scispace - formally typeset
G

Guihai Chen

Researcher at Shanghai Jiao Tong University

Publications -  463
Citations -  10956

Guihai Chen is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Computer science & Wireless sensor network. The author has an hindex of 43, co-authored 410 publications receiving 8361 citations. Previous affiliations of Guihai Chen include Nanjing University.

Papers
More filters
Proceedings ArticleDOI

EECS: an energy efficient clustering scheme in wireless sensor networks

TL;DR: This paper proposes a novel clustering schema EECS for wireless sensor networks, which better suits the periodical data gathering applications and elects cluster heads with more residual energy through local radio communication while achieving well cluster head distribution.
Proceedings ArticleDOI

An energy-efficient unequal clustering mechanism for wireless sensor networks

TL;DR: An energy-efficient unequal clustering mechanism for periodical data gathering in wireless sensor networks that partitions the nodes into clusters of unequal size, and clusters closer to the base station can preserve some energy for the inter-cluster data forwarding.
Journal ArticleDOI

Avoiding Energy Holes in Wireless Sensor Networks with Nonuniform Node Distribution

TL;DR: It is concluded that in a circular multihop sensor network with nonuniform node distribution and constant data reporting, the unbalanced energy depletion among all the nodes in the network is unavoidable.
Journal ArticleDOI

An unequal cluster-based routing protocol in wireless sensor networks

TL;DR: An Unequal Cluster-based Routing (UCR) protocol is proposed that mitigates the hot spot problem in multihop sensor networks, and achieves an obvious improvement on the network lifetime.
Journal ArticleDOI

Towards Secure Industrial IoT: Blockchain System With Credit-Based Consensus Mechanism

TL;DR: This work proposes a credit-based proof-of-work (PoW) mechanism for IoT devices, which can guarantee system security and transaction efficiency simultaneously, and designs a data authority management method to regulate the access to sensor data.