Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yadong Wan is active.

Publication


Featured researches published by Yadong Wan.


sensor mesh and ad hoc communications and networks | 2008

Anshan: Wireless Sensor Networks for Equipment Fault Diagnosis in the Process Industry

Yadong Wan; Lei Li; Jie He; Xiaotong Zhang; Qin Wang

Wireless sensor networks provide an opportunity to enhance the current equipment diagnosis systems in the process industry, which have been based so far on wired networks. In this paper, we use our experience in the Anshan Iron and Steel Factory, China, as an example to present the issues from the real field of process industry, and our solutions. The challenges are three fold: First, very high reliability is required; second, energy consumption is constrained; and third, the environment is very challenging and constrained. To address these issues, it is necessary to put systematic efforts on network topology and node placement, network protocols, embedded software, and hardware. In this paper, we propose two technologies i.e. design for reliability and energy efficiency (DRE), and design for reconfiguration (DRC). Using these techniques we developed Anshan, a wireless sensor network for monitoring the temperature of rollers in a continuously annealing line and detecting equipment failures. Project Anshan includes 406 sensor nodes and has been running for four months continuously.


international conference on wireless communications, networking and mobile computing | 2009

RAFH: Reliable Aware Frequency Hopping Method for Industrial Wireless Sensor Networks

Yadong Wan; Qin Wang; Shihong Duan; Xiaotong Zhang

Frequency hopping is adopted by many protocols to improve the reliability and security because of the complex and hash environment of industrial wireless sensor networks. However, the performance of frequency hopping is closely related to the link characteristics. Through the measurement and analysis of the link characteristics in industrial environment, we found that the link is time-varying but stable at a relative long period as well. This paper proposed an adaptive frequency hopping method, which change to a new channel only when the packet drop rate of the channel beyond given threshold. The results of simulating and testing show that adaptive frequency hopping can increase the network reliability by 10-20% than slotted frequency hopping.


international conference on computer application and system modeling | 2010

A low-power wireless remote sensor node design based on GPRS

Shihong Duan; Yanwei Yu; Yadong Wan; Qin Wang

For the limitation of transmission distance and power volume of sensor node, a low-power remote data acquisition node which implements long-distance data transmission by combining General Packet Radio Service network with wireless sensor network is designed to acquire data periodically and upload data to remote server through General Packet Radio Service network. This paper expatiate hardware design principles of the node, power management model and software protocol design of the test system. Test results show that nodes can reliably acquire and upload data, the average work current of sensor node is 34mA, the peak current of cluster-head is 260mA when cluster-head uploads data to server, and sleep mode current are both less than 35uA. Performance indicators of node can fulfill the needs of remote monitoring applications in industrial field.


international conference on wireless communications, networking and mobile computing | 2010

Research of the Network Manager for WIA-PA

Yunjie Zhang; Xiaotong Zhang; Qin Wang; Yadong Wan

WIA-PA is a standard of wireless networks for industrial-process automation, which is proposed by Industrial Wireless Alliance of China. Network manager is an integral role of the WIA-PA network. In this paper, we first look closely into the architecture of WIA-PA and the responsibility of network manager. More specifically, we set our focus on the schemes and algorithms involved in the process of topology maintenance, routing configuration and communication resources allocation, which are the core responsibilities of the network manager. Finally, with Visual Studio .NET the paper has implemented the network manager of WIA-PA which has been running for a long time in the laboratory. The results show the network manager can effectively utilize channels and timeslots resources, optimize resource allocation and improve the overall WIA-PA performance.


Iet Information Security | 2017

Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things

Wei Yang; Yadong Wan; Qin Wang

Time synchronisation is a fundamental requirement for the IEEE802.15.4e-based industrial Internet of Things, allowing it to reach low-power and high-reliability wireless network through time synchronisation. If malicious adversaries launch time synchronisation attacks to IEEE802.15.4e-based networks, the entire network communication will be paralysed. In this study, the authors introduce two types of time synchronisation attacks: (i) absolute slot number (ASN) and (ii) timeslot template attack. In ASN attack, the new nodes may receive an incorrect ASN value, which prevents synchronisation with the typical network, while in the timeslot template attack, the malicious node can make the legitimate nodes calculate the error clock offset. The authors propose an enhanced secure time synchronisation protocol to defend against these attacks, which include Sec_ASN and TOF algorithm. The Sec_ASN and threshold filter (TOF) algorithms are used to defend against ASN attack and timeslot template attacks, respectively. Finally, the authors run a thorough set of simulations to assess the effectiveness of the proposed attacks as well as the proposed countermeasure. The results show that the attacks can significantly destroy the time synchronisation protocol, but can be successfully defended using the proposed mechanisms.


Int'l J. of Communications, Network and System Sciences | 2008

A Co-verification Method Based on TWCNP-OS for Two-way Cable Network SOC

Chong Li; Xiaotong Zhang; Yadong Wan; Qin Wang

Co-verification is the key step of software and hardware codesign on SOC. This paper presents a hw/sw co-verification methodology based on TWCNP-OS, a Linux-based operating system designed for FPGA-based platform of two-way cable network (TWCNP) SOC. By implementing HAL (hardware Abstraction level) specially, which is the communications interface between hardware and software, we offer a homogeneous Linux interface for both software and hardware processes. Hardware processes inherit the same level of service from kernel, as typical Linux software processes by HAL. The familiar and language independent Linux kernel interface facilitates easy design reuse and rapid application development. The hw/sw Architecture of TWCNP and design flow of TWCNP-OS are presented on detail. A software and hardware co-verification method using TWCNP-OS is proposed, through the integrated using of Godson-I test board and TWCNP, which realizes the combination of design and verification. It is not a replacement of the co-verification with generic RTOS modeling, but is complementary to them. Performance analysis of our current implementation and our experience with developing this system based on TWCNP-OS will be presented. Most importantly, since the introduction of TWCNP-OS to our FPGA-based platform, we have observed increased productivity among high-level application developers who have little experience in FPGA application design.


Proceedings of the 1st International Workshop on Big Data, Streams and Heterogeneous Source Mining | 2012

A density-based clustering structure mining algorithm for data streams

Huan Wang; Yanwei Yu; Qin Wang; Yadong Wan


Archive | 2010

Method for wireless sensor network to invite retransmission with low power consumption and device thereof

Yadong Wan; Qin Wang; Xiaotong Zhang; Na Xu


international conference on cyber security and cloud computing | 2016

Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks

Wei Yang; Qin Wang; Yadong Wan; Jie He


International Conference on Cyberspace Technology (CCT 2013) | 2013

Design and implementation of wireless voice system based on central station

Jie He; Wei Yang; Yadong Wan; Qin Wang

Collaboration


Dive into the Yadong Wan's collaboration.

Top Co-Authors

Avatar

Qin Wang

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Xiaotong Zhang

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Jie He

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Wei Yang

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Shihong Duan

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Yanwei Yu

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Huan Wang

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Lei Li

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Lin Yao

University of Science and Technology Beijing

View shared research outputs
Top Co-Authors

Avatar

Na Xu

University of Science and Technology Beijing

View shared research outputs
Researchain Logo
Decentralizing Knowledge