Professional Documents
Culture Documents
9 PDF
9 PDF
Received January 19, 2019, accepted February 7, 2019, date of publication March 18, 2019, date of current version April 5, 2019.
Digital Object Identifier 10.1109/ACCESS.2019.2902811
ABSTRACT The Internet of Things (IoT) has been widely used because of its high efficiency and real-time
collaboration. A wireless sensor network is the core technology to support the operation of the IoT, and the
security problem is becoming more and more serious. Aiming at the problem that the existing malicious
node detection methods in wireless sensor networks cannot be guaranteed by fairness and traceability of
detection process, we present a blockchain trust model (BTM) for malicious node detection in wireless
sensor networks. First, it gives the whole framework of the trust model. Then, it constructs the blockchain
data structure which is used to detect malicious nodes. Finally, it realizes the detection of malicious nodes
in 3D space by using the blockchain smart contract and the WSNs’ quadrilateral measurement localization
method, and the voting consensus results are recorded in the blockchain distributed. The simulation results
show that the model can effectively detect malicious nodes in WSNs, and it can also ensure the traceability
of the detection process.
INDEX TERMS Wireless sensor networks, blockchain, smart contract, malicious nodes, vote.
trust for nodes. Thus, it can realize the separated malicious Althunibat et al. [20] proved that both dependent and inde-
nodes. Aiming at the problem of malicious node detection pendent malicious nodes have the same effect on the overall
in WSNs, Zeng et al. [11] provided a trust mechanism based performance of WSNs in terms of detection and false alarm
on D-S (Dempster-Shafer) evidence theory to consider the rate. Uddin et al. [21] proposed a model for detecting power
indirect and direct trust of third-party nodes. It ensured distribution side fault points by using WSNs technology.
the robustness of the network and the validity of the data Based on current sensor and wireless protocols, the model
packet. Compared with [11], Su et al. [12] proposed a trust realizes the process of wireless monitoring, detecting and
model based on the calculation of trust degree and considered locating fault nodes.
both direct and indirect trust levels with the considering The above literatures proposed effective methods to the
the internal attacks faced by wireless sensor networks. This problem of malicious node detection in wireless sensor net-
model reduced the network energy consumption and set the works. However, they did not mention how to record the
trust threshold to assist the decision through the periodically detection process of malicious nodes, nor the mechanism to
updating the trust degree. And it can also effectively distin- safely save the original data for later traceability.
guish the malicious nodes to ensure the security and reliabil- The emergence of Blockchain technology [22], [23] and
ity of the network from the aging nodes. In order to solve the smart contract [24], [25] provides a new way for the detec-
uncertainty of the decision made by the traditional trust mech- tion of malicious nodes in wireless sensor networks. Smart
anism, it regarded the message success rate, node delay, cor- contract can automatically and distributedly perform prede-
rectness and fairness as trust measures. Prabha and Latha [13] fined operations when abnormal behavior occurs or boundary
proposed a multi-attribute trust model which was based on conditions are triggered, and all relevant data are formed
fuzzy processing to calculate the final trust value of each into data blocks that can be traced, verified, and with tim-
node. It proved the accuracy of the decision. Zhang et al. [14] ing characteristics. Ellul and Pace [26] proposed a smart
proposed a new trust management scheme based on D-S contract for detecting virtual machines, which realized the
evidence theory. Firstly, considering the spatio-temporal cor- interaction between the blockchain system and the IoT device
relation of data collected by adjacent sensor nodes, and then under limited conditions, and promoted the automation of
according to D-S theory, the trust model was established. verifiable blockchain transactions. Islam and Kundu [27]
Finally, the whole trust degree was calculated to identify the proposed a smart contract based on blockchain to guaran-
malicious nodes. To solve the problems of the single detection tee personal privacy and information security in the home-
function by malicious node identification system and the sharing economy. Kang et al. [28] combined smart contract
inability, Yang et al. [15] proposed a new malicious node with blockchains and proposed a renewable energy trad-
recognition model to resist malicious libel behavior of high- ing platform that can automatically implement transactions.
