Zhongwei Zhang | University of Southern Queensland (original) (raw)
Papers by Zhongwei Zhang
Applied Sciences, 2020
Healthcare institutions require advanced technology to collect patients’ data accurately and cont... more Healthcare institutions require advanced technology to collect patients’ data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks.
2008 2nd International Conference on Signal Processing and Communication Systems, 2008
Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.
2010 International Conference on Computational Intelligence and Software Engineering, 2010
2009 First Asian Conference on Intelligent Information and Database Systems, 2009
Multi-hop routing: Each node consists of a fixed communication range and hence they tend to fol... more Multi-hop routing: Each node consists of a fixed communication range and hence they tend to follow multi-hop routing to transmit the data between the source and the destinationnodes.
Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > E... more Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > ECU Works -2010 > 3773. ECU Publications Pre. 2011. Title. An Empirical Investigation into the Impact of Electronic Connectivity on the Adoption of Internet Banking. Authors. Xueli Huang, Edith Cowan University Shaoguang Li Chenqi Zhang. Document Type. Conference Proceeding. Faculty. Business and Public Management. School. Management. Comments. This item is currently under review. Tell a Colleague Print COinS. Follow. ...
2009 First Asian Conference on Intelligent Information and Database Systems, 2009
Mobile Ad-Hoc Networks: Protocol Design, 2011
2006 Wireless Telecommunications Symposium, 2006
A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is c... more A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is characterized by no fixed infrastructure or varying topologized structure. This feature allows MANET to be deployed within many circumstances where traditional IP networks are constrained or too expensive in terms of time and resources. Adversely, the mobility of node renders MANETs vulnerable to many
Proceeding of the ASEE Mid-Atlantic …, 2006
Undeniably, computer simulation is an effective tool to help understand and analyze complex proce... more Undeniably, computer simulation is an effective tool to help understand and analyze complex processes and systems in various areas. In recent years, many educators adopt computer simulation technology in the teaching of some topics or courses which include dynamic interactions between components. For years, many concepts of networking have been taught based on textual or other static visual materials. And many researcher have shown that illustrating dynamic scenario using static and lecture-based paradigms compromises the teaching effectiveness. This problem on computer network education prompted us to use graphical simulation. Courses related to computer communication and networking can be benefitted if computer simulation is wisely adopted. In this paper, we describe a study in which we count on computer simulation to illustrate important and complicated algorithms of congestion control and queue management in the TCP/IP protocol suites. Comparing with current queue management techniques, Active Queue Management(AQM) is an innovative mechanism in router packet scheduling. We noticed that AQM is a promising technique and might be implemented in new generation routers. However, the concepts and internal workings of AQM schema are difficult for researchers and students to understand. Thus, we designed an interactive software to dynamically visualize the AQMs' principles and internal workings. The implementation of simulation package used Java technology due to that Java is an object-oriented programming language with extensive build-in graphical facilities and multi-threading mechanism. In our software package, we have implemented the traditional Drop Tail(DT) and two representative AQM schemas: Random Early Detection(RED) and BLUE. It allows users to conduct their own experiments by entering different parameters for each of the algorithms, as shown in the figure below. The structure of simulation package follows the Model-View-Controller paradigm which separates the development of network models from visualization and control of the models. The animation visually describes the internal working process of the algorithms with a plot diagram, which displays the variations of the router queue size. We also compared the simulation results of the three queue management algorithms. From the animating simulation, we can easily see the difference of performance between AQM and DT. The main strength of our AQM simulator is ease of use when compared with other professional simulation tools such as NS2 or OMNet++, because users do not need solid programming capability to build the simulation from scratch. By using graphical animation, learners can directly access the internal process of the three queue management algorithms. We have received very positive feedbacks from network professionals and University lecturers for using this simulation software.
6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Network and Parallel Computing, 2008. NPC …, 2008
Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support s... more Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret key with one member of the SNG. The shared secret key will be used to set up an encrypted channel between the network and the SNG member. It is imperative to authenticate the data sent through the encrypted channel. This paper uses the symbols and approached presented by Lampson in his paper [15] to provide a formal proof of how encryption channel authenticates itself in SNG. It forms the basis of using encrypted channels in SNG.
Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.
The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21]. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of hops in a redirection increases, the length of SPath increases. The overhead for service routing protocols which uses SPath increases with the length of SPath. Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving service routing. In this paper, we propose a rerouting strategy to optimize service routing, and demonstrate how this strategy can be implemented using SPath to enhance the efficiency and scalability of Service Network Graph (SNG).
