Ning Sun

Ning Sun
  • Doctor of Engineering
  • Professor (Associate) at Hohai University

About

44
Publications
6,847
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
753
Citations
Current institution
Hohai University
Current position
  • Professor (Associate)
Additional affiliations
March 2006 - June 2013
Chungbuk National University
Position
  • PhD Student

Publications

Publications (44)
Article
Underwater wireless sensor network (UWSN) is a typical application of wireless network in underwater environment, which mainly uses acoustic communication at present. However, due to the characteristics of high bit error rate, very limited bandwidth and high transmission delay, the data transmission collision of underwater communication is very ser...
Article
Full-text available
In modern transportation, traffic congestion has become an urgent problem in large and medium-sized cities. In smart transportation systems, it is an effective solution to design load balancing path planning algorithms that can dynamically adapt to traffic conditions in order to avoid congestion. In this work, a traffic path planning algorithm base...
Chapter
Nowadays, wireless Sensor Networks (WSN) technology has been applied in more and more fields, such as medical, military, environmental protection, and so on. WSNs increase the efficiency of people’s access to information. However, the bandwidth of a wireless device is limited, and when the network is unreliable, the phenomenon of high packet loss r...
Chapter
In this paper, a virtual desktop cloud system based on OpenStack architecture is proposed to specifically satisfy the requirements for teachers and students in experiment classes. We design control and management components for the virtual desktop system, especially considering the schedule management algorithm. Based on OpenStack cloud platform, w...
Article
Micro-perforated panel (MPP) absorber has been widely used in noise control and is regarded as a promising alternative to the traditional porous materials. However, the absorption bandwidth of single MPP absorbers is always insufficient to compete with the porous materials. In this paper, aiming at obtaining high absorption over broad frequency ban...
Conference Paper
Full-text available
Reliability is an important issue in wireless sensor networks (WSNs). Reliable transmission of data in WSNs is the basic of successful network operation. In this paper, we firstly define the evaluation methods for reliability in WSNs in terms of evaluation metrics and recovery ways. The technologies to improve reliability for WSNs are summed up in...
Conference Paper
A cross-layer protocol is proposed to deal with the problems of high latency, low bandwidth and high bit-error-rate (BER) in underwater acoustic sensor networks (UASNs). Nodes are organized as clusters based on depth and the nodes with same depth belong to same cluster and cluster head (CH) is chosen by the CH in high-level depth. At network layer,...
Article
Full-text available
Wireless Local Area Network (WLAN) fingerprintbased indoor localization schemes have been widely studied because of the increasing requirements of location-based services (LBSs). The features of fingerprint-based localization are known to have higher precision in indoor environments than traditional methods, such as triangulation. However, the prec...
Article
Full-text available
Underwater acoustic sensor networks (UASNs) have many characteristics different from terrestrial wireless sensor networks (WSNs), such as dynamic network topology, unreliable acoustic communication, which increase the difficulties in energy efficiency and reliability of data transmission, for traditional WSN solutions are not suitable for UASNs. Ve...
Conference Paper
Aiming at the problem that the consistency between load capacity and the actual traffic volume, the road grade analysis in urban traffic network. Propose the improved GROCC algorithm based on the traditional Dijkstra algorithm. It is a global path planning method based on real-time traffic information. In this algorithm, the parameter, the number o...
Article
UASNs are widely used in many applications, and many studies have been conducted. However, most current research projects have not taken network security into consideration, despite the fact that a UASN is typically vulnerable to malicious attacks due to the unique characteristics of an underwater acoustic communication channel (e.g., low communica...
Article
Full-text available
As the smart cities emerged for more comfortable urban spaces, services, such as health, transportation, and so on, need to be promoted. In addition, the cloud computing provides flexible allocation, migration of services, and better security isolation; therefore, it is the infrastructure for the smart cities. Single instruction-set architecture (I...
Conference Paper
Underwater sensor networks (USNs) has many characteristics different from terrestrial wireless sensor networks (WSNs), such as dynamic network topology, unreliable acoustic communication, which increases the difficulty in energy efficiency and reliability of data transmission, for traditional WSN protocols are not suitable for underwater acoustic s...
Article
Full-text available
Node deployment is one of the fundamental tasks for underwater acoustic sensor networks (UASNs) where the deployment strategy supports many fundamental network services, such as network topology control, routing, and boundary detection. Due to the complex deployment environment in three-dimensional (3D) space and unique characteristics of underwate...
Article
Full-text available
