- Cooperative Communication and Network Coding
- Mobile Ad Hoc Networks
- Wireless Networks and Protocols
- Wireless Communication Security Techniques
- Full-Duplex Wireless Communications
- Caching and Content Delivery
- IoT and Edge/Fog Computing
- Advanced Wireless Communication Technologies
- Advanced Wireless Network Optimization
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Advanced MIMO Systems Optimization
- Opportunistic and Delay-Tolerant Networks
- Network Security and Intrusion Detection
- Software-Defined Networks and 5G
- Video Coding and Compression Technologies
- Mobile Crowdsensing and Crowdsourcing
- Spam and Phishing Detection
- Indoor and Outdoor Localization Technologies
- Energy Harvesting in Wireless Networks
- Privacy-Preserving Technologies in Data
- Privacy, Security, and Data Protection
- User Authentication and Security Systems
- Energy Efficient Wireless Sensor Networks
San Jose State University
2018-2021
Davidson College
2019-2021
Temple University
2011-2017
Temple College
2015
Summary Internet of Things (IoT) is a novel paradigm, which not only facilitates large number devices to be ubiquitously connected over the but also provides mechanism remotely control these devices. The IoT pervasive and almost an integral part our daily life. These often obtain user's personal data store it online. security collected big concern in recent times. As are becoming increasingly connected, privacy issues become more critical need addressed on urgent basis. implementations...
Video streaming generates a substantial fraction of the traffic on Internet. The demands video also increase workload server, which in turn leads to slowdowns. In order resolve slowdown problem, and provide scalable robust infrastructure support on-demand streaming, helper-assisted video-on-demand (VoD) systems have been introduced. this architecture, helper nodes, are micro-servers with limited storage bandwidth resources, download store user-requested videos from central server decrease...
Video is one of the main causes dramatic increase in data traffic over cellular networks. Caching an effective mechanism that decreases download rate from base stations and, as a result, load on station, by storing most popular files or videos caches and providing them to users. The problem efficient content placement known NP-complete problem. In this paper, we study role network coding increasing amount available users through cache nodes. We propose coding-based method, compare it best...
These days we are witnessing a tremendous increase in the popularity of wireless devices, e.g. smartphones and tablets. devices typically connected to Internet through cellular connections, such as LTE/4G. Because large portion traffic on goes base stations. Caching contents at stations brings closer users, reduces Internet, cost providing contents. In this paper, study problem collaborative caching networks among set Motivated by emergence cloudlets, consider unlimited cache space our...
A practical way for maximizing the throughput of a wireless network is to decompose into superposition small two-hop networks such that coding can be performed inside these resolve bottlenecks. We call 2-hop relay networks. Therefore, studying capacity very important. Most protocols perform ignore diversity among links by turning off when channels are lossy. Other deal with packets separately - not as members flows which makes problem lossy intractable. In this paper, we use different...
Video streaming is one of the dominant forms traffic on Internet. This increases workload video servers, which leads to substantial slowdowns. In order resolve slowdown problem, and provide a scalable robust infrastructure support on-demand streaming, helper-assisted video-on-demand (VoD) systems have been introduced. this architecture, helper nodes, are micro-servers with limited storage bandwidth resources, download store user requested videos from central server decrease load server....
Energy limitation is one of the most critical challenges in area sensor networks. Sleep scheduling mechanisms can reduce energy consumption. Coverage attempt to cover with minimum possible number sensors. There are many coverage approaches which also consider connectivity problem. However, point coverage, there limited that maintain connectivity. In this paper, we propose a mechanism and two mechanisms. We compare these best methods both mechanism, present method for computing waiting time,...
Having ubiquitous access to the Internet is becoming a necessity of life. Furthermore, we are witnessing rapid increase in amount data requested by mobile users. Cooperative promising approach for addressing these demands, which gives devices opportunity receive help from other order Internet. The helpers can download users, called clients, through their cellular connections. Then, they transmit downloaded clients using Wi-Fi or Bluetooth In this paper, consider problem how share resources...