reputation nodes in existing WSNs. This model presented the Likewise, Pan et al. [29] proposed an Edge Chain framework
indirect credibility of the third-party nodes and the reputation for edge devices in the IoT [30] by using smart contract to
distribution by using Beta Distribution, and integrated the implement blockchain management of behavior, resources
trust values corresponding to various attack types to ensure and accounts of IoT edge devices. Zhang et al. [31] proposed
the accurate identification of malicious nodes. a framework based on smart contract to solve the problems
Besides the malicious node method based on the trust of trusted access control and distributed in the IoT. In this
mechanism, another kind of protocol detection method based paper, it proposes a blockchain trust model for malicious node
on WSNs is also widely used. In order to solve the low detection in WSNs. It provides a more secure, credible and
processing capacity of WSNs, Das and Das [16] proposed reliable solution for malicious node detection and traceabil-
an enhanced LEACH protocol, which can detect energy con- ity of detection process in WSNs. It not only restrains the
sumption, distance and malicious nodes to ensure the robust- interference of malicious nodes to the normal operation of the
ness of wireless sensor networks. To detect malicious nodes network, but also ensures the transparency and traceability of
and enhance network security, Chen et al. [17] presented a the detection process. At the same time, it avoids the space
new multi-valued trust routing protocol (MTR) that is based limitation to some extent.
on sensor trust and the number of hops from sensor nodes The paper is structured as follows. In Sec. II, we pro-
to base station (BS) to ensure network stability. To solve pose a blockchain trust model for malicious node detection
the problem of malicious nodes spoofing their identity and in WSNs; Sec. III carries out simulation experiments and
location in WSNs, Atassi et al. [18] proposed a decentralized analysis of the model; and Sec. IV includes the summary of
malicious node detection technique based on received signal the paper and future work.
strength indicator (RSSI). To solve the problem of identity
attacks by malicious nodes through wireless signals in wire- II. BTM FOR MALICIOUS NODE DETECTION IN WSNs
less network communications, Pinto et al. [19] proposed a In this section, we propose a blockchain trust model for
new strategy based on machine learning. It used two clas- malicious node detection in wireless sensor networks. First
sifiers to process and analyze real-time samples of received of all, we introduce the overall structure involved in the
signal strength, and optimize the case of legitimate nodes blockchain trust model in Sec. II-A. The data structure of
and attack nodes whose landmarks are close to each other. the model is constructed in Sec. II-B. The smart contract
of the model is designed in Sec. II-C where we present the responsible for receiving the monitoring data collected by the
formal expression of the smart contract and discuss indicators common node, processing the smart contract, checking the
of evaluating malicious nodes by smart contract, then we give legality of the transaction data, and updating and maintain-
WSN location method in smart contract. ing the node data and the account status in the blockchain
organization. Among them, the smart contract is a piece of
code that is deployed on the distributed ledger, which can
control the received external information. In particular, the
generation of each block is determined by all pre-selected
nodes, and stored in Cmndb . The sensor is a normal node and
only uploads the collected monitoring data, regardless of the
accounting process.
Therefore, based on their common characteristics, the
overall structure of the wireless sensor network can be
mapped into the Consortium Blockchain network, and then
the detection of malicious nodes in the blockchain network.
The blockchain trust model (BTM) for malicious node detec-
tion in WSNs is formalized as follows:
Definition 1: BTM is a 8-tuple set.
(BS, AN , SENSOR, Cmndb , SC, T , α, β)
where:
1) BS = {bsi |i ∈ N+ } is the finite set of base stations.
2) SN = {snj |j ∈ N+ } is the finite set of cluster heads.
3) SENSOR = {sensor k |k ∈ N+ } is the finite set of
sensors.
4) Cmndb is a malicious node detection blockchain.
5) SC is the smart contract of Cmndb . (see Sec.II-C-1).
6) T = {tf |tf ∈ SENSOR × SN ∨ SN × BS, f ∈ N+ } is the
FIGURE 1. An illustration of BTM for malicious node detection in WSNs.
transaction set of nodes. SENSOR × SN is a Cartesian set of
sensor and SN . SN × BS is a Cartesian set of SN and BS.
7) α : S ∨ SN → Cmndb is the mapping from sensor and
A. MODEL ARCHITECTURE
SN to Cmndb .
