Author Login Editor-in-Chief Peer Review Editor Work Office Work

Collections

Internet of Things
Sort by Default Latest Most read  
Please wait a minute...
  • Select all
    |
  • CAO Haozhe,ZHANG Peng,LU Tun,GU Hansu,GU Ning
    Computer Engineering. 2019, 45(2): 1-6. https://doi.org/10.19678/j.issn.1000-3428.0049937

    Aiming at the shortcomings of traditional user activity recognition modeling method with insufficient accuracy under real-time requirements,an improved real-time user activity recognition modeling method is proposed.The method constructs the sensor trigger probability matrix using the labeled sensor event flow data,and calculates the sensor distance.As a prior knowledge of modeling,the sensor events are given different weights in the subsequent modeling process.According to the intrinsic meaning of sensor distance,the location of activity transfer is judged,and the current activity is modeled by inferring the last activity as a new feature dimension through probability matrix.Experimental results on the three public datasets of Aruba,Tulum2010 and HH106 show that compared with SWMI,SWMIex and other methods,the proposed modeling method can increase the accuracy and F1 by more than 10%.

  • GAO Tianxiang,SHI Ying,LIU Ziwei,WU Longchang
    Computer Engineering. 2019, 45(2): 7-12. https://doi.org/10.19678/j.issn.1000-3428.0049361
    CSCD(1)

    Aiming at the problems of traditional Greedy Perimeter Stateless Routing(GPSR) protocol,such as low link quality,high effects of delivery rate,and poor adaptability of low node density under urban traffic conditions,an LRGR routing protocol is proposed.The road network model is established by using information such as road location and intersection location,and the Quality of Service(QoS) assessment optimization path is introduced,and the carrying and forwarding mechanism is given.The actual road electronic map is selected as the experimental simulation scene,and the GPSR protocol and LRGR protocol are compared and simulated at different node densities or speeds by SUMO and NS3 simulation tools.Results show that in actual traffic scenes,vehicle density and speed have a great impact on the delivery rate,end-to-end delay and end-to-end hop number of routing protocols.Especially in low density and high speed circumstances,the performance of the protocols decreases significantly.Under various vehicle density and speed conditions,LRGR protocol has 20%~35% higher delivery rate than GPSR protocol,5 ms~10 ms lower end-to-end delay,2 hops~4 hops less end-to-end hops,and it can adapt to urban VAENT.

  • TAO Ya’nan,ZHANG Junchao,WANG Qingwen,ZHANG Junhu
    Computer Engineering. 2019, 45(2): 13-17. https://doi.org/10.19678/j.issn.1000-3428.0049194
    CSCD(1)

    Aiming at the bottleneck of data transmission caused by the energy limitation of sensor nodes in Internet of Things(IoT),this paper proposes a routing optimization strategy based on improved Cat Swarm Optimization(CSO).The cat swarm optimization algorithm is improved.Each cat changes its own MR,SMP and inertia weight dynamically in each iteration process based on the number of iterations,energy of the path nodes and fitness.When the path is generated,path residual energy variance,node energy,node load,node distance four factors are taken into account,and the idea of backup routing is introduced to ensure the real time.Simulation results show that the optimization strategy can effectively reduce the optimal path construction time and balance the network energy consumption,and prolong the life cycle of the perception layer network of the IoT.

  • DANG Xiaochao,REN Jiaju,HAO Zhanjun
    Computer Engineering. 2019, 45(2): 18-25. https://doi.org/10.19678/j.issn.1000-3428.0050455
    CSCD(3)

    Aiming at the problems of phase error offset,high fingerprint noise and low accuracy of sample classification in most of the existing indoor passive fingerprint location methods based on Channel State Information(CSI) in complex scenes,an indoor fingerprint location algorithm based on Phase Difference(PD) value correction is proposed.In the offline period,the phase error and offset in the communication link are corrected by calculating the phase difference,and a robust fingerprint database is established.The BP neural network is used to train the fingerprint feature data to obtain the mapping relationship between fingerprint feature information and physical location.Online phase,this algorithm sets the phase difference filtering of CSI real time sampling value as the model,carries out positioning computing and finally gets the accurate location result.Experimental results show that compared with the existing fingerprint-based location method,this method has the advantages of significant denoising effect and high positioning accuracy.

  • SUN Yanzan,FAN Weirong,ZHANG Shunqing,WANG Tao,WU Yating
    Computer Engineering. 2019, 45(2): 26-31. https://doi.org/10.19678/j.issn.1000-3428.0051100
    CSCD(2)

    The cellular Device-to-Device (D2D) network can greatly improve the spectral efficiency of networks by the upstream links multiplexing between D2D users and cellular users.However,when the number of D2D users is greater than the number of cellular users,in D2D dense deployment scenario,traditional resource multiplexing algorithm cannot meet the spectrum resources demand of D2D users.Aiming at this problem,a spectrum resource allocation algorithm based on graph coloring theory for D2D network interference coordination is proposed to realize multiple multiplexing of channel resources among multiple D2D user pairs,thereby improving network load capacity and improving network throughput.On the basis of this,an improved resource allocation algorithm is proposed to improve the fairness of D2D users.Simulation results show that the algorithm can reduce the “hungery” probability of D2D users for obtaining channel resources the spatial multiplexing ratio and the network throughput.

