scispace - formally typeset
Search or ask a question
Author

Huansheng Ning

Bio: Huansheng Ning is an academic researcher from University of Science and Technology Beijing. The author has contributed to research in topics: Computer science & Authentication. The author has an hindex of 34, co-authored 166 publications receiving 5285 citations. Previous affiliations of Huansheng Ning include Peking University & Beihang University.


Papers
More filters
Journal ArticleDOI
16 Jul 2012-Sensors
TL;DR: This paper focuses on sensitivity and selectivity for performance indicators to compare different sensing technologies, analyzes the factors that influence these two indicators, and lists several corresponding improved approaches.
Abstract: Sensing technology has been widely investigated and utilized for gas detection. Due to the different applicability and inherent limitations of different gas sensing technologies, researchers have been working on different scenarios with enhanced gas sensor calibration. This paper reviews the descriptions, evaluation, comparison and recent developments in existing gas sensing technologies. A classification of sensing technologies is given, based on the variation of electrical and other properties. Detailed introduction to sensing methods based on electrical variation is discussed through further classification according to sensing materials, including metal oxide semiconductors, polymers, carbon nanotubes, and moisture absorbing materials. Methods based on other kinds of variations such as optical, calorimetric, acoustic and gas-chromatographic, are presented in a general way. Several suggestions related to future development are also discussed. Furthermore, this paper focuses on sensitivity and selectivity for performance indicators to compare different sensing technologies, analyzes the factors that influence these two indicators, and lists several corresponding improved approaches.

1,018 citations

Journal ArticleDOI
TL;DR: Fog computing extends the cloud services to the edge of network, and makes computation, communication and storage closer to edge devices and end-users, which aims to enhance low-latency, mobility, network bandwidth, security and privacy.

645 citations

BookDOI
05 Mar 2008
TL;DR: The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems.
Abstract: Ubiquitous and pervasive technologies such as RFID and smart computing promise a world of networked and interconnected devices. Everything from tires to toothbrushes could soon be in communications range, heralding the dawn of an era in which todays Internet of People gives way to tomorrows Internet of Things where billions of objects will have the ability to report their location, identity, and history over wireless connections. Connectivity and Communication Anything, Anywhere, and Anytime An examination of the exciting expansion period in this research, The Internet of Things: From RFID to the Next-Generation Pervasive Networked Systems provides comprehensive, technical, and practical deploying policy guidance that covers fundamentals and recent advances in pervasive networked systems. The book addresses the conceptual and technical issues that influence the technology roadmap and gives an in-depth introduction to the Internet of Things and its effect on businesses and individuals. Discussing case studies, experience reports, and best practice, it contains information on emerging technologies, market opportunities, and policy implications. Practical Guidance and Balanced Coverage The first book of its kind to address major new technological developments and define the Internet of Things, this text provides balanced coverage of theory and practical issues. Reflecting research trends and industry needs, itis a comprehensive technical and practical guide to recent advances in pervasive networked systems.

309 citations

Journal ArticleDOI
TL;DR: The models for Future IoT are not only helpful to interpret the relationship between IoT and reality world, but also beneficial to the implementation of IoT in its current development milieu.
Abstract: Internet of things (IoT) is fascinating; its future architecture is still under construction. Based on the analysis on the basic and essential characters of IoT, this paper deals with Future IoT architecture in two aspects: Unit IoT and Ubiquitous IoT. Focusing on a special application, the architecture of the Unit IoT is built from man like neural network (MLN) model and its modified model. Ubiquitous IoT refers to the global IoT or the integration of multiple Unit IoTs with "ubiquitous" characters, and its architecture employs social organization framework (SOF) model. The models for Future IoT are not only helpful to interpret the relationship between IoT and reality world, but also beneficial to the implementation of IoT in its current development milieu.

308 citations

Journal ArticleDOI
TL;DR: A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.
Abstract: A proposed Internet of Things system architecture offers a solution to the broad array of challenges researchers face in terms of general system security, network security, and application security.

202 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article, the authors present a cloud centric vision for worldwide implementation of Internet of Things (IoT) and present a Cloud implementation using Aneka, which is based on interaction of private and public Clouds, and conclude their IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.

9,593 citations

Reference EntryDOI
15 Oct 2004

2,118 citations

Journal ArticleDOI
TL;DR: This paper provides an up-to-date picture of CloudIoT applications in literature, with a focus on their specific research challenges, and identifies open issues and future directions in this field, which it expects to play a leading role in the landscape of the Future Internet.

1,880 citations

Posted Content
TL;DR: This paper defines and explores proofs of retrievability (PORs), a POR scheme that enables an archive or back-up service to produce a concise proof that a user can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.
Abstract: In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover) to produce a concise proof that a user (verifier) can retrieve a target file F, that is, that the archive retains and reliably transmits file data sufficient for the user to recover F in its entirety.A POR may be viewed as a kind of cryptographic proof of knowledge (POK), but one specially designed to handle a large file (or bitstring) F. We explore POR protocols here in which the communication costs, number of memory accesses for the prover, and storage requirements of the user (verifier) are small parameters essentially independent of the length of F. In addition to proposing new, practical POR constructions, we explore implementation considerations and optimizations that bear on previously explored, related schemes.In a POR, unlike a POK, neither the prover nor the verifier need actually have knowledge of F. PORs give rise to a new and unusual security definition whose formulation is another contribution of our work.We view PORs as an important tool for semi-trusted online archives. Existing cryptographic techniques help users ensure the privacy and integrity of files they retrieve. It is also natural, however, for users to want to verify that archives do not delete or modify files prior to retrieval. The goal of a POR is to accomplish these checks without users having to download the files themselves. A POR can also provide quality-of-service guarantees, i.e., show that a file is retrievable within a certain time bound.

1,783 citations

Posted Content
TL;DR: This paper presents a Cloud centric vision for worldwide implementation of Internet of Things, and expands on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.
Abstract: Ubiquitous sensing enabled by Wireless Sensor Network (WSN) technologies cuts across many areas of modern day living. This offers the ability to measure, infer and understand environmental indicators, from delicate ecologies and natural resources to urban environments. The proliferation of these devices in a communicating-actuating network creates the Internet of Things (IoT), wherein, sensors and actuators blend seamlessly with the environment around us, and the information is shared across platforms in order to develop a common operating picture (COP). Fuelled by the recent adaptation of a variety of enabling device technologies such as RFID tags and readers, near field communication (NFC) devices and embedded sensor and actuator nodes, the IoT has stepped out of its infancy and is the the next revolutionary technology in transforming the Internet into a fully integrated Future Internet. As we move from www (static pages web) to web2 (social networking web) to web3 (ubiquitous computing web), the need for data-on-demand using sophisticated intuitive queries increases significantly. This paper presents a cloud centric vision for worldwide implementation of Internet of Things. The key enabling technologies and application domains that are likely to drive IoT research in the near future are discussed. A cloud implementation using Aneka, which is based on interaction of private and public clouds is presented. We conclude our IoT vision by expanding on the need for convergence of WSN, the Internet and distributed computing directed at technological research community.

1,372 citations