The broadcast nature of wireless links makes networks an attractive environment for intersession network coding. Most coding protocols exploit this property, but ignore the diversity among by turning off when channels are lossy. Other deal with packets separately - not as members flows which problem lossy untractable. In paper, we use a different approach looking at or batches instead individual packets. We characterize capacity region 2-hop relay operations limited to XOR. represents all...
Broadcasting with network coding mixes different packets to minimize the number of transmissions, which improves energy efficiency wireless networks. On other hand, delaying transmissions increases opportunities at intermediate nodes, but delay packets. In this paper, we consider these two contradicting factors and study problem minimizing in networks while meeting deadlines We show that is NP-complete; therefore, provide a heuristic solve problem. First, construct broadcasting trees, each...
An electronic voting system aims to cast and record votes of the legitimate voters while providing an adequate level security in way are cast. These require eliminating link between voter vote, at same time, audit trail for validating counting tallying processes. Voting is a critical principle democracy, achieve accurate vote recording, storing, reporting, designed must be reliable, tampering fraud-resistant. Moreover, architecture prevent user mistakes, technical errors drawbacks. This...
Energy limitation is one of the most important challenges in wireless networks. Reducing number transmissions effective ways to reduce energy consumption. For this purpose, network coding can be used mix packets together transmissions. In addition importance efficiency, many applications, delay and deadline constraints are also metrics. On other hand, order increase opportunity efficiency coding, relay nodes need wait receive more packets, which increases packets. paper, we study problem...
Abstract Broadcasting with network coding mixes packets to minimize the number of transmissions, which improves energy efficiency wireless networks. On other hand, delaying transmissions increases opportunities at intermediate nodes, but delay packets. In this paper, we consider these two contradicting factors and study problem minimizing in networks while meeting deadline constraints. We show that is NP‐complete; therefore, provide a heuristic solve it. First, construct broadcasting trees,...
One of the main challenges in wireless networks is addressing unreliability links, and providing reliable transmissions. Two important sources errors transmissions are noise interference. In order to address due noise, forward error correction methods can be used, which redundancy added packets detect correct bit errors. However, when environment too noisy, or there interference among transmissions, codes might not able errors, resulting packet erasures. this case, application layer erasure...
This paper addresses the coverage and workload-balancing requirements of worker recruiting in spatial crowdsourcing. That is, recruited workers should be able to visit all crowdsourcing locations satisfy a certain quality, e.g., traffic monitoring or climate forecast. In addition, each operation has cost, data energy consumption, location might have budget for visited workers. The objective this is find algorithm, which ensures requirement minimizes maximal cost any location. We gradually...
Network coding is a technique which can be used in wired and wireless networks to increase the throughput of provide reliable transmissions. Also, it distributed storage systems store large data on different storages fault tolerance against failures. Using network coding, set packets that form file encoded an infinite number packets, subset these coded sufficient retrieve original data. In addition providing tolerance, efficient tool for protecting from eavesdroppers. An eavesdropper not...
A transit-link distributed denial-of-service (DDoS) attack is a special in which the attacker sends out huge number of requests to exhaust capacity link on path traffic comes server. As result, and degradation Quality-of-Service (QoS) occurs. Because does not go victim, protecting legitimate alone hard for victim. With help type router called filter (FR), victim can protect traffic. FR receive from servers apply block incident it. By analyzing rates paths, identify some links that may be...
As the popularity of wireless devices (e.g. smart-phones and tablets) watching videos over Internet is increasing rapidly, delivering high quality to users links becoming an important application. One main challenges multicasting in networks multiple receivers diversity receivers. In a network, have different channel conditions, as result, they experience packet delivery rates. order handle these heterogeneous channels, multi-resolution are used deliver at levels. The recent research on...
Network coding is a technique used to improve both wired and wireless networks' throughput provide reliable transmission. In network coding, original data packets can be encoded an infinite number of coded packets. A subset these sufficient decode the retrieve data. addition providing transmission, as lightweight security mechanism protect against eavesdroppers. An eavesdropper not able unless it has access transmission application, transmitting more redundant increases chance delivering...