  • LI Shibao,XIAO Xuesong,LIU Jianhang,HUANG Tingpei,CHEN Haihua
    Computer Engineering. 2019, 45(2): 32-37. https://doi.org/10.19678/j.issn.1000-3428.0049927
    CSCD(2)

    Aiming at the problem of unstable routing links caused by rapid vehicle movement and frequent changes of network topology in urban Vehicular Ad Hoc Network(VANET),an vehicular routing protocol RSRP(Road-subsection Routing Protocol) based on road subsection is proposed.This paper takes into account the impact of traffic lights on the speed and spatial distribution of vehicles and segments the roads.On this basis,the selection of backbone nodes is selected on the road,a stable road backbone network is established bridge nodes is selected at the intersection,these nodes are connected with backbone node on adjacent sections of the road,the transmission delay packet generated is gotten,and the information of network topology is updated on the road.Through the vehicle state information obtained by the bridge node,the section is distributed the corresponding weights,and the corresponding minimum weight is selected as sections of the routing path,to improve the delivery rate of data packet transmission and reduce the End to End Delay(E2ED).The real urban road and vehicle traffic scenarios are simulated under the NS2 experimental simulation platform,results show that the RSRP protocol can be better applied to urban road scenarios than GPSR and GyTAR routing protocols.

  • LIU Boya,ZHANG Yue,YANG Yatao,SUN Yafei
    Computer Engineering. 2019, 45(2): 38-41,52. https://doi.org/10.19678/j.issn.1000-3428.0049344
    CSCD(2)

    Aiming at the characteristics of the internet of vehicles,in order to ensure the wireless communication security of Vechicle-to-Vechicle(V2V) and Vechicle-to-Infrastructure(V2I) in the system,a Physical Unclonable Function(PUF) is introduced without the aid of a trusted third party,and a lightweight mutual authentication protocol is proposed.Using GNY logic for formal analysis,and through security analysis and efficiency analysis,it proves that the protocol can achieve mutual authentication under the condition of effective protection of privacy,and can resist attacks such as cloning,eavesdropping,replay,and middleman,the protocol can meet the security requirements of VANET.Efficiency and safety analysis results show that the protocol has better security and authentication efficiency than similar protocols.

  • XU Haoran,LIU Guangzhong,JIA Jianxin
    Computer Engineering. 2019, 45(2): 42-52. https://doi.org/10.19678/j.issn.1000-3428.0050862

    With the increase of industrial wireless sensor devices numbers,the traditional IEEE 802.15.4 CSMA/CA protocol cannot effectively meet the industrial Wireless Sensor Network(WSN) dense scenario.Therefore,this paper proposes an evolved time slot allocation mechanism which can provide an effectively time slot allocation strategy for this scenario.A set of allocable time slots is constructed according to the current maximum number of time slots,the position index is calculated based on the backoff state index and the random backoff counter the time slot allocation equation is obtained.The state transition model is established by evolving the CSMA/CA protocol.Simulation expenimented results show that the mechanism can improve the fairness of the time slot allocation and the transmission hit rate in dense scenes and reduce the data transmission delay.

  • ZHANG Aiping,LI Demin,ZHANG Guanglin,GUO Chang
    Computer Engineering. 2019, 45(2): 53-57,63. https://doi.org/10.19678/j.issn.1000-3428.0049258
    CSCD(1)

    Aiming at the collision of vehicles at intersection,a vehicular collision waring algorithm based on Time to Collision Point(TTCP) estimation is proposed to decrease the probability of traffic accidents and improve the smoothness of vehicular traffic flow at the road intersection.Different scenarios are analyzed for vehicular collision at the road intersection,which is influenced by the operation of traffic lights.The formulae of the collision point coordinate and TTCP are proposed for different cases respectively.The correctness and feasibility of the theory are verified by using MATLAB experimental simulation,and the results also show that the change of vehicle speed and position affects the vehicle collision.

  • CHEN Xin,WANG Lei,SUN Zhongwei
    Computer Engineering. 2019, 45(2): 58-63. https://doi.org/10.19678/j.issn.1000-3428.0051449

    To implement high-reliable,low-delay,and high-rate video distribution in Internet of vehicles,this paper proposes a video distribution scheme based on Random Linear Network Coding(RLNC) for Device-to-Device(D2D) communications.The source node equally splits the video file into multiple segments,and encodes the data segments with RLNC.Each mobile device receives a data segment from the source node,and distributes data segments to other devices after re-encoding.When the device receives a fixed number of linearly independent data segments,it decode data segments to gain the original data.In order to reduce the delay of data distribution,this paper designs three strategies including mode switching,Access Point (AP) selection,and active re-encoding.Experimental results show that compared to the traditional replication-based transmission scheme and the transmission scheme based on Instantly Decodable Network Coding(IDNC),the proposed scheme has higher distribution efficiency.

