G
Guangjie Han
Researcher at Hohai University
Publications - 278
Citations - 8331
Guangjie Han is an academic researcher from Hohai University. The author has contributed to research in topics: Wireless sensor network & Computer science. The author has an hindex of 41, co-authored 235 publications receiving 6255 citations. Previous affiliations of Guangjie Han include Nanjing Agricultural University & Fujian University of Technology.
Papers
More filters
Journal ArticleDOI
Review: A survey on coverage and connectivity issues in wireless sensor networks
TL;DR: The coverage problem is classified from different angles, the evaluation metrics of coverage control algorithms are described, the relationship between coverage and connectivity is analyzed, typical simulation tools are compared, and research challenges and existing problems in this area are discussed.
Journal ArticleDOI
Localization algorithms of Wireless Sensor Networks: a survey
TL;DR: The localization algorithms are reclassified with a new perspective based on the mobility state of landmarks and unknown nodes, and a detailed analysis of the representative localization algorithms is presented.
Journal ArticleDOI
A Survey on Mobile Anchor Node Assisted Localization in Wireless Sensor Networks
Guangjie Han,Jinfang Jiang,Chenyu Zhang,Trung Q. Duong,Mohsen Guizani,George K. Karagiannidis +5 more
TL;DR: This survey presents a review of the most successful MANAL algorithms, focusing on the achievements made in the past decade, and aims to become a starting point for researchers who are initiating their endeavors in MANAL research field.
Journal ArticleDOI
An Efficient Distributed Trust Model for Wireless Sensor Networks
TL;DR: The proposed EDTM can evaluate trustworthiness of sensor nodes more precisely and prevent the security breaches more effectively and outperforms other similar models, e.g., NBBTE trust model.
Journal ArticleDOI
Management and applications of trust in Wireless Sensor Networks: A survey
TL;DR: This paper categorizes various types of malicious attacks against trust models and analyzes whether the existing trust models can resist these attacks or not, and lists several trust best practices that are essential for developing a robust trust model for WSNs.