As shown in the top half of Fig. 1, in wireless sensor 8) β is the location list of the sensor. (see Sec. II-C-3).
networks, we consider dividing the nodes into bs, sn and
sensor [32]. The sensor monitors the indicators of the area in B. THE BLOCKCHAIN DATA STRUCTURE FOR
real time, collects monitoring data, understands the running MALICIOUS NODE DETECTION
status, and uploads the integrated data to the associated sn
In order to better describe the Cmndb blockchain, this paper
through the cellular link; sn collects all the monitoring data
proposes a block data structure based on malicious node
uploaded by the sensor in the transmission range, analyzes
detection blockchain (Cmndb − BDS). It is different from
the running status of the sensor in real time, and collects the
the traditional WSNs where it cannot be repeatedly detected.
results to the bs center through the backhaul network.
Cmndb − BDS records all communication data.
As shown in the lower part of Fig. 1, we map the operating
framework of the wireless sensor network into the Consor-
tium Blockchain. There are four main types of nodes in the
Consortium Blockchain: contract issuing node, CA node,
verification node and common nodes. bs is the contract pub-
lishing node, responsible for publishing intelligent contracts,
as the issuer of activities.
The sn serves as both CA node and verification node.
CA node provides digital certificate-based identity informa-
tion to members of the Consortium Blockchain community
(Each sn and the sensor in the communication range is an
alliance), and can generate or cancel a member’s identity FIGURE 2. An illustration of Cmndb -BDS.
III. SIMULATION
To validate the performance of our proposed model, we con-
duct the simulation experiment on the BTM model. Firstly,
we present the network environment required to build BTM
in Sec. III-A. Then, the simulation results are analyzed in
Sec. III-B. Finally, Sec. III-C analyze the performance of the
model.
FIGURE 5. A schematic diagram of the location of node.
A. MODEL BUDLING
TABLE 1. The contract addresses for sn node.
In order to verify the effectiveness of the method, this paper
uses Truffle as a smart contract development framework and
build tool. A contract abstract interface that can directly
operate contract functions in JavaScript through web3.js.
Ganache-cli is a private-chain local simulation tool that mines
faster than Geth. Npm is built as a project in development,
including management and staging servers, etc. Solidity is the
language of smart contract development. We consider run-
ning Truffle and Ganache-cli on the sensor node. In addition, TABLE 2. The sensor_id and numbers of sn node.
in order to better simulate the wireless sensor network envi-
ronment, we conduct simulations by using OPNET network
simulation software to collect and analyze the key parameters.
The contents of the simulation are as follows: the sim-
ulation scenario is set to 1000m × 1000m × 500m cube
disaster mountainous area where 50 nodes are randomly
deployed (5 sn nodes, 45 sensor nodes). Assuming that the
sn node is the legitimate node, there are malicious nodes in
the sensor node. In order to locate the sensor node accurately,
the NLL is obtained by using QM to locate the sensor node in
three-dimensional space. Smart contract that receives the key with QM. From this figure we can get the accuracy of QM
parameters of the sensor node, such as state, DT , FR, RT , NS positioning. Moreover, to better manage the sensor node
and NF , calculates the NCQ and η. All sn node can only vote in the communication range of each sn node, we perform
for a malicious node based on η for the sensor node within the clustering processing on all sensor nodes. Table 1 shows
scope of their own communication. In addition, all sn nodes the contract addresses for each sn node in a smart contract.
comply with the content specified in the smart contract and Table 2 shows the sensor_id and numbers covered by each
records it on the blockchain. sn node.
NCQ and η as shown in Table 5. Table 6 shows the NCQ the sensor node information of the next block record directly.
and η in the communication range in the smart contract. If the node wants to tamper with past sensor data, the local
As shown in Fig. 6, it shows all the η of sensor nodes. (Since data recorded by the sensor node must be changed by 51%.
the solidity language only supports integers, when the smart Such a large complexity process data can not be tampered.
contract input data is called, the collected data is expanded In addition, the model uses public key cryptosystem, merkle
accordingly. There is a slight error between the calculation tree, hash and ECDSA signature algorithm to ensure data
result and the direct calculation data.) integrity and security.
TABLE 6. NCQ and η in the SN1 communication range in the smart contract.
3) TRACEABILITY ANALYSIS
In this model, it uses distributed data blocks linked in time-
stamped order, and all sensor nodes are stored permanently.
The information of the sensor node is bound to each data
record in the link. The whole process is transparent and
traceable, realizing dynamic update of data records in real
time, and ensuring traceability of original data. It makes
up for the problems of opacity, traceability and injustice in
the traditional WSNs process of detecting malicious nodes.