  • YANG Huaizhou,ZHANG Liumei
    Aiming at the problems that more and more software and hardware functions of Internet of Things(IoT)are provided as services,and the Quality of Service(QoS)of IoT services is difficult to predict,a method of QoS prediction and service recommendation for IoT network is presented.Based on the historical usage data of service invocations and their QoS,the missing values of the user-item matrix are predicted by combining the user-based and item-based collaborative filtering approaches.The QoS values of services are predicted for the active users by the densified user-item matrix.Furthermore,the prediction results are used to realize effective service selection and recommendation.The presented method is validated by taking advantage of a large-scale data set of real service invocations.The experimental result indicates that better prediction accuracy can be obtained through the method,and it is suitable for IoT service selection and recommendation.
  • YAO Yukun,YANG Jikai
    In existing Routing Protocol for Low-power and Lossy Networks(RPL) which selects the best parent according to expected lifetime of bottleneck node on the path,the joining nodes do not consider the traffic generated by the other sub-nodes of the same parent node or the change of bottleneck node after the node’s joining.Aiming at these problems,this paper presents an Energy-balanced and High-efficiency RPL(EBHE-RPL).Firstly,it uses a classifying sending mechanism for DAO-ACK messages to reduce the number of control packets sent by the parent node.Secondly,it uses a traffic accumulation mechanism to calculate the Expected Life Time(ELT) of bottleneck node on each path,so that the calculated life time is closer to the actual value.Finally,it uses a bottleneck re-estimating mechanism after node’s joining to avoid the bottleneck’s change.EBHE-RPL can improve the accuracy for selecting the best parentand balance the energy of networks.Simulation results show that,compared with RPL and EB-RPL algorithms,the performance of EBHE-RPL is improved in the extension of network lifetime and the balance of network energy.
  • MIN Minghui,YANG Zhijia,LI Zhongsheng,LIU Zhifeng
    This paper researches the delay-constrained scheduling of data with multiple sampling periods in industrial Internet of Things(IoT)network.To achieve the goal of low-power,low-latency communication and increase network capacity in the process of data transmission,a multi-slot frames scheduling algorithm based on loads is proposed.The strategy with a faster scan rate should be performed with a higher priority to meet the real-time requirements of data with different sampling period.To avoid the conflict and interference in the network,the graph theory methods of matching and coloring are adopted to achieve deterministic allocation of communication resources.Simulation result demonstrates the proposed algorithm can achieve high reliable and real-time communication,and it can maximize utilization of communication resources to increase network capacity and reduce power consumption.
  • ZHOU Rui,LUO Lei,LI Zhiqiang,SANG Nan
    Advances on smartphones and built-in inertial sensors have given rise to pedestrian dead reckoning using smartphone sensors.However,an accurate Pedestrian Dead Reckoning(PDR) system using smartphone sensors is not available yet,for smartphone sensors are not accurate enough and pedestrians have natural swings during walking.Based on the analysis of pedestrian walking patterns,a new PDR algorithm using smartphone sensors is proposed.The algorithm first preproccess the original acceleration data,then uses a finite state machine to detect walking gait and thereby counts steps.Step length is estimated by using the relationship between step length and acceleration as well as that between two consecutive steps.And the estimated result is smoothed by Kalman filtering.Experimental results show that the proposed algorithm is able to provide accurate step counts and step length,thus providing accurate location service.
  • LI Qi,YAO Long

    In order to solve problems existing in Hulun lake’s environmental monitoring system,such as insufficient monitoring points,high complexity and poor scalability,this paper puts forward an Internet of Things(IoT)platform for lake environmental monitoring based on Representational State Transfer(REST)architecture.The sensor node and node status data are abstracted into resources.Due to the characteristics of concision,high efficiency and loose coupling,this platform is suitable for lake environmental monitoring.Using ECS,Ali cloud server,it builds the development environment,with the aid of Laravel framework and front-end framework of lightweight jQuery to realize user management,Geographic Information System(GIS),real-time display for the data and historical data query.This platform can meet the requirement of fishery,livestock,scientific research and government,and eventually realize data sharing of the Hulun lake’s monitoring system.

