Zhongwei Zhang | University of Southern Queensland (original) (raw)

Papers by Zhongwei Zhang

Research paper thumbnail of REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

Applied Sciences, 2020

Healthcare institutions require advanced technology to collect patients’ data accurately and cont... more Healthcare institutions require advanced technology to collect patients’ data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks.

Research paper thumbnail of An intelligent scheme of secure routing for mobile Ad Hoc networks

2008 2nd International Conference on Signal Processing and Communication Systems, 2008

Research paper thumbnail of Deliberation and Implementation of Adaptive Fuzzy Logic Based Security Level Routing Protocol for Mobile Ad Hoc Network

Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.

Research paper thumbnail of Differentiated Statistical QoS Guarantees for Real-Time CBR Services in Broadband Wireless Access Networks

2010 International Conference on Computational Intelligence and Software Engineering, 2010

Research paper thumbnail of Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks

2009 First Asian Conference on Intelligent Information and Database Systems, 2009

 Multi-hop routing: Each node consists of a fixed communication range and hence they tend to fol... more  Multi-hop routing: Each node consists of a fixed communication range and hence they tend to follow multi-hop routing to transmit the data between the source and the destinationnodes.

Research paper thumbnail of An Empirical Investigation into the Impact of Electronic Connectivity on the Adoption of Internet Banking

Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > E... more Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > ECU Works -2010 > 3773. ECU Publications Pre. 2011. Title. An Empirical Investigation into the Impact of Electronic Connectivity on the Adoption of Internet Banking. Authors. Xueli Huang, Edith Cowan University Shaoguang Li Chenqi Zhang. Document Type. Conference Proceeding. Faculty. Business and Public Management. School. Management. Comments. This item is currently under review. Tell a Colleague Print COinS. Follow. ...

Research paper thumbnail of Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes

2009 First Asian Conference on Intelligent Information and Database Systems, 2009

Research paper thumbnail of A Novel Secure Routing Protocol for MANETs

Mobile Ad-Hoc Networks: Protocol Design, 2011

Research paper thumbnail of Implementing and Evaluating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network

2006 Wireless Telecommunications Symposium, 2006

A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is c... more A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is characterized by no fixed infrastructure or varying topologized structure. This feature allows MANET to be deployed within many circumstances where traditional IP networks are constrained or too expensive in terms of time and resources. Adversely, the mobility of node renders MANETs vulnerable to many

Research paper thumbnail of Achieving secure service sharing over ip networks

Proceeding of the ASEE Mid-Atlantic …, 2006

Research paper thumbnail of Understanding and enlivening AQM workings using computer simualtion

Undeniably, computer simulation is an effective tool to help understand and analyze complex proce... more Undeniably, computer simulation is an effective tool to help understand and analyze complex processes and systems in various areas. In recent years, many educators adopt computer simulation technology in the teaching of some topics or courses which include dynamic interactions between components. For years, many concepts of networking have been taught based on textual or other static visual materials. And many researcher have shown that illustrating dynamic scenario using static and lecture-based paradigms compromises the teaching effectiveness. This problem on computer network education prompted us to use graphical simulation. Courses related to computer communication and networking can be benefitted if computer simulation is wisely adopted. In this paper, we describe a study in which we count on computer simulation to illustrate important and complicated algorithms of congestion control and queue management in the TCP/IP protocol suites. Comparing with current queue management techniques, Active Queue Management(AQM) is an innovative mechanism in router packet scheduling. We noticed that AQM is a promising technique and might be implemented in new generation routers. However, the concepts and internal workings of AQM schema are difficult for researchers and students to understand. Thus, we designed an interactive software to dynamically visualize the AQMs' principles and internal workings. The implementation of simulation package used Java technology due to that Java is an object-oriented programming language with extensive build-in graphical facilities and multi-threading mechanism. In our software package, we have implemented the traditional Drop Tail(DT) and two representative AQM schemas: Random Early Detection(RED) and BLUE. It allows users to conduct their own experiments by entering different parameters for each of the algorithms, as shown in the figure below. The structure of simulation package follows the Model-View-Controller paradigm which separates the development of network models from visualization and control of the models. The animation visually describes the internal working process of the algorithms with a plot diagram, which displays the variations of the router queue size. We also compared the simulation results of the three queue management algorithms. From the animating simulation, we can easily see the difference of performance between AQM and DT. The main strength of our AQM simulator is ease of use when compared with other professional simulation tools such as NS2 or OMNet++, because users do not need solid programming capability to build the simulation from scratch. By using graphical animation, learners can directly access the internal process of the three queue management algorithms. We have received very positive feedbacks from network professionals and University lecturers for using this simulation software.