When malicious behavior occurs in WSNs, the identity of
the attacking node can be identified by traceability of the
model, and corresponding measures can be taken to prevent
FIGURE 6. The credit of sensor. the further impact of such malicious nodes on the network.
nodes in, and the consensus results of voting are recorded in [10] F. Zawaideh, M. Salamah, and H. Al-Bahadili, ‘‘A fair trust-based
the blockchain distributed. The simulation results show that malicious node detection and isolation scheme for WSNs,’’ in Proc.
2nd IT-DREPS, Amman, Jordan, Dec. 2017, pp. 1–6. doi: 10.1109/
the model can effectively detect malicious nodes in WSNs IT-DREPS.2017.8277813.
and ensure the traceability of the detection process. [11] L. G. Zeng, L. Y. Yuan, and H. Wang, ‘‘Detecting WSN node mis-
At present, the model is still in the theoretical research behavior based on the trust mechanism,’’ J. Zhejiang Normal Univ.
(Nat. Sci.)., vol. 41, no. 1, pp. 39–43, 2018. doi: 10.16218/j.issn.1001-
stage, and there is still room for further research and improve- 5051.2018.01.007.
ment. In the next step, we will improve the model from the [12] Y. X. Su, X. F. Gao, and Y. Lu, ‘‘Credibility based WSN trust
following two aspects: model,’’ Electron. Opt. Control, vol. 25, no. 3, pp. 32–36, 2018.
doi: 10.3969/j.issn.1671-637X.2018.03.008.
1) Get more engineering and experimental data, and fit
[13] V. R. Prabha and P. Latha, ‘‘Fuzzy trust protocol for malicious node
the NCQ and η in the formal model BTM to meet the detection in wireless sensor networks,’’ in Wireless Pers. Commun., vol. 94,
practical needs. no. 4, pp. 2549–2559, 2017. doi: 10.1007/s11277-016-3666-1.
2) The consensus method in the model is the traditional [14] W. Zhang, S. Zhu, J. Tang, and N. Xiong, ‘‘A novel trust management
scheme based on Dempster–Shafer evidence theory for malicious nodes
POW workload proof method, which requires relatively detection in wireless sensor networks,’’ J. Supercomput., vol. 74, no. 4,
large computational power and high energy consump- pp. 1779–1801 2018. doi: 10.1007/s11227-017-2150-3.
tion, so it is not especially suitable for the running [15] G. Yang, G. S. Yin, W. Yang, and D.-M. Zuo, ‘‘A reputation-based model
for malicious node detection in WSNs,’’ J. Harbin Inst. Technol., vol. 41,
environment of wireless sensor networks. The next step no. 10, pp. 158–162, 2009. doi: 0367-6234(2009)10-0158-05.
will improve and experiment the combination of PoS [16] S. Das and A. Das, ‘‘An algorithm to detect malicious nodes in wireless
and other methods. sensor network using enhanced LEACH protocol,’’ in Proc. Int. Conf.
Adv. Comput. Eng. Appl., Ghaziabad, India, Mar. 2015, pp. 875–881.
doi: 10.1109/ICACEA.2015.7164828.
ACKNOWLEDGMENT [17] Z. Chen, R. Zhang, L. Ju, and W. Wang, ‘‘Multivalued trust routing based
The authors would like to thank the reviewers for their critical on topology level for wireless sensor networks,’’ in Proc. 12th IEEE Int.
and constructive comments and suggestions. Conf. Trust, Secur. Privacy Comput. Commun., Melbourne, VIC, Australia,
Jul. 2013, pp. 1516–1521. doi: 10.1109/TrustCom.2013.185.
[18] W. R. Pires, T. H. de Paula Figueiredo, H. C. Wong, and A. A. F. Loureiro,
STATEMENT ‘‘Malicious node detection in wireless sensor networks,’’ in Proc. 18th Int.