Energy efficiency is a primary consideration in a wireless sensor network (WSN). This is also a major parameter when designing a medium access control (MAC) protocol for WSNs. Hierarchical clustering structure is regarded suitable for WSNs due to its good performance in energy conservation. In this work, an adequately flexible mechanism for cluster...
Article
Full-text available
Energy efficiency and reliability are two important factors when we design a wireless sensor network (WSN). In this paper, we proposed an energy-efficient and reliable hierarchical mechanism for WSNs. We utilized clustering structure to decrease energy consumption. Because cluster head plays an important role in WSN, we designed a substitute of clu...
Conference Paper
Full-text available
Energy awareness is always a key issue to design a routing protocol for wireless sensor networks (WSNs) due to the capability limitation of the nodes. Reliability has come to an important issue in WSNs, since the nodes are prone to failure and the networks are unstable. In this paper, we present a hybrid routing protocol for WSNs which integrates t...
Conference Paper
Full-text available
Recently in order to improve the longevity and energy efficiency of WSN (Wireless Sensor Network), widely research have been carried on. Up to the present, many presented methods are based on clustering hierarchical structure. Nevertheless, these protocols don't consider the problem of data sensibility. Based on cluster hierarchical structure, we p...
Conference Paper
The mobile payment refers that the transactions are realized by mobile terminals, such as a mobie phone, PDA, mobile PC and so on. This paper proposes a hash-chain based small money payment system which guarantees an anonymity of user by secret signing one time in the procedure of withdrawing route value through RFID-USB module for a mobile user wh...
Conference Paper
Nowadays, content management systems (CMSs) have been adopted by many different types of organizations to manage digital contents, but the increasing complexes and independency result in CMSs falling short of their ideal responsibilities. Interoperability and data redundancy are two issues we should solve, which are caused by adopting diverse metad...
Article
Full-text available
Recently, in order to improve the energy efficiency of WSN(Wireless Sensor Network), widely research have been carried on. But, up to the present, all presented methods are based on direct communication between CH(cluster head) and sink node, and based on the assumption that node can intelligent regulate signal energy according to the distance betw...
Article
Full-text available
Digital Rights Management (DRM) is a technology to protect digital rights from unauthorized access and to control the content throughout its entire life cycle. In mobile environment, besides of the traditional demands of persistent copyright protection, some characteristics such as easier to access and low computing energy of mobile devices should...
Article
Full-text available
With the coming of information times, digital contents are widely applied in various fields of the society. Along with this, scholars provided many techniques and research approaches related to digital contents management and copyright protection. But till now, most proposed techniques and approaches are based on single system. The independency and...
Article
Full-text available
At present Content Management Systems (CMS) with various and diverse web contents have been in wide applications. But, for CMS of each enterprise has its own metadata which is very different from others, it causes the serious problem of web contents repetition. Also, it's a difficult technology to support protecting copyright of web contents which...
Conference Paper
Development of metadata theories and their application techniques provide a solution to mass data sharing in internet. This paper researched the key application techniques for multi-CMSs(content management systems) data based on metadata. Among several CMSs, each CMS has its own metadata standard, which includes an identifier to mark the data. To o...
Conference Paper
From diversification of contents, CMS (contents Man- agement System) is operated variously for government of- ficial of contents. Present CMS plain applies a DRM tech- nology and is protecting contents copyright based on only position members. Therefore, global use of contents is lim- ited and use is impossible mutually and original copyright prote...
Conference Paper
In this paper, we propose an RFID authentication protocol that enforces user privacy and protects against tag cloning. Our scheme is based on the use of a secret shared between tag and database that is refreshed to avoid tag tracing. Additionally, our protocol is very simple and it can be implemented easily with the use of standard cryptographic ha...
Article
These days, personal information privacy and security is getting an important issue. In various commercial and other application cases, because of convenience and efficiency, personal information is always stored and used by organizations and companies systems. These information have different sensitivity level of privacy among each subject. Usuall...
Conference Paper
Previous RFID techniques, cause serious privacy infringements such as excessive information exposure and user's location information tracking due to the wireless characteristics and the limitation of RFID systems. Especially the information security problem of read only tag has been solved by physical method. In this paper, we propose a low-cost mu...

Network

Cited By