Research paper thumbnail of A Comparative Study on the Performance of Wireless Sensor Networks

6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Research paper thumbnail of Self-authentication of encrypted channels in service network graph

Network and Parallel Computing, 2008. NPC …, 2008

Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support s... more Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret key with one member of the SNG. The shared secret key will be used to set up an encrypted channel between the network and the SNG member. It is imperative to authenticate the data sent through the encrypted channel. This paper uses the symbols and approached presented by Lampson in his paper [15] to provide a formal proof of how encryption channel authenticates itself in SNG. It forms the basis of using encrypted channels in SNG.

Research paper thumbnail of Deliberation and Implementation of Adaptive Fuzzy Logic Based Security Level Routing Protocol for Mobile Ad Hoc Network

Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.

Research paper thumbnail of Service Re-routing for Service Network Graph: Efficiency, Scalability and Implementation

The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21]. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of hops in a redirection increases, the length of SPath increases. The overhead for service routing protocols which uses SPath increases with the length of SPath. Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving service routing. In this paper, we propose a rerouting strategy to optimize service routing, and demonstrate how this strategy can be implemented using SPath to enhance the efficiency and scalability of Service Network Graph (SNG).

Research paper thumbnail of Service Re-routing for Service Network Graph: Efficiency, Scalability and Implementation

The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may
need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21].
Service Path (SPath) holds the authentication and server paths along side with service
information. As the number of hops in a redirection increases, the length of SPath increases. The
overhead for service routing protocols which uses SPath increases with the length of SPath.
Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving
service routing. In this paper, we propose a re-routing strategy to optimize service routing, and
demonstrate how this strategy can be implemented using SPath to enhance the efficiency and
scalability of Service Network Graph (SNG).

Research paper thumbnail of Design and Implementation of an OPNET model for simulating GeoAODV MANET routing protocol

… , Session: Wireless Ad Hoc and Wireless …, 2010

Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET).... more Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET). AODV floods the network with control messages to discover a route to the destination, which often results in a large number of control packets traveling through the network. This paper introduces the design and implementation of GeoAODV routing protocol for OPNET Modeler. GeoAODV takes advantage of Global Positioning System (GPS) coordinates to only search the area where a path to the destination is likely to be located. This paper discusses the authors' endeavors to develop a model of GeoAODV protocol and seamlessly integrate it within OPNET Modeler. In addition the paper provides an overview of OPNET Modeler's software architecture for modeling wireless networks and MANET routing protocols.

Research paper thumbnail of REISCH: Incorporating Lightweight and Reliable Algorithms into Healthcare Applications of WSNs

Applied Sciences, 2020

Healthcare institutions require advanced technology to collect patients’ data accurately and cont... more Healthcare institutions require advanced technology to collect patients’ data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks.

Research paper thumbnail of An intelligent scheme of secure routing for mobile Ad Hoc networks

2008 2nd International Conference on Signal Processing and Communication Systems, 2008

Research paper thumbnail of Deliberation and Implementation of Adaptive Fuzzy Logic Based Security Level Routing Protocol for Mobile Ad Hoc Network

Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.

Research paper thumbnail of Differentiated Statistical QoS Guarantees for Real-Time CBR Services in Broadband Wireless Access Networks

2010 International Conference on Computational Intelligence and Software Engineering, 2010

Research paper thumbnail of Scrutinizing Performance of Ad Hoc Routing Protocols on Wireless Sensor Networks

2009 First Asian Conference on Intelligent Information and Database Systems, 2009

 Multi-hop routing: Each node consists of a fixed communication range and hence they tend to fol... more  Multi-hop routing: Each node consists of a fixed communication range and hence they tend to follow multi-hop routing to transmit the data between the source and the destinationnodes.

Research paper thumbnail of An Empirical Investigation into the Impact of Electronic Connectivity on the Adoption of Internet Banking

Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > E... more Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > ECU Works -2010 > 3773. ECU Publications Pre. 2011. Title. An Empirical Investigation into the Impact of Electronic Connectivity on the Adoption of Internet Banking. Authors. Xueli Huang, Edith Cowan University Shaoguang Li Chenqi Zhang. Document Type. Conference Proceeding. Faculty. Business and Public Management. School. Management. Comments. This item is currently under review. Tell a Colleague Print COinS. Follow. ...