The author’s confirmation that the mentioned received fund- Parallel Distrib. Process. Symp., Santa Fe, NM, USA, Apr. 2004, p. 24.
doi: 10.1109/IPDPS.2004.1302934.
ing in the ‘‘Acknowledgment’’ section did not lead to any [19] E. M. de Lima Pinto, R. Lachowski, M. E. Pellenz, M. C. Penna, and
conflict of interests. R. D. Souza, ‘‘A machine learning approach for detecting spoofing attacks
The simulation data used to support the findings of this in wireless sensor networks,’’ in Proc. 32nd AINA, Krakow, Poland,
May 2018, pp. 752–758. doi: 10.1109/AINA.2018.00113.
study have not been made available because it is a series of [20] S. Althunibat, A. Antonopoulos, E. Kartsakli, F. Granelli, and
data randomly generated based on sensor indicators. C. Verikoukis, ‘‘Countering intelligent-dependent malicious nodes in
target detection wireless sensor networks,’’ IEEE Sensors J., vol. 16,
REFERENCES no. 23, pp. 8627–8639, Dec. 2016. doi: 10.1109/JSEN.2016.2606759.
[21] B. Uddin, A. Imran, and M. A. Rahman, ‘‘Detection and locating the
[1] T. Qiu, K. Zheng, M. Han, C. L. P. Chen, and M. Xu, ‘‘A data- point of fault in distribution side of power system using WSN technol-
emergency-aware scheduling scheme for Internet of Things in smart ogy,’’ in Proc. 4th ICAEE, Dhaka, Bangladesh, Sep. 2017, pp. 570–574.
cities,’’ IEEE Trans. Ind. Informat., vol. 14, no. 5, pp. 2042–2051, doi: 10.1109/ICAEE.2017.8255421.
May 2018. doi: 10.1109/TII.2017.2763971.
[22] S. Nakamoto. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
[2] J. N. Al-Karaki and A. E. Kamal, ‘‘Routing techniques in wireless sensor
[Online]. Available: https://nakamotoinstitute.org/bitcoin
networks: A survey,’’ IEEE Wireless Commun., vol. 11, no. 6, pp. 6–28,
[23] M. Swan, Blockchain: Blueprint for a New Economy. Sebastopol,
Dec. 2004. doi: 10.1109/MWC.2004.1368893.
CA, USA: O’Reilly Media, 2015.
[3] S. N. Pakzad, G. L. Fenves, S. Kim, and D. E. Culler, ‘‘Design and
implementation of scalable wireless sensor network for structural moni- [24] K. Christidis and M. Devetsikiotis, ‘‘Blockchains and smart contracts
toring,’’ ASCE J. Infrastruct. Syst., vol. 14, no. 1, pp. 89–101, Mar. 2008. for the Internet of Things,’’ IEEE Access, vol. 4, pp. 2292–2303, 2016.
doi: 10.1061/(ASCE)1076-0342. doi: 10.1109/ACCESS.2016.2566339.
[4] H. Alemdar and C. Ersoy, ‘‘Wireless sensor networks for healthcare: [25] D. Magazzeni, P. McBurney, and W. Nash, ‘‘Validation and verification of
A survey,’’ Comput. Netw., vol. 54, no. 15, pp. 2688–2710, Oct. 2010. smart contracts: A research agenda,’’ Computer, vol. 50, no. 9, pp. 50–57,
doi: 10.1016/j.comnet.2010.05.003. 2017. doi: 10.1109/MC.2017.3571045.
[5] K. Akkaya and M. Younis, ‘‘A survey on routing protocols for wire- [26] J. Ellul and G. J. Pace, ‘‘AlkylVM: A virtual machine for smart contract
less sensor networks,’’ Ad Hoc Netw., vol. 3, no. 3, pp. 325–349, 2005. blockchain connected Internet of Things,’’ in Proc. 9th NTMS, Paris,
doi: 10.1016/j.adhoc.2003.09.010. France, Feb. 2018, pp. 1–4. doi: 10.1109/NTMS.2018.8328732.
[6] W. Zhang and G. Cao, ‘‘Group rekeying for filtering false data in sen- [27] M. N. Islam and S. Kundu, ‘‘Poster abstract: Preserving IoT privacy in
sor networks: A predistribution and local collaboration-based approach,’’ sharing economy via smart contract,’’ in Proc. IoTDI, Orlando, FL, USA,
in Proc. IEEE 24th Annu. Joint Conf. IEEE Comput. Commun. Soc., Apr. 2018, pp. 296–297. doi: 10.1109/IoTDI.2018.00047.
Mar. 2005, pp. 503–514. doi: 10.1109/INFCOM.2005.1497918. [28] E. S. Kang, S. J. Pee, J. G. Song, and J. W. Jang, ‘‘A blockchain-
[7] A. D. Wood and J. A. Stankovic, ‘‘Denial of service in sensor net- based energy trading platform for smart homes in a microgrid,’’
works,’’ Computer., vol. 35, no. 10, pp. 54–62, Oct. 2002. doi: 10.1109/ in Proc. 3rd ICCCS, Nagoya, Japan, Apr. 2018, pp. 472–476.
