- IPv6, Mobility, Handover, Networks, Security
- Wireless Networks and Protocols
- Advanced Wireless Network Optimization
- Wireless Communication Networks Research
- Advanced MIMO Systems Optimization
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Mobile Agent-Based Network Management
- Mobile Ad Hoc Networks
- Caching and Content Delivery
- Network Traffic and Congestion Control
- IoT Networks and Protocols
- Cooperative Communication and Network Coding
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Electrochemical Analysis and Applications
- Bluetooth and Wireless Communication Technologies
- Cloud Computing and Resource Management
- Indoor and Outdoor Localization Technologies
- Telecommunications and Broadcasting Technologies
- Green IT and Sustainability
- Analytical Chemistry and Sensors
- Advanced Optical Network Technologies
- Peer-to-Peer Network Technologies
- Advanced Authentication Protocols Security
National Yang Ming Chiao Tung University
2015-2024
Xidian University
2024
University of Maryland, College Park
2024
University of California, Riverside
2024
Association for Computing Machinery
2024
National Sun Yat-sen University
2018
Industrial Technology Research Institute
2017
National Tsing Hua University
2001-2010
National Chung Hsing University
1999-2007
Council of Agriculture
2006
In various scenarios, achieving security between IoT devices is challenging since the may have different dedicated communication standards and resource constraints as well applications. this article, we first provide requirements existing solutions for security. We then introduce a new reconfigurable framework based on edge computing, which utilizes near-user device, that is, agent, to support functions resources of all protocol layers including multiple applications an device. This designed...
Energy efficiency is an important issue in mobile wireless networks since the battery life of terminals limited. Conservation power has been addressed using many techniques. This paper addresses energy medium access control (MAC) protocols for networks. The develops a framework to study consumption MAC protocol from transceiver usage perspective. then applied compare performance set that includes IEEE 802.11, energy-conserving (EC-MAC), PRMA, multiservices dynamic reservation-TDMA...
Environmental and security applications have generated major demands for effective field-deployable tools detecting nitroaromatic compounds, such as chloramphenicol (an antibiotic), parathion organophosphate nerve agent), TNT (2,4,6-trinitrotoluene, an explosive) in a fast, simple, sensitive, reliable, cost-effective manner. We report here single-run approach purpose. The reduction potential of different compounds was found to systematically shift with the substituent group at...
This article reviews wireless LAN security with a focus on the evolving new IEEE 802.11i standard. The major enhancements in encryption and authentication defined by are illustrated. In addition, newly introduced key management is discussed. Because incorporates 802.1X as its enhancement, consideration of roaming users depicted. Both intrasubnet intersubnet
Energy conservation is essential to wireless networks, particularly for third-generation (3G) and fourth-generation (4G) systems, because high-speed data transmissions would rapidly exhaust the energy of a mobile station. This paper presents details energy-saving mechanisms packet services in two major standards, namely, Third-Generation Partnership Project (3GPP) 2 (3GPP2). In addition qualitative comparison, analytic models quantitative comparison based on are provided. The proposed...
Electrocatalytic oxidation of cysteine (CySH) at Nafion/lead ruthenate pyrochlore (Py) chemically modified electrodes was thoroughly studied. Electrochemical ac impedance spectroscopy analysis indicated the formation Py microparticles in interfacial galleries Nafion. Experiments with benchmark systems Fe(CN)63-/4- and Ru(bpy)2+/3+ reveal suppression Nafion's anionic character after situ precipitation Py. Michaleis−Menten-type kinetics rate determination step CyS−Py−RuVI → Py−RuIV + CyS−SCy...
This paper presents two new methods that use local information alone to predict the resource demands of and determine reservation levels for future handoff calls in multimedia wireless IP networks. The proposed model instantaneous demand directly. differs from most existing derive modeling factors impact demands. As a result, allow to: (1) follow non-Poisson and/or nonstationary arrival processes; (2) have arbitrary per-call demands; (3) arbitrarily distributed call channel holding times....
Receiver synchronization of continuous media streams is required to deal with delay differences and variations resulting from delivery over packet networks such as the Internet. This function commonly provided using per-stream playout buffers which introduce additional in order produce a schedule meets requirements. Packets arrive after their scheduled time are considered late discarded. In this paper, we present Concord algorithm, provides delay-sensitive solution for buffering. It records...
The Internet has experienced tremendous expansion in the past several years. Demands for IP multimedia services are emerging. third-generation (3G) wireless networks aim to support mobile users with numerous services. 3G standards organizations developing subsystems (IMS) achieve seamless integration between and networks. Moreover, collaboration IETF, 3GPP, 3GPP2 is essential development of IMS next-generation This article first provides an overview 3GPP illustrates requirements,...
