- Opportunistic and Delay-Tolerant Networks
- Caching and Content Delivery
- Mobile Ad Hoc Networks
- Age of Information Optimization
- Energy Efficient Wireless Sensor Networks
- Satellite Communication Systems
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- Software-Defined Networks and 5G
- Energy Harvesting in Wireless Networks
- Advanced MIMO Systems Optimization
- Interconnection Networks and Systems
- Smart Parking Systems Research
- IoT Networks and Protocols
- Data Management and Algorithms
- Transport Systems and Technology
- Optimization and Search Problems
- Water Systems and Optimization
- Advanced Memory and Neural Computing
- Fire Detection and Safety Systems
- Security in Wireless Sensor Networks
- Privacy-Preserving Technologies in Data
- Advanced Database Systems and Queries
Guangzhou University
2011-2024
University of Victoria
2021-2022
Central South University
2005-2015
Taiyuan University of Technology
2014
George Mason University
2002
Hong Kong University of Science and Technology
1998
Featuring wide coverage and high data rate, LEO satellite networks will be an important supplement to the traditional terrestrial networks, enabling space-air-ground integrated network service. However, effective load balancing routing strategies for need designed, due bursty characteristic of traffic imbalanced regional communication load. To achieve that, we propose a Distance-based Back-Pressure Routing (DBPR) strategy networks. DBPR calculates link weights based on novel distance-based...
Satellite networks can provide a wider service range and lower delay than traditional terrestrial optical fiber networks. However, due to the bursty characteristic of Internet traffic distributive feature satellite links, traffic-intensive areas often suffer from link congestion while links in other are underutilized, i.e., imbalance problem LEO In this paper, an ant colony optimization routing algorithm with window reduction for networks, ACORA-WR, is proposed achieve load balancing....
Fault-Prone Mobile Edge Cloud (FP-MEC) is a new type of distributed network composed mobile edge computing and function virtualization, where virtual services can be provided in the form service chains (SFCs) that are sequence functions (VNFs) on-demand deployed on resource-limited servers. FP-MEC has characteristic fault probability each VNF dynamic fluctuates with time workloads, making SFCs temporarily unreliable. To increase reliabilities, redundant Backup VNFs (BVNFs) need to near...
By leveraging node mobility and exploring a store-carry-and-forward paradigm, delay-tolerant networking enables assists end-to-end message delivery in many scenarios, e.g., vehicular ad hoc networks mobile social networks. Most existing work the literature either focuses on routing strategies for unicast, or history-based multicast communications. In this paper, we discover most important independent features from Infocom 06 trace data, propose profile-based scheme. Our proposed scheme...
Edge computing pushes computation and storage resources to the network edge, which is close end users, thus, critical for latency-sensitive applications, e.g., intelligent vehicular <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">ad hoc</i> networks (VANETs). To enable these services, a set of edge servers needs be deployed roadsides. Such deployment should offer low-latency services while keeping low or maintenance cost, nontrivial task. In...
With the rapid development of satellite technology and high transmission efficiency LEO satellites, communication has received increasing attention. However, frequent switching satellite-earth links imposes a great challenge in authentication. To tackle this challenge, paper proposes Blockchain-based Authentication Protocol Using Cryptocurrency Technology (BAPC), which solves problem long pause time services caused by user access authentication scenario between satellites ground users....
Integrity and privacy are two important secure matrices in cyber security. Due to the limited resources computing capability of sensor nodes, it is challenging simultaneously satisfy these for top-k querying two-tiered networks. To solve this problem, paper proposes a weight-bind-based query processing scheme (WBB-TQ), which utilises both order-preserving symmetric encryption (OPES) pairwise-key technique ensure data querying. Since OPES can keep size orders sensed items unchanged before...
With explosively increasing volumes of remote sensing, modelling and other Earth science data available, the popularity Internet, scientists are now facing challenges to publish find interesting sets effectively efficiently. Metadata has been recognized as a key technology ease searching retrieval data. In this paper, we discuss DIMES (DIstributed MEtadata Server) prototype system. Designed be flexible yet simple, uses XML represent, store, retrieve interoperate metadata in distributed...
Through utilizing user mobility and short-range device-to-device communication techniques, mobile opportunistic networks (MONs) enable end-to-end message delivery without the dependence on reliable network infrastructures. Examples of these include social vehicular networks. Multicast in MONs is used to disseminate information a group nodes, which have attracted considerable attention due high resource utilization. In this paper, we focus reducing overhead multicast compromising performance,...
In Delay Tolerant Networks (DTNs), multicast is widely adopted for emergency notification in crisis environments and data scattering under military rescue situations, due to its robustness high resource utilization. Although the topology of DTNs highly dynamic, they also demonstrate relatively stable social characteristics, e.g., centrality. this paper we propose a sociality-based buffer management routing (SBMR), where nodes with centrality are selected priority as relay nodes. As choosing...
Abstract In overlapping spectrum sharing, due to the complexity of cognitive environment, it is a real challenge for secondary user (SU) correctly sense usage in time. To tackle this challenge, social awareness-aided transmit power control policy SUs developed. First, network composed group third-party sensing nodes that do not share with PU established, which helps an SU collect information PU. Then, we design Dueling Deep Q-Network (DQN) model achieve efficient dynamic sharing between and...
In delay tolerant networks (DTNs), multicast is widely adopted for emergency notification in crisis environments, or data scattering under military rescue situations, due to its robustness and high resource utilisation. Although the topology of DTNs highly dynamic, they also demonstrate relatively stable social characteristics, e.g., centrality. this paper, we propose a sociality–based comprehensive buffer management routing (SCBMR), where nodes with centrality are selected priority as relay...
In delay tolerant networks (DTNs), multicast is widely adopted for emergency notifications in crisis environment and data scattering under military rescue situations, as it has better robustness resource utilisation. Although the topology of DTNs usually changes quickly, they also demonstrate relatively stable social characteristics, e.g., similarity. this paper, a similarity-aware routing protocol (SSM) proposed, which similarity quantified probability encounter two nodes future based on...
In Delay-Tolerant Networks (DTNs), multicast can make full use of network resources and provide high data delivery ratio, which is widely used in a variety group communication scenarios, such as dissemination rescue circumstances, message transmission mobile social networks, etc. As node behaviors demonstrate characteristics DTNs, this paper, routing scheme based on difference (SDMR) proposed. SDMR considers the differences between nodes, including both similarity centrality differences....
In delay-tolerant networks (DTNs), multicast is widely used in many group communication scenarios as it can make full use of network resources and provide high data delivery ratio. As node behaviours demonstrate social characteristics DTNs, this paper, a routing scheme based on difference (SDMR) proposed. SDMR considers the differences between nodes, including both similarity centrality differences. chooses nodes with greater to forward data, which expand transmission range increase ratio...
Large-scale urban pipeline systems (LSUPSs) are complex networks of flows (e.g., water, oil, or gas). Flow capacity intelligent monitoring, e.g., automatically monitor the sum in an LSUPS, is important task smart cities. Recently, mobile sensors and static receiver nodes used to perform task. Mobile released into network at selected entrances collect data, upload data deployed locations for further analysis. Due cost constraints, numbers limited, which cause problem that some pipelines may...
Energy is one of the most important resources in wireless sensor networks. Recently, mobility base station has been exploited to preserve energy. But event driven networks, issue quite different from continuous monitoring because only a small portion node data send at time. The number that forward traffic should be minimized prolong network lifetime. In this paper, we propose movement-assisted energy conserving method which tries reduce amount forwarding by directing moving close hotspots....