MC.2002.1039518. doi: 10.1109/CCOMS.2018.8463317.
[8] F. Li and J. Wu, ‘‘A probabilistic voting-based filtering scheme in [29] J. Pan, J. Wang, A. Hester, I. Alqerm, Y. Liu, and Y. Zhao, ‘‘EdgeChain:
wireless sensor networks,’’ in Proc. 6th Int. Conf. Wireless Commun. An edge-IoT framework and prototype based on blockchain and smart
Mobile Comput. (IWCMC), New York, NY, USA, 2006, pp. 27–32. contracts,’’ IEEE Internet Things J., to be published. doi: 10.1109/JIOT.
doi: 10.1145/1143549.1143557. 2018.2878154.
[9] T. Qiu, R. Qiao, and D. O. Wu, ‘‘EABS: An event-aware back- [30] T. Qiu, X. Liu, K. Li, Q. Hu, A. K. Sangaiah, and N. Chen, ‘‘Community-
pressure scheduling scheme for emergency Internet of Things,’’ IEEE aware data propagation with small world feature for Internet of vehicles,’’
Trans. Mobile Comput., vol. 17, no. 1, pp. 72–84, Jan. 2018. IEEE Commun. Mag., vol. 56, no. 1, pp. 86–91, Jan. 2018. doi: 10.1109/
doi: 10.1109/TMC.2017.2702670. MCOM.2018.1700511.
[31] Y. Zhang, S. Kasahara, Y. Shen, X. Jiang, and J. Wan, ‘‘Smart contract- ZHAO TIAN received the B.S. degree in infor-
based access control for the Internet of Things,’’ IEEE Internet Things J., mation and computing science from Huazhong
to be published. doi: 10.1109/JIOT.2018.2847705. Agricultural University, in 2008, the M.S. degree
[32] L. Xu, R. Collier, and G. M. P. O’Hare, ‘‘A survey of clustering techniques in computer software and theory from Zhengzhou
in WSNs and consideration of the challenges of applying such to 5G University, in 2011, and the Ph.D. degree in
IoT scenarios,’’ IEEE Internet Things J., vol. 4, no. 5, pp. 1229–1249, safety technology and engineering from Beijing
Oct. 2017. doi: 10.1109/JIOT.2017.2726014. Jiaotong University, in 2016. He is currently a
[33] J. Kishigami, S. Fujimura, H. Watanabe, A. Nakadaira, and A. Akutsu,
Lecturer with the Software College, Zhengzhou
‘‘The blockchain-based digital content distribution system,’’ in Proc.
University. His research interests include informa-
IEEE 5th Int. Conf. Big Data Cloud Comput., Dalian, China, Aug. 2015,
pp. 187–190. doi: 10.1109/BDCloud.2015.60. tion security, artificial intelligence, and intelligent
[34] M. Momani, M. Takruri, and R. Al-Hmouz, ‘‘Risk assessment algorithm transportation.
in wireless sensor networks using beta distribution,’’ Int. J. Comput. Netw.
Commun., vol. 6, no. 5, pp. 157–166, 2014. doi: 10.5121/ijcnc.2014.6511. JIAN-SEN CHEN received the B.S. degree from
[35] M. B. Nirmala, A. S. Manjunath, and M. Rajani, ‘‘Secure and efficient Zhengzhou University, China, in 2017, where he is
voting based localization scheme for wireless sensor networks,’’ BVICA
currently a graduate student. His research interests
M’s Int. J. Inf. Technol., vol. 6, no. 2, pp. 750–756, 2014.
include information security and blockchain.
QI LIU received the B.S. degree from Zhengzhou WEI LIU received the B.S. and M.S. degrees in
University, China, in 2016, where she is currently information engineering from Zhengzhou Univer-
a graduate student. Her research interests include sity, China, in 2003 and 2008, respectively, and
information security and Petri net theory. the Ph.D. degree from Tohoku University, Japan,
in 2013. He is currently an Associate Professor
with the Software College, Zhengzhou Univer-
sity. His research interests include information
security, wireless mesh networks, and the Internet
healthcare.