control model based on the trust and centrality degree is proposed (TC-BAC). Our design uses the combination of trust and risk to grant access control. To meet the security requirements of an access control system with the absence of Certificate Authority, a distributed trust mechanism is developed to allow access of a trusted node to a network. Then, centrality degree is used to assess the risk factor of a node and award the access, which can reduce the risk ratio of the access control scheme and provide a certain protection level. Finally, our design also takes multi-domain access control into account and solves this problem by utilizing a mapping mechanism and group access policies. We show with simulation that TC-BAC can achieve both the intended level of security and high efficiency suitable for wireless sensor networks.
ieee internationalconference on network infrastructure and digital content | 2010
Tao Zheng; Yajuan Qin; Deyun Gao; Junqi Duan; Hongke Zhang
Wireless sensor network is the core support technology in the framework of the Internet of Things. Environmental monitoring and devices control of intelligent building based on wireless sensor network is considered as one of the most crucial applications. It can perceive several environmental parameters and feedback control information to devices to provide more comfortable environment for people. However, it is difficult to ensure performance of wireless sensor network deployed in the buildings, because there usually are several serious disturbances from coexistence wireless systems and human actions. In this paper, we deploy a practical Intelligent Building Wireless Sensor Network (IBWSN) based on the analysis of actual spectrum, Link Quality Indicator, Received Signal Strength Indicator and Package Loss Rate. Performance evaluation proves that the presented system can satisfy the needs of the proposed applications for environmental monitoring and air-conditioning control.
International Journal of Distributed Sensor Networks | 2013
Jing Zhao; Yajuan Qin; Dong Yang; Junqi Duan
Research studies on smart cities have been conducted, which will enable a better management of the available resources. Industrial wireless sensor networks (IWSNs) are important part of smart city. IWSNs are used for process measurement and control applications in harsh and noisy industrial environments. As substitutes for traditional wired industrial networks, IWSNs are more flexible, scalable, and efficient. However, resource limitation of the sensor nodes and unreliability of low-power wireless links, in combination with stringent quality of the service (QoS) requirements of industrial applications, imposes many challenges in designing efficient routing for IWSNs. Existing standards propose a simple and reliable routing mechanism named graph routing. In this paper, we propose novel routing algorithms to discover reliable paths and construct reliable routing graphs. In our approaches, the centralized manager selects parent nodes for each node in the network to satisfy reliability requirements of the intended application. We try to maximize the number of reliable nodes and change the parent nodes selection strategy along with the link quality and the link correlation. Our design is evaluated using simulation where we show that our algorithm could achieve a balance between routing reliability and overhead.
conference of the industrial electronics society | 2013
Junqi Duan; Dong Yang; Sidong Zhang; Jing Zhao; Mikael Gidlund
Security is one of the most important issues we should solve before deploying wireless sensor networks in practical applications. Compared with traditional wireless networks, the industrial environment is harsher and more complex, which has a higher requirement for network security. Although cryptographic primitives can provide the capability to resist against the attacks from the external network, they can not address the problem caused by the internal failed or compromised field devices. In this paper, we propose a trust management scheme for Industrial Wireless Sensor Networks to solve this problem. By utilizing the centralized network manager, we first provide the architecture of trust management to improve the security of the network. Then a trust computation model is proposed to evaluate the trust value of field devices. Finally, we compare the performance of our scheme with some classic trust management schemes. The simulation results show that our scheme can improve the accuracy and robustness of the trust evaluation process in industrial environments and ensure the security of the network.
vehicular technology conference | 2013
Junqi Duan; Deyun Gao; Chuan Heng Foh; Victor C. M. Leung
When deploying wireless sensor networks (WSNs) in practical applications, access control systems can limit access to sensitive information only to trusted entities and provide a capability to resist against various attacks from malicious nodes. However, due to the characteristics of highly distributed and resource-constrained, applying conventional access control models to WSNs is significantly challenging. In this paper, a distributed and fine-grained access control model based on the trust and risk degree is proposed (TC-BAC). We first introduce a trust evaluation mechanism to meet the security requirements of access control systems. Then, a risk function is proposed to assess the behavior of nodes and evaluate the risk factor of the access. The simulation results show that TC-BAC can achieve both intended security and high efficiency of the network.
IEEE Internet of Things Journal | 2014
Junqi Duan; Deyun Gao; Dong Yang; Chuan Heng Foh; Hsiao-Hwa Chen
Archive | 2012
Junqi Duan; Ran Fang; Deyun Gao; Lulu Liang; Hongke Zhang; Tao Zheng
international conference on wireless communications, networking and mobile computing | 2011
Junqi Duan; Yajuan Qin; Sidong Zhang; Tao Zheng; Hongke Zhang
Archive | 2012
Junqi Duan; Deyun Gao; Lulu Liang; Yiduo Lin; Hongke Zhang; Tao Zheng