  • HU Ying,LOU Hong
    In Internet of Things(IoT)environment,in order to improve the IoT system efficiency,this paper proposes a message scheduling scheme considering node failure.It realizes message order rearrangement by using the shortest time scheduling mechanism.The best alternative node is found through the backup node selection mechanism based on saving energy and reducing the cost of backup node deployment.Simulation results show that the scheme can provide a faster response time of messages and a lower energy consumption of the IoT system.From the perspective of prolonging network life,it also provides the optimal number configuration of IoT backup nodes under the condition of different node failure probability.
  • JIANG Ni,ZHANG Yu,ZHAO Zhijun
    Existing message push systems have some problems,such as security vulnerabilities,lack of personalized intelligent push,etc.This paper presents a safe and intelligent message push system which is based on Message Queuing Telemetry Transport(MQTT) protocol,using lightweight MQTT protocol to push messages,including designs of safety authentication and diversification of intelligent push.It not only can ensure the system security,but also can choose a reasonable way of message sending and message communication mode intelligently according to user’s individual needs and messaging performance requirements.Test results show that the success rate of push is high,and message sending and receiving time is short.
  • XU Chunyan,CHEN Keming,SUN Zhiyong,YAN Dike,HONG Hui
    In order to improve the recognition efficiency of dynamic framed slot ALOHA algorithm in Radio Frequency Identification(RFID) system,this paper proposes a fast convergence amd adaptive Q value anti-collision algorithm.To make the system throughput quickly close to theoretical value,the actual system throughput based on the singleton slots is compared with the theoretical system throughput to adjust Q value by the empirical value.Then,Q value is adaptively adjusted to ensure high system throughput and speed up tags identification.Simulation results show that the throughput of proposed algorithm is increased by more than 8.19% compared with Poisson estimation algorithm when the number of identification tag is 5 000,and it can stabilize the throughput above 33% with the increase of tag number.
  • LIAO Pengfei,CHEN Qingkui
    Aiming at the problem that the communication protocol of Wireless Sensor Network(WSN)is not incompatibility with the Internet network,a wireless sensor gateway based on low-power bluetooth 4.0 communication technology and 3G is designed.The primary processor of the gateway is designed by microprocessor S5PV210,which is used to control the communication between CC2540 bluetooth module and wireless sensor node and operate the 3G module to communicate with Internet.The software platform of the gateway is based on Android operating system,which realizes data collection,network protocol conversion,interactive control between WSN and Internet network.Test result shows that the gateway has low packet loss rate of receive and forward data,latency and power consumption,and it can ensure efficient communication between WSN and Internet network.
  • ZHU Xinpeng,HUANGFU Wei,XING Yi,ZHANG Zhongshan
    The metallurgical industry is one of the largest energy consumer and environment wrecker.Hence it is important to monitor the harmful emissions from the metallurgical industry.The design of the Wireless Sensor Network(WSN) for the metallurgical gas monitoring is introduced,the system consists of monitoring nodes with extendable sensor interfaces that can connect with the data center.It is a flexibility and real-time monitoring system which can carry a wide range of internal and external plant.The monitoring nodes consist of high reliability and high accuracy electrochemical gas sensor which can help monitoring variety of metallurgical gas.The monitoring nodes can be continuous working by the solar system.
  • JIA Ning
    For a class of low efficiency of supermarket shopping system,this paper proposes a system for fast shopping methods and security strategy based on Radio Frequency Identification(RFID) technology.For fast,large scan shopping system,this paper presents an improved binary search anti-collision algorithm to achieve a rapid and complete information collection on the expectation goods and to analyse generating conditions of redundancy identification and dead identification,for universal situation,which can improve the system’s accuracy and reliability.On this basis,the system increases the security mechanisms,checkout goods can be scan in the designated area,and the staff can be notified.In addition,for different conditions,two flexible ways of purchase are designed,which are easy for service management.Experimental results show the smart system not only can express check-out for buying things,but also restrains the errors happened in the buying course.
  • YAN Wenyao,WANG Zhixiao,LI Junhuai,ZHANG Deyun
    Aiming at the status of equipment interconnection,Internet access and business types diversity in intelligent home space,this paper proposes a Multi-modal Multi-service Intelligent Integration Gateway(MMIIG) based on IXP425 and Linux OpenWRT.The MMIIG supports IPv4 and IPv6 protocol,it uses Netfilter/Iptables technology to ensure the safety and flow control,and a intelligent home system based on MMIIG is successively presented.Test result shows that the intelligent home system can make the inside and outside family network to connect with electrical and electronic equipment by MMIIG,realize remote management,intelligent control,video sharing,etc.
  • SHI Gaotao, WANG Boyuan, WU Bin
    Computer Engineering. 2015, 41(9): 39-44,50. https://doi.org/10.3969/j.issn.1000-3428.2015.09.007
    Baidu(8) CSCD(8)
    Indoor localization is a prerequisite for Location Based Services(LBS),it is research hotspot in recent years,and receive widespread attention from academia and industry.With the popularity of smart terminal,many kinds of indoor localization method which is based on WiFi and smart terminal are proposed.Compared with the previous localization method,indoor localization based on WiFi and smart terminal has advantages.Through the key factors of large scale application of indoor localization,this paper analyzes and summarizes the basic methods of indoor localization based on WiFi and smart terminal systematic.With the comparison of typical work in recent years,it points out the shortage of present work,and prospects on the difficulties and direction of the research on indoor localization based on WiFi and smart terminal.
  • XIANG Yi-hong,ZHU Yan-min