In this paper, we present a novel Wi-Fi-based pedestrian collision avoidance (PCA) system: WiSafe. Compared to vision-based and radar-based PCA systems, WiSafe has key advantage of Non-Line-of-Sight (NLOS). can assist drivers in discovering pedestrians NLOS blind spots, where the views are blocked by buildings, vehicles, or other obstacles. particular, it is very useful when driving poor visibility conditions such as at night, heavy rain, thick fog. save split seconds, which potentially...
Network Function Virtualization (NFV) enables mobile operators to virtualize their network entities as Virtualized Functions (VNFs), offering fine-grained on-demand capabilities. VNFs can be dynamically scale-in/out meet the performance desire and other dynamic behaviors. However, designing auto-scaling algorithm for desired characteristics with low operation cost latency, while considering existing capacity of legacy equipment, is not a trivial task. In this paper, we propose VNF Dynamic...
In 5G, multi-access edge computing enables the applications to be offloaded near-end servers for faster response. According 3GPP standards, users in 5G are separated into many types, e.g., vehicles, AR/VR, IoT devices, etc. Specifically, high-priority traffic can preempt resources guarantee service quality. However, even if a is transmitted with low priority, its latency requirement much lower than that 4G. Too strict and priority-based make resource configuration difficult on side....
This article presents the technical details of Extensible Authentication Protocol (EAP) and IEEE 802.1x by using WIRE1x, an open-source implementation client (supplicant) various EAP-based authentication mechanisms. By a real implementation, EAP should be easily understood.
This paper presents an energy conservation scheme, Maximum Unavailability Interval (MUI), to improve the efficiency for Power Saving Class of Type II in IEEE 802.16e. By applying Chinese Remainder Theorem, proposed MUI is guaranteed find maximum Interval, during which transceiver can be powered down. We also propose new mathematical techniques reduce computational complexity when solving Theorem problem. Because reduced significantly, practically implemented real systems. The fully...
Cellular network control procedures (e.g., mobility, idle-active transition to conserve energy) directly influence data plane behavior, impacting user-experienced delay. Recognizing this control-data interdependence, L25GC re-architects the 5G Core (5GC) network, and its processing, reduce latency of operations their impact on plane. Exploiting shared memory, eliminates message serialization HTTP processing overheads, while being 3GPP-standards compliant. We improve by factoring functions...
This paper describes the design and analysis of scheduling algorithm for energy conserving medium access control (EC-MAC), which is a low-power (MAC) protocol wireless mobile ATM networks. We evaluate algorithms that have been proposed traditional Based on structure EC-MAC characteristics channel, we propose new can deal with burst errors location-dependent errors. Most either wired or networks were analyzed homogeneous traffic multimedia services simplified models. analyze our more...
The paper provides the comparison between WCDMA and cdma2000 of impact an inactivity timer on energy consumption a mobile station. Both simulation analysis are utilized to investigate performance cdma2000. novel practical models proposed analyze quantify in case bursty streaming traffic. analytic verified extensively by simulation.
Mobile computers typically have limited energy for computing and communications due to short battery lifetimes. Encoding, decoding, transmission of video information require significant communication resources. Low power encoding decoding schemes been researched extensively. In this paper, we focus on processing encoded under low conditions. Such processing, while conserving power, attempts reduce deterioration quality.
IEEE 802.11 wireless LANs have been widely deployed. How to efficiently balance the traffic loads among access points (APs), which will lead improved network utilization and higher quality of user experience, has become an important issue. A key challenge is how select AP use during handoff process in a way that achieve overall load network. The conventional approaches typically signal-to-noise ratio (SNR) as criterion without considering each AP. In this paper, we propose two effective new...
Cognitive radio has received great attention recently for its ability to improve spectrum efficiency by letting secondary users access resource that is unoccupied primary users. However, cognitive also brings new challenges in the design of future wireless networks. In this paper, we investigate problem allocation Specifically, consider proportional fair scheduling relay Our formulation takes into account fluctuations usable resource, channel quality variations caused frequency selectivity,...
In Machine-to-Machine (M2M) communications, devices can automatically communicate with each other without any intervention by humans. However, LTE-A is primarily designed and optimized for Human-to-Human (H2H) communications. Even though has defined Machine-Type Communications (MTC), several parts are still undefined or follow the existing H2H standards. Specifically, paging mechanism in will substantially increase computational load signaling overhead of system when there many M2M devices....