scispace - formally typeset
Search or ask a question
Author

Chonghua Wang

Bio: Chonghua Wang is an academic researcher. The author has contributed to research in topics: Identification (information) & The Internet. The author has an hindex of 1, co-authored 5 publications receiving 15 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This paper proposes a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions and semantically model such protocol and analyze the security properties.
Abstract: While Internet-of-Things (IoT) significantly facilitates the convenience of people's daily life, the lack of security practice raises the risk of privacy-sensitive user data leakage. Securing data transmission among IoT devices is therefore a critical capability of IoT environments such as Intelligent Connected Vehicles, Smart Home, Intelligent City and so forth. However, cryptographic communication scheme is challenged by the limited resource of low-cost IoT devices, even negligible extra CPU usage of battery-powered sensors would result in dramatical decrease of the battery life. In this paper, to minimize the resource consumption, we propose a communication protocol involving only the symmetric key-based scheme, which provides ultra-lightweight yet effective encryptions to protect the data transmissions. Symmetric keys generated in this protocol are delegated based on a chaotic system, i.e., Logistic Map, to resist against the key reset and device capture attacks. We semantically model such protocol and analyze the security properties. Moreover, the resource consumption is also evaluated to guarantee runtime efficacy.

36 citations

Proceedings ArticleDOI
04 Dec 2020
TL;DR: In this article, the authors introduced the origin, concept and the model of the network situational awareness, as well as the characteristics of network security situational awareness based on multi-source heterogeneous data fusion.
Abstract: With the development of information technology, the scale of the network continues to expand, and the security issues continue to increase. The complexity of the network security situation is increasing and the importance of the network security situational awareness continues to increase. The data sources are wide, the type and the number are large in a large-scale network environment currently. This paper comprehensively studies the network security situational awareness technology based on multi-source heterogeneous data. In addition, this paper introduces the origin, concept and the model of the network situational awareness, as well as the characteristics of network security situational awareness based on multi-source heterogeneous data fusion. Finally, the key technologies in the security situational awareness such as the extraction of situational elements, multi-source data fusion, situation assessment, situation prediction and visual display are introduced.

2 citations

Proceedings ArticleDOI
04 Dec 2020
TL;DR: Wang et al. as discussed by the authors proposed a CETCRank algorithm for identifying important Internet nodes based on unsupervised learning, which not only considers the graph structure characteristics based on the network topology, but also integrates the threat metric of cyberspace equipment.
Abstract: In recent years, scholars have conducted in-depth researches on the robustness, structural vulnerability, and detection and identification of devices in cyberspace from different perspectives such as complex networks and cyberspace resource mapping. Aiming at the problem of identifying important nodes on a large-scale Internet, a CETCRank algorithm for identifying important Internet nodes based on unsupervised learning is proposed. When the algorithm analyzes the attributes of each cyberspace equipment, it not only considers the graph structure characteristics based on the network topology, but also integrates the threat metric of cyberspace equipment. Based on the hypothesis of the cyber attack model, the effective identification of important nodes in the Internet can be realized by integrating the node attributes into the constructed Markov chain model. Experiments show that the time and space complexity of the CETCRank algorithm is suitable for analyzing large-scale Internet, and the recognition performance of important nodes is better than the PageRank algorithm.

1 citations

Proceedings ArticleDOI
06 Nov 2020
TL;DR: In this article, the authors propose an efficient conflict detection method to avoid unexpected situations by dividing each rule into five categories according to its functions and characteristics and configure the priority, user rights, and execution area for each rule.
Abstract: With the increasing types and functions of smart home devices, due to the lack of experience of users, they may cause unexpected errors and risks when configuring a large number of device linkage rules.In response to the above problems, in this paper, we propose an efficient conflict detection method to avoid unexpected situations.First, to reduce the complexity of subsequent rule conflict detection, we divide each rule into five categories according to its functions and characteristics. At the same time, we configure the priority, user rights, and execution area for each rule. Second, we filter out the rules of the same priority, user rights, and execution area. Third, we define five types of rule conflicts. Finally, the conflict detection algorithm is used to determine whether the filtered rules conflict with the rules in the corresponding database. We have created 379 non-conflicting rules in each type of rule storage database to detect whether the newly created rules conflict with them. Through experimental comparison, we find that our approach has more advantages than previous work in terms of performance and conflict detection types.

1 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper presents the state-of-the-art blockchain technology to solve the security issues of smart cities and surveys the utility of blockchain in various smart communities such as healthcare, transportation, smart grid, supply chain management, financial systems and data center networks.

187 citations

Journal ArticleDOI
TL;DR: This paper presents a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aims to shape a coherent picture of the current state-of-the-art efforts in this direction.
Abstract: The Internet of Things (IoTs) enables coupling of digital and physical objects using worthy communication technologies and introduces a future vision where computing systems, users and objects cooperate for convenience and economic benefits. Such a vision requires seamless security, data privacy, authentication and robustness against attacks. These attributes can be introduced by blockchain, a distributed ledger that maintains an immutable log of network transactions. In this paper, we present a comprehensive review on how to remodel blockchain to the specific IoT needs in order to develop Blockchain based IoT (BIoT) applications and aim to shape a coherent picture of the current state-of-the-art efforts in this direction. After describing the basic characteristics and requirements of IoT, evolution of blockchain is presented. In this regard, we start with the fundamental working principles of blockchain and how such systems achieve auditability, security and decentralization. Further, we describe the most relevant BIoT applications, its architecture design and security aspects. From there, we build our narrative on the centralized IoT challenges followed by recent advances towards solving them. Finally, some future directions are enumerated with the aim to guide future BIoT researchers on challenges that needs to be considered ahead of deploying the next generation of BIoT applications.

99 citations

01 Jan 2000
TL;DR: This article is a tutorial on using genetic algorithms to optimize antenna and scattering patterns, and provides a detailed explanation of how a genetic algorithm works, and a listing of a MATLAB code.
Abstract: This article is a tutorial on using genetic algorithms to optimize antenna and scattering patterns. Genetic algorithms are "global" numerical-optimization methods, patterned after the natural processes of genetic recombination and evolution. The algorithms encode each parameter into binary sequences, called a gene, and a set of genes is a chromosome. These chromosomes undergo natural selection, mating, and mutation, to arrive at the final optimal solution. After providing a detailed explanation of how a genetic algorithm works, and a listing of a MATLAB code, the article presents three examples. These examples demonstrate how to optimize antenna patterns and backscattering radar-cross-section patterns. Finally, additional details about algorithm design are given. >

58 citations

Journal ArticleDOI
TL;DR: The significance of integrating Blockchain technology in the IoT environment to ensure trust among IoT devices is illustrated and a comparative analysis between traditional and Blockchain-based trust management techniques is presented to represent the significance of Blockchain in ensuring trust.

39 citations

Journal ArticleDOI
TL;DR: In this paper , the authors present a comparative analysis between traditional and blockchain-based trust management techniques as proof of work to represent the significance of blockchain in ensuring trust among IoT devices.

16 citations