    Measuring the performance of those nodes in Wireless Sensor Network(WSN) suffering from interference is meaningful for protocols such as congestion control and link scheduling.Recent studies suggest that the physical model(PRR-SINR model) is significantly more accurate than existing interference models.This paper proposes a central algorithm and a distributed algorithm to build the PRR-SINR model for every node in a WSN respectively.The central algorithm uses a node to send commands to tell other nodes in the network when to receive/broadcast measurement packets.Thereby each node will build the PRR-SINR model according to the commands.In the distributed algorithm,however,each node builds the model all by itself.This paper evaluates the two algorithms in a network which is composed of 17 TelosB nodes.Experimental result shows that the models built by both of the proposed algorithms achieve high accuracy,while the overhead is significantly low.
  • ZHANG Shi-yue,WU Jian-de,WANG Xiao-dong,FAN Yu-gang,LENG Ting-ting
    Aiming at the problems of some typical clustering routing protocol such as the cluster size is not uniform and the energy consumption is not balanced,an Energy-balanced Clustering Routing Algorithm Based on Energy and Distance(ECRED) is proposed.The cluster head selection threshold formula based on energy and distance factor is improved to prolong the working life of the selected cluster heads.The alternative cluster head is chosen to reduce the energy consumption of reelections.A waiting time before broadcasting election information is added.Nodes select the cluster head based on communication cost.Finally,it establishes the optimal routing path among clusters and transmits information using single hop and multi-hop combination method.The simulation results show that compared with EECS protocol,ECRED algorithm can save energy by about 8%,balance the node energy consumption effectively and prolong the life cycle of network.
  • CHEN Shu,HAN Jin,JIANG Wei
    For the problems of node premature death and imbalance of the energy consumption of cluster heads in the low-redundancy Wireless Sensor Network(WSN),which the existing clustering routing algorithm can not solve effectively,this paper proposes a new uneven cluster routing algorithm based on Particle Swarm Optimization(PSO) algorithm and the Shortest Routing Tree(SRT).The algorithm utilizes PSO to optimize the process of uneven clustering,and then establishes the SRT to search the optimal multi-hop transmission paths to realize efficient data transmission from sensor nodes to base station.Simulation results demonstrate that the proposed algorithm is better than EEUC and EECS algorithm.It can effectively solve unbalanced energy consumption problem and greatly prolong the network lifetime cycle.
  • QIU Feng-mei,LI Huai-zhong
    In the traditional DV-Hop localization algorithm,an unknown node only receives an average hope distance broadcasted by the nearest anchor node,which results in accumulated localization error due to larger estimation error of average hop distances.Aimming at this problem,this paper proposes an improved DV-Hop algorithm.The proposed algorithm adopts improved average hop distance which is derived from the weighted average of estimated hop distances broadcasted by multiple anchor nodes.Finally,localized coordinates of the unknown node are modified to further improve localization accuracy.Furthermore,the located unknown nodes are upgraded to anchor nodes to assist in localizing other unknown nodes.Simulation studies using Matlab show that localization accuracy of the proposed algorithm is 10.26%~15.38% higher than the traditional DV-Hop algorithms and 2.0%~3.78% higher than the improved algorithm proposed by Feng Jiang et al(Computer Engineering,2012,No.19).Coverage rate of the proposed algorithm is 8.6%~12.7% higher than the traditional DV-Hop algorithms and about 1.3% higher than the improved algorithm proposed by Zhang Jing et al(Journal of Computer Applications,2011,No.7).
  • GAO Lei,CAO Jian-zhong,HUANG Jin-qiu
    In order to determine the suitability of ZigBee in data-intensive Body Sensor Networks(BSN) and to evaluate the performance of ZigBee,the Delivery Ratio(DR) and end-to-end delay are evaluated,for BSN with body sensor networks star and tree topologies,under the contention environment.The effect of the devices’ clock drift and hidden nodes on the reliability of the star network is modeled and validated through experimental tests.The reliability of the ZigBee network in a star topology without hidden nodes is very good(DR close to 100%).The performance in a tree topology is declined,due to router overload and the activation of the route maintenance protocol triggered by periods of high traffic load.The worst case DR decreased to 13%,while for the non-acknowledged mode.Therefore,to apply ZigBee protocol to BSN,a mechanism to distributing the nodes’ traffic over the time is required to avoid the performance degradation of BSN.
  • ZENG Ping,ZHANG Li,YANG Ya-tao,CHU Xu,LIU Yu-xin
    Aiming at some security problems are considered in Internet of Things(IOT),such as key management,and privacy protection.A key management scheme based on Homomorphic Encryption and China Remainder Theorem(HECRT) is proposed,in which a layer network model based on node location is given to deploy network infrastructure.Double key pool is introduced for key management and distribution,which saves network overhead and node resource consumption.According to the use of homomorphic encryption for the note privacy information,it protects users’ privacy and keeps the data processing safe.Simulation result shows that this scheme has good connectivity and security.
  • LIU Xi,LIU Kai-hua,MA Yong-tao,YU Jie-xiao
    With the development of the Internet of Things(IoT) technologies,passive UHF RFID localization techniques is widely applied in many fields.However,in complicated indoor multipath channel environment,the localization accuracy drops a lot due to multipath interfere.To solve this problem,this paper analyses the passive UHF RFID localization errors in multipath environment,and proposes a passive UHF RFID localization algorithm based on Multidimensional Scaling(MDS).This algorithm extracts the Phase Difference of Arrival(PDOA) information of the tag to be located and the reference tags.With the PDOA information,it can construct the distance matrix of the tag to be located and the reference tags,and obtain the location of the tag using MDS method.The simulation result indicates that in multipath environment with a relatively strong LOS path,this algorithm can reduce the localization error caused by multipath interfere effectively just using several reference tags.
  • WANG Cheng-liang, CHEN Jun-hong, ZHANG Chen