Research paper thumbnail of Improving Efficiency and Scalability of Service Network Graph by Re-routing Service Routes

2009 First Asian Conference on Intelligent Information and Database Systems, 2009

Research paper thumbnail of A Novel Secure Routing Protocol for MANETs

Mobile Ad-Hoc Networks: Protocol Design, 2011

Research paper thumbnail of Implementing and Evaluating An Adaptive Secure Routing Protocol for Mobile Ad Hoc Network

2006 Wireless Telecommunications Symposium, 2006

A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is c... more A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is characterized by no fixed infrastructure or varying topologized structure. This feature allows MANET to be deployed within many circumstances where traditional IP networks are constrained or too expensive in terms of time and resources. Adversely, the mobility of node renders MANETs vulnerable to many

Research paper thumbnail of Achieving secure service sharing over ip networks

Proceeding of the ASEE Mid-Atlantic …, 2006

Research paper thumbnail of Understanding and enlivening AQM workings using computer simualtion

Undeniably, computer simulation is an effective tool to help understand and analyze complex proce... more Undeniably, computer simulation is an effective tool to help understand and analyze complex processes and systems in various areas. In recent years, many educators adopt computer simulation technology in the teaching of some topics or courses which include dynamic interactions between components. For years, many concepts of networking have been taught based on textual or other static visual materials. And many researcher have shown that illustrating dynamic scenario using static and lecture-based paradigms compromises the teaching effectiveness. This problem on computer network education prompted us to use graphical simulation. Courses related to computer communication and networking can be benefitted if computer simulation is wisely adopted. In this paper, we describe a study in which we count on computer simulation to illustrate important and complicated algorithms of congestion control and queue management in the TCP/IP protocol suites. Comparing with current queue management techniques, Active Queue Management(AQM) is an innovative mechanism in router packet scheduling. We noticed that AQM is a promising technique and might be implemented in new generation routers. However, the concepts and internal workings of AQM schema are difficult for researchers and students to understand. Thus, we designed an interactive software to dynamically visualize the AQMs' principles and internal workings. The implementation of simulation package used Java technology due to that Java is an object-oriented programming language with extensive build-in graphical facilities and multi-threading mechanism. In our software package, we have implemented the traditional Drop Tail(DT) and two representative AQM schemas: Random Early Detection(RED) and BLUE. It allows users to conduct their own experiments by entering different parameters for each of the algorithms, as shown in the figure below. The structure of simulation package follows the Model-View-Controller paradigm which separates the development of network models from visualization and control of the models. The animation visually describes the internal working process of the algorithms with a plot diagram, which displays the variations of the router queue size. We also compared the simulation results of the three queue management algorithms. From the animating simulation, we can easily see the difference of performance between AQM and DT. The main strength of our AQM simulator is ease of use when compared with other professional simulation tools such as NS2 or OMNet++, because users do not need solid programming capability to build the simulation from scratch. By using graphical animation, learners can directly access the internal process of the three queue management algorithms. We have received very positive feedbacks from network professionals and University lecturers for using this simulation software.

Research paper thumbnail of A Comparative Study on the Performance of Wireless Sensor Networks

6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007

Research paper thumbnail of Self-authentication of encrypted channels in service network graph

Network and Parallel Computing, 2008. NPC …, 2008

Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support s... more Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret key with one member of the SNG. The shared secret key will be used to set up an encrypted channel between the network and the SNG member. It is imperative to authenticate the data sent through the encrypted channel. This paper uses the symbols and approached presented by Lampson in his paper [15] to provide a formal proof of how encryption channel authenticates itself in SNG. It forms the basis of using encrypted channels in SNG.

Research paper thumbnail of Deliberation and Implementation of Adaptive Fuzzy Logic Based Security Level Routing Protocol for Mobile Ad Hoc Network

Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.

Research paper thumbnail of Service Re-routing for Service Network Graph: Efficiency, Scalability and Implementation

The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21]. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of hops in a redirection increases, the length of SPath increases. The overhead for service routing protocols which uses SPath increases with the length of SPath. Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving service routing. In this paper, we propose a rerouting strategy to optimize service routing, and demonstrate how this strategy can be implemented using SPath to enhance the efficiency and scalability of Service Network Graph (SNG).

Research paper thumbnail of Service Re-routing for Service Network Graph: Efficiency, Scalability and Implementation

The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may
need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21].
Service Path (SPath) holds the authentication and server paths along side with service
information. As the number of hops in a redirection increases, the length of SPath increases. The
overhead for service routing protocols which uses SPath increases with the length of SPath.
Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving
service routing. In this paper, we propose a re-routing strategy to optimize service routing, and
demonstrate how this strategy can be implemented using SPath to enhance the efficiency and
scalability of Service Network Graph (SNG).

Research paper thumbnail of Design and Implementation of an OPNET model for simulating GeoAODV MANET routing protocol

… , Session: Wireless Ad Hoc and Wireless …, 2010

Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET).... more Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET). AODV floods the network with control messages to discover a route to the destination, which often results in a large number of control packets traveling through the network. This paper introduces the design and implementation of GeoAODV routing protocol for OPNET Modeler. GeoAODV takes advantage of Global Positioning System (GPS) coordinates to only search the area where a path to the destination is likely to be located. This paper discusses the authors' endeavors to develop a model of GeoAODV protocol and seamlessly integrate it within OPNET Modeler. In addition the paper provides an overview of OPNET Modeler's software architecture for modeling wireless networks and MANET routing protocols.