Biblio

Filters: Author is Sun, Peng  [Clear All Filters]
2022-09-30
Sun, Peng, Zhang, Weijiao, Chen, Yan, Li, Li.  2021.  Research on the Configuration Management of Complex Equipment Based on Identity Resolution. 2021 International Conference on Artificial Intelligence and Blockchain Technology (AIBT). :53–58.
Identity resolution system is the primary technical research problem to set up the data collection capability of industrial internet, and the configuration resolution of complex assets is an application difficulty. To implement the particular requirements of complex equipment configuration management, an industry-oriented identity resolution architecture and the configuration resolution service were designed. In accordance with the technical information management of high-speed train, corresponding handle structures was proposed to describe the configuration structure and related components information of EMU (Electric Multiple Unit). A distributed processing algorithm for configuration resolution and the hit-ratio evaluation method of handle service sites was proposed. The performance, stability, and resolution consistency of the handle system in this paper are proved by experiments, which is also great significant to the intelligent identity applications in other industries.
2022-01-31
Wang, Zhihui, Sun, Peng, Luo, Nana, Guo, Benzhen.  2021.  A Three-Party Mutual Authentication Protocol for Wearable IOT Health Monitoring System. 2021 IEEE International Conference on Smart Internet of Things (SmartIoT). :344—347.
Recently, the frequent security incidents of the Internet of things make the wearable IOT health monitoring systems (WIHMS) face serious security threats. Aiming at the security requirements of WIHMS identity authentication, Q. Jiang proposed a lightweight device mutual identity authentication solution in 2019. The scheme has good security performance. However, we find that in Jiang’s scheme, in the authentication phase, the server CS needs at least 3 queries and 1 update of the database operation, which affects the overall performance of the system. For this reason, we propose a new device mutual authentication and key agreement protocol. In our protocol, the authentication server only needs to query the server database twice.
2017-12-12
Sun, Peng, Boukerche, Azzedine.  2017.  Analysis of Underwater Target Detection Probability by Using Autonomous Underwater Vehicles. Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks. :39–42.

Due to the trend of under-ocean exploration, realtime monitoring or long-term surveillance of the under-ocean environment, e.g., real-time monitoring for under-ocean oil drilling, is imperative. Underwater wireless sensor networks could provide an optimal option, and have recently attracted intensive attention from researchers. Nevertheless, terrestrial wireless sensor networks (WSNs) have been well investigated and solved by many approaches that rely on the electromagnetic/optical transmission techniques. Deploying an applicable underwater wireless sensor network is still a big challenge. Due to critical conditions of the underwater environment (e.g., high pressure, high salinity, limited energy etc), the cost of the underwater sensor is significant. The dense sensor deployment is not applicable in the underwater condition. Therefore, Autonomous Underwater Vehicle (AUV) becomes an alternative option for implementing underwater surveillance and target detection. In this article, we present a framework to theoretically analyze the target detection probability in the underwater environment by using AUVs. The experimental results further verify our theoretical results.