    Compared with traditional methods of traffic information data collection, Radio Frequency Identification(RFID) system provides a better solution for the real-time condition. However, the collected data is discrete not only on temporal, but also on spatial. Though the RFID system, this paper aggregates the traffic data collected by Internet of Vehicles(IoV) using the road section as a minimum compartment, and obtains the driving models for various vehicles based on the statistics of vehicle fuel consumption on highway. Moreover, it proposes Fuel Consumption algorithm based on the Internet of Vehicle(FCIV), and uses visual representation technology, which directly reveals the change of the fuel consumption of every road section in highway, and the variation of the fuel consumption in spatial compartments by days of the week and hours of the day.

  • WANG Qi, ZHUANG Yi, GU Jing-jing
    The deviation of the DV-Distance positioning algorithm in perimeter intrusion detection is too large. Aiming at this problem, this paper improves DV-Distance(IDV-Distance) algorithm and proposes a node positioning algorithm which is suitable for ribbon Wireless Sensor Network(WSN). This algorithm gets the cumulative hop distance measured by RSSI method, and corrects it based on the ribbon WSN topology characteristics. It preliminary estimates node position using the maximum likelihood method, and improves the node positioning accuracy by steepest descent algorithm. Experimental results show that, compared with the classical DV-Distance algorithm and two kinds of improved DV-Distance algorithms in ribbon WSN, this algorithm has higher accuracy.
  • TANG Pu, YE Lin, GUO Li-peng, ZHANG Liang

    Current research of Internet of Things(IoTs) takes the overall system as a whole, which is complicate to design and verify. Aiming at this problem, a complex IoTs which is modeled as a hybrid system, is divided into several sub systems in this paper. A method is proposed which verifies the whole IoTs by verifying and compositing these sub systems independently. Intelligent transportation system is taken as example, and analysis result shows that this method can reduce the complexity of the system, increase the degree of modularity, and ensures the modularity and scalability of IoTs.