The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may
need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21].
Service Path (SPath) holds the authentication and server paths along side with service
information. As the number of hops in a redirection increases, the length of SPath increases. The
overhead for service routing protocols which uses SPath increases with the length of SPath.
Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving
service routing. In this paper, we propose a re-routing strategy to optimize service routing, and
demonstrate how this strategy can be implemented using SPath to enhance the efficiency and
scalability of Service Network Graph (SNG).
… , Session: Wireless Ad Hoc and Wireless …, 2010
Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET).... more Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET). AODV floods the network with control messages to discover a route to the destination, which often results in a large number of control packets traveling through the network. This paper introduces the design and implementation of GeoAODV routing protocol for OPNET Modeler. GeoAODV takes advantage of Global Positioning System (GPS) coordinates to only search the area where a path to the destination is likely to be located. This paper discusses the authors' endeavors to develop a model of GeoAODV protocol and seamlessly integrate it within OPNET Modeler. In addition the paper provides an overview of OPNET Modeler's software architecture for modeling wireless networks and MANET routing protocols.
Applied Sciences, 2020
Healthcare institutions require advanced technology to collect patients’ data accurately and cont... more Healthcare institutions require advanced technology to collect patients’ data accurately and continuously. The tradition technologies still suffer from two problems: performance and security efficiency. The existing research has serious drawbacks when using public-key mechanisms such as digital signature algorithms. In this paper, we propose Reliable and Efficient Integrity Scheme for Data Collection in HWSN (REISCH) to alleviate these problems by using secure and lightweight signature algorithms. The results of the performance analysis indicate that our scheme provides high efficiency in data integration between sensors and server (saves more than 24% of alive sensors compared to traditional algorithms). Additionally, we use Automated Validation of Internet Security Protocols and Applications (AVISPA) to validate the security procedures in our scheme. Security analysis results confirm that REISCH is safe against some well-known attacks.
2008 2nd International Conference on Signal Processing and Communication Systems, 2008
Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.
2010 International Conference on Computational Intelligence and Software Engineering, 2010
2009 First Asian Conference on Intelligent Information and Database Systems, 2009
Multi-hop routing: Each node consists of a fixed communication range and hence they tend to fol... more Multi-hop routing: Each node consists of a fixed communication range and hence they tend to follow multi-hop routing to transmit the data between the source and the destinationnodes.
Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > E... more Skip to main content: Home; About; FAQ; My Account. Research Online. Research Online. Home > ECU Works -2010 > 3773. ECU Publications Pre. 2011. Title. An Empirical Investigation into the Impact of Electronic Connectivity on the Adoption of Internet Banking. Authors. Xueli Huang, Edith Cowan University Shaoguang Li Chenqi Zhang. Document Type. Conference Proceeding. Faculty. Business and Public Management. School. Management. Comments. This item is currently under review. Tell a Colleague Print COinS. Follow. ...
2009 First Asian Conference on Intelligent Information and Database Systems, 2009
Mobile Ad-Hoc Networks: Protocol Design, 2011
2006 Wireless Telecommunications Symposium, 2006
A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is c... more A new innovative deployment of wireless technology is mobile ad hoc network (MANET). A MANET is characterized by no fixed infrastructure or varying topologized structure. This feature allows MANET to be deployed within many circumstances where traditional IP networks are constrained or too expensive in terms of time and resources. Adversely, the mobility of node renders MANETs vulnerable to many
Proceeding of the ASEE Mid-Atlantic …, 2006
Undeniably, computer simulation is an effective tool to help understand and analyze complex proce... more Undeniably, computer simulation is an effective tool to help understand and analyze complex processes and systems in various areas. In recent years, many educators adopt computer simulation technology in the teaching of some topics or courses which include dynamic interactions between components. For years, many concepts of networking have been taught based on textual or other static visual materials. And many researcher have shown that illustrating dynamic scenario using static and lecture-based paradigms compromises the teaching effectiveness. This problem on computer network education prompted us to use graphical simulation. Courses related to computer communication and networking can be benefitted if computer simulation is wisely adopted. In this paper, we describe a study in which we count on computer simulation to illustrate important and complicated algorithms of congestion control and queue management in the TCP/IP protocol suites. Comparing with current queue management techniques, Active Queue Management(AQM) is an innovative mechanism in router packet scheduling. We noticed that AQM is a promising technique and might be implemented in new generation routers. However, the concepts and internal workings of AQM schema are difficult for researchers and students to understand. Thus, we designed an interactive software to dynamically visualize the AQMs' principles and internal workings. The implementation of simulation package used Java technology due to that Java is an object-oriented programming language with extensive build-in graphical facilities and multi-threading mechanism. In our software package, we have implemented the traditional Drop Tail(DT) and two representative AQM schemas: Random Early Detection(RED) and BLUE. It allows users to conduct their own experiments by entering different parameters for each of the algorithms, as shown in the figure below. The structure of simulation package follows the Model-View-Controller paradigm which separates the development of network models from visualization and control of the models. The animation visually describes the internal working process of the algorithms with a plot diagram, which displays the variations of the router queue size. We also compared the simulation results of the three queue management algorithms. From the animating simulation, we can easily see the difference of performance between AQM and DT. The main strength of our AQM simulator is ease of use when compared with other professional simulation tools such as NS2 or OMNet++, because users do not need solid programming capability to build the simulation from scratch. By using graphical animation, learners can directly access the internal process of the three queue management algorithms. We have received very positive feedbacks from network professionals and University lecturers for using this simulation software.