  • SUN Jian-feng, FENG Chao, ZHANG Quan
    This paper introduces Radio Frequency Identification(RFID) anti-collision algorithm based on B+ tree, and analyses the influence of different splitting order to recognition efficiency. It finds that when the splitting order increased, the collision slot is reduced but the idle slot is increased, which in turn reduces the efficiency of the algorithm. Aimming at this problem, this paper proposes an improved algorithm. The improved algorithm reduces the collision slot and idle slot simultaneously by modifying the execution procedure and controlling the splitting dynamically. It considers the limitation of resources on the tag and does not increase the hardware configuration. Simulation result demonstrates that this improved algorithm can improve the efficiency of system recognition under the circumstances of a large number of tags, while keep the communication cost low.
  • DANG Xiao-chao, XU Yue-jiao, HAO Zhan-jun
    In data fusion based on Mobile Agent(MA) in Wireless Sensor Network(WSN), the order and number of nodes on the route traversed by a MA determine the energy consumption and hence, which has a significant impact on the overall performance of the whole system. So this paper proposes a Redundancy Based Mobile Agent(RBMA) algorithm, which brings in redundancy parameter together with residual energy parameter and the shortest distance parameter. Methods are adopted to eliminate redundant nodes, create and optimize MA itinerary includes threshold processing, Kruskal method and improved post-order transversal. Simulation result shows that, RBMA algorithm decreases data delay, and consumes less energy than Genetic Algorithm(GA) and Near-optimal Itinerary Design(NOID) algorithm. It can prolong the network lifetime.
  • GUO Li-xia, MENG Xian-chen, CHEN Jia-le, QIN Ning-ning, XU Bao-guo
    Aiming at the phenomenon of coverage holes because of energy depletion and random nodes deployment in Wireless Sensor Network(WSN), a strategy for hole recoverage based on best candidate node is proposed. This strategy increases redundant nodes which hibernate as the candidate nodes in the target area, and selects the best candidate node from redundant nodes to patch the hole based on repaired position. If it is in the controllable range that the redundant node will be actived as the best candidate node and be moved based on repaired position to patch the hole. Otherwise, the second generation mobile node will be used to patch the hole. Experimental results show that the strategy is not limited by coverage hole shape, and can reduce the extra second generation mobile node number in the premise of ensuring the network coverage of no less than 90%, which improves the performance of WSN significantly.
  • DENG Shao-jiang, WANG Yu, TIAN Yuan, TANG Ji-qiang
    There are many security problems in Wireless Sensor Network(WSN) on the base station model. These security problems include the low efficiency of error verification, correction and removal. Meanwhile, the information authentication has poor credibility, low communication security, and heavily depends on resource dependence. To improve the security of such network, an grouping and layered key management strategy in WSN based on Exclusion Basis System(EBS) which named EBS-GL is proposed. This model employs technologies such as network decoupling, a novel grouping and layered information encryption algorithm, the information integrity authentication mechanism, and the strategy of removing singularity. Simulation results prove that this model has stronger abilities of error verification, correction and removal of base stations than JERT strategy.
  • WU Zhi-pei, ZHAN Yong-zhao, XIONG Shu-ming
    Cluster-based topology control method in Wireless Sensor Network(WSN) does not consider the nodes’ residual energy reasonably, which may make the cluster head chosen die soon. And it does not take the number of cluster members into account in the clustering process, which may result in the overloading of the cluster head. Aiming at these problems, in this paper, an adaptive topology control method based on energy and balanced clustering is proposed. The cluster heads’ selection of this method considers the residual energy of nodes, at the same time, the method adopts the idea of equalization to form the cluster members adaptively. Simulation results show that the method can reduce the nodes’ death rate effectively, prolong the network lifetime and improve the service performance.
  • Networks and Communications
    LI Zheng, MA Yong-Chao, LIU Kai-Hua
    Computer Engineering. 2012, 38(17): 1-4. https://doi.org/10.3969/j.issn.1000-3428.2012.17.001
    Baidu(5)
    For the supervision of special goods, the solution is introduced for the environment context aware system based on Internet of Things(IoT) technology. It specifically focuses on the design process of the context awareness gateway. The hardware of the gateway is based on ARM11 processor, which can perceive on the multi-source, process and transmit environmental context information. The software of the gateway uses Linux operating system. The design can obtain high-precision sensing data by using digital filtering techniques, nonlinear compensation technology and parameter mapping technology. The application verifies that the system not only can monitor the distributed multi-source environment context, but also can realize intelligent service through data mining deeply.
  • Networks and Communications
    HUANG Dong-Mei, WANG Yuan-Zhu, ZHANG Meng-Hua
    Computer Engineering. 2012, 38(17): 5-8. https://doi.org/10.3969/j.issn.1000-3428.2012.17.002
    Baidu(2)
    To be aimed at the safety of personnel on the strange tide of natural disaster, a personnel position system based on middleware of Internet of Things(IOT) is designed in this paper. The system includes the control unit of satellite and base to collect personnel information, obtain coordinate information by Global Position System(GPS) and all kinds of sensor identification unit of Radio Frequency Identification(RFID). Transmission of the date from read radio frequency identification on the tide beach to the computer. They are analyzed by the center server. As a consequence of the above, the managers can understand the operations staff position quickly through the monitoring data and take timely relief measures.
  • Networks and Communications
    HU Di, JIAN Song-Rong
    Computer Engineering. 2012, 38(17): 9-11,15. https://doi.org/10.3969/j.issn.1000-3428.2012.17.003
    Baidu(2)
    For keeping salt safe, this paper presents a tracking and traceability system. It achieves the system with Radio Frequency Identification(RFID) technology, and RFID is used to collect data for tracking and tracing function. The system can automatically collect, store data, and display in a good way. Experimental results show that this system can manage salt efficiently, conveniently and stably and keep salt product safety.
  • Networks and Communications
    CHEN Qiang-Kui, LV Xiao-Meng, HAO Ju-Chao, ZHANG Zhe, PENG Song-Lin
    Computer Engineering. 2012, 38(17): 12-15. https://doi.org/10.3969/j.issn.1000-3428.2012.17.004
    Baidu(6) CSCD(1)
    There are large amount of different sensing networks linked together in Internet of Things(IoT). To meet the heterogeneous data access requirement for sensing layer of IoT, this paper gives a solution named Chukwa’s eXtension(ChukwaX), which adopts the hierarchical architecture to disperse the whole access pressure and adaptor pattern to match different protocol. ChukwaX also supports sensing network dynamic accessing which makes sensing networks keeping both local autonomy and Ad-Hoc access. Experimental result on prototype system building based on Chukwa shows that ChukwaX can meet the heterogeneous sensing network access requirement and it is with the high scalability.
  • Networks and Communications
    LI Zheng, LIU Kai-Hua
    Computer Engineering. 2012, 38(17): 16-19. https://doi.org/10.3969/j.issn.1000-3428.2012.17.005
    CSCD(1)
    According to the booming increase of network transmitted data or information and the corresponding network bandwidth insufficiency caused by the popularization of Internet of Things(IoT) key supporting technologies, such as cloud computing and data mining, this paper proposes an IoT remote machine control scheme based on a novel dynamic bandwidth resource allocation algorithm, which optimizes the bandwidth usage by scheduling the sampling rates of the control signals. Simulation results show under the same network bandwidth condition, this algorithm can reduce the reconstruction signal’s error as well as enhance the intelligent bandwidth allocation capability in IoT system.
  • Networks and Communications
    LI Xue-Gang, HUANG Meng-Cheng, SHU Dong-Hai
    Computer Engineering. 2012, 38(17): 20-23. https://doi.org/10.3969/j.issn.1000-3428.2012.17.006
    Baidu(11) CSCD(2)
    A remote farmland monitoring system based on Internet of Things(IOT) technology is designed to solve the high-price of the Internet access and high flow load of the remote data-center. The system adopts Wireless Sensor Network(WSN) to collect the environmental information and the embedded gateway based on ARM11, which accesses to the Internet using the 3G technology. Meanwhile a mobile client is developed for user to view the information and control the devices. Analysis results show that the system can effectively monitor and control the farmland information, and be suitable for the needs of modern agricultural development.
  • Networks and Communications
    LIN Feng-Qun, CHEN Ba-Cheng, YUAN Bo, LIU Wen-Huang, LI Xiao-Yan, MAK Andy,WANG Hong-Xiang
    Computer Engineering. 2010, 36(17): 77-80,86. https://doi.org/10.3969/j.issn.1000-3428.2010.17.027
    Baidu(5) CSCD(1)