6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 2007
Network and Parallel Computing, 2008. NPC …, 2008
Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support s... more Service Network Graph (SNG) was proposed as a network service sharing infrastructure to support secure services on dynamic aggregation of heterogeneous networks. To participate in SNG, a network has to share a secret key with one member of the SNG. The shared secret key will be used to set up an encrypted channel between the network and the SNG member. It is imperative to authenticate the data sent through the encrypted channel. This paper uses the symbols and approached presented by Lampson in his paper [15] to provide a formal proof of how encryption channel authenticates itself in SNG. It forms the basis of using encrypted channels in SNG.
Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of an... more Mobile ad-hoc networks operate in the absence of any supporting infrastructure. The absence of any fixed infrastructure in mobile ad-hoc networks makes it difficult to utilize the existing techniques for network services, and poses number of various challenges in the area. The discovery and maintenance of secure route is the most flinty challenge. In this paper, we deliberate and implement one secure routing protocol FLSL (Adaptive Fuzzy Logic Based Security Level Routing Protocol) and study its performance under different scenarios. The implementation of FLSL protocol has been carried out by use of NS-2. Various experiments results from simulation verify the protocols, also demonstrate the feasibility of the protocol. A set of experiments under different scenarios have been presented and results of these experiments have been analyzed.
The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21]. Service Path (SPath) holds the authentication and server paths along side with service information. As the number of hops in a redirection increases, the length of SPath increases. The overhead for service routing protocols which uses SPath increases with the length of SPath. Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving service routing. In this paper, we propose a rerouting strategy to optimize service routing, and demonstrate how this strategy can be implemented using SPath to enhance the efficiency and scalability of Service Network Graph (SNG).
The key to success in Next Generation Network is service routing in which service requests may ne... more The key to success in Next Generation Network is service routing in which service requests may
need to be redirected as in the case of the INVITE request in Session Initiation Protocol [21].
Service Path (SPath) holds the authentication and server paths along side with service
information. As the number of hops in a redirection increases, the length of SPath increases. The
overhead for service routing protocols which uses SPath increases with the length of SPath.
Hence it is desirable to optimize SPath to ensure efficiency and scalability of protocols involving
service routing. In this paper, we propose a re-routing strategy to optimize service routing, and
demonstrate how this strategy can be implemented using SPath to enhance the efficiency and
scalability of Service Network Graph (SNG).
… , Session: Wireless Ad Hoc and Wireless …, 2010
Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET).... more Ad-Hoc On-Demand Distance Vector (AODV) is a routing protocol for mobile ad hoc networks (MANET). AODV floods the network with control messages to discover a route to the destination, which often results in a large number of control packets traveling through the network. This paper introduces the design and implementation of GeoAODV routing protocol for OPNET Modeler. GeoAODV takes advantage of Global Positioning System (GPS) coordinates to only search the area where a path to the destination is likely to be located. This paper discusses the authors' endeavors to develop a model of GeoAODV protocol and seamlessly integrate it within OPNET Modeler. In addition the paper provides an overview of OPNET Modeler's software architecture for modeling wireless networks and MANET routing protocols.