    In order to satisfy the practice management requirement of inland small and medium enterprises, this paper designs a lightweight Radio Frequency IDentification(RFID) middleware. Its architecture is between being centered with basic framework and centered with application program, and it simplifies the Application Level Event(ALE) structure of Electronic Product Code(EPC) system. Based on Application Program Interface(API), it implements lightweight middleware by integrating and filtering thought of database. This lightweight middleware has simple structure, short development cycle, and it is easy to maintain and extend at later period.

  • Networks and Communications
    ZHOU Pan-Wei, TUN Zhen-Jiang, JIAO Zi-Rui
    Computer Engineering. 2010, 36(17): 81-83. https://doi.org/10.3969/j.issn.1000-3428.2010.17.028
    Baidu(3)

    According to the insufficiency of Internet of Things(IOT) on information transmission, a trusted anonymous information transmission protocol of IOT is proposed with trusted computing technology. In the protocol, information servers of things encode the details of things layer by layer according to the order of response nodes. In the transmission process, the data are decoded at every passed node until the local ONS server data are totally decoded. Meanwhile, the respond nodes can tell whether the received information is changed by some relevant information. The analysis shows that this protocol is safe, anonymous, trusted, attack-resistant, etc.

  • Networks and Communications
    SHAO Hua-Gang, CHENG Jin, WANG Hui, LI Zhi
    Computer Engineering. 2010, 36(17): 84-86. https://doi.org/10.3969/j.issn.1000-3428.2010.17.029
    Baidu(20) CSCD(10)

    This paper designs Things Oriented Architecture(TOA) and Things Oriented Communication(TOC) middleware which is consist of device Agent, TOC client, and TOC server. TOC is capable of isolating the innumerable diversity of Internet of Things(IOT) objects and providing a unified interactive service and platform by applying Extensible Messaging and Presence Protocol(XMPP) and Pipe & Filter design mode. It implements TOC in the hospital medical trash management system. The results are very promising. It indicates that TOC can provide a unify system integration platform and enough flexible in IOT objects implementation.

  • Networks and Communications
    FU Chi, BANG Lei, MA Shi-Qi, WANG Dong
    Computer Engineering. 2010, 36(17): 87-89,92. https://doi.org/10.3969/j.issn.1000-3428.2010.17.030
    Baidu(3)

    Aiming at the security problem of maliciously tracking, amending and impersonation existing in original Radio Frequency IDentification(RFID) middleware, this paper presents a RFID middleware reconfigurable security framework. It uses Service-Oriented Architecture(SOA) and Open Service Gateway initiative(OSGi) plug-in architecture to reduce coupling between some component, enhance reusable, and research and binding component service. It goes on security state monitoring by life cycle management to realize real-time dynamic operation management. Test result shows that this framework has the characteristics of dynamical expansion, centralized management and complete modular, it also can enhance application efficiency of RFID, and strengthen reliability and security.

  • Networks and Communications
    FAN Wen-Bing, GE Zheng, WANG Yao
    Computer Engineering. 2010, 36(17): 90-92. https://doi.org/10.3969/j.issn.1000-3428.2010.17.031
    Baidu(9) CSCD(3)

    The architecture of UHF Radio Frequency Identification(RFID) is designed and simulated based on ISO/IEC18000-6 protocol UHF RFID protocols. The transmitter and receiver of RFID system are achieved and the backscatter technology is verified in multi-path fading and AWGN channel. The relationship between signal-to-noise and bit-error-ratio is given, which offers references to system application in scientific and reasonable design of RFID system.

  • Networks and Communications
    DIAO Xiao-Jiang
    Computer Engineering. 2010, 36(17): 93-94,97. https://doi.org/10.3969/j.issn.1000-3428.2010.17.032
    Baidu(6) CSCD(1)

    Using the status of water environmental pollution and monitoring management in Xi’an as its starting point, and combining with the low level of national monitoring and pollution increasingly serious problem, remote monitoring and intelligent system analyzing water quality of rivers and lakes is developed. The system consists of fixed-site remote monitoring sites, mobile wireless monitoring sites and biological monitoring sites, therefore, full-coverage and real-time water monitoring network is established. Experimental results show the system has functions of measurement data encrypted transmission, excessive alarm, real-time measurement data storage, scientific decision-making, and indicates the system has low power consumption, high reliability and easy installation ability and good practical significance.