- Advanced Authentication Protocols Security
- Advanced Wireless Network Optimization
- Vehicular Ad Hoc Networks (VANETs)
- Cooperative Communication and Network Coding
- User Authentication and Security Systems
- Advanced MIMO Systems Optimization
- Wireless Networks and Protocols
- Cryptography and Data Security
- Wireless Communication Networks Research
- Mobile Ad Hoc Networks
- Advanced Optical Network Technologies
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Advanced Photonic Communication Systems
- IPv6, Mobility, Handover, Networks, Security
- Optical Network Technologies
- IoT and Edge/Fog Computing
- Wireless Body Area Networks
- RFID technology advancements
- Energy Efficient Wireless Sensor Networks
- Software-Defined Networks and 5G
- Opportunistic and Delay-Tolerant Networks
- Internet Traffic Analysis and Secure E-voting
- Security in Wireless Sensor Networks
- Network Traffic and Congestion Control
Qatar University
2021-2025
Nanyang Technological University
2014-2023
Tianjin University
2012-2023
Nanyang Institute of Technology
2021
Shenyang Aerospace University
2020
South Central Minzu University
2016-2018
Chengdu Institute of Information Technology (China)
2016
PLA Army Engineering University
2013
Fuzhou University
2013
Hong Kong University of Science and Technology
1997-2005
High demands for broadband mobile wireless communications and the emergence of new multimedia applications constitute motivation to development access technologies in recent years. The Long Term Evolution/System Architecture Evolution (LTE/SAE) system has been specified by Third Generation Partnership Project (3GPP) on way towards fourth-generation (4G) ensure 3GPP keeping dominance cellular communication technologies. Through design optimization radio techniques a further evolution LTE...
Underwater Wireless Sensor Networks (UWSNs) are expected to support a variety of civilian and military applications. In UWSNs, Medium Access Control (MAC) protocol has attracted strong attention due its potentially large impact the overall network performance. Unlike terrestrial networks, which mainly rely on radio waves for communications, UWSNs utilize acoustic waves, pose new research challenge in design MAC protocols. To present development protocols this paper surveys current...
With the continuous development of mobile communication technologies, Third Generation Partnership Project (3GPP) has proposed related standards with fifth generation technology (5G), which marks official start evolution from current Long Term Evolution (LTE) system to next (5GS). This paper makes a large number contributions security aspects 3GPP 5G networks. Firstly, we present an overview network architecture and functionality Subsequently, focus on new features techniques including...
An electronic health (e-health) record system is a novel application that will bring great convenience in healthcare. The privacy and security of the sensitive personal information are major concerns users, which could hinder further development widely adoption systems. searchable encryption (SE) scheme technology to incorporate protection favorable operability functions together, can play an important role e-health system. In this paper, we introduce cryptographic primitive named as...
It is essential for Vehicular Ad-hoc networks (VANETs) to have reliable vehicles communication with vehicles. VANET dynamical network where the frequently alter their place. Safe routing of great essence at time process fit in shared trust/belief involving these nodes. Occasionally, malicious node transmits counterfeit data amid other To find out deemed be a difficult task when nodes try distort discovery route or transmission within network. Researchers worked extensively ensure safe...
The emergence of narrowband Internet Things (NB-IoT) has brought hope for the popularization and application mobile standards. Nowadays, NB-IoT technology been introduced into Third Generation Partnership Project (3GPP) standards, where low-overhead, low-data-transmission IoT devices can securely access fifth generation (5G) core network through 3GPP network. However, according to current standard, these still employ traditional authentication process normal user equipment implement mutual...
The machine-to-machine (M2M) communication, which plays a vital role in the Internet of Things (IoT), allows wireless and wired systems to monitor environments exchange information among various machines automatically without human interventions. In order promote development IoT exploit M2M applications, Engineering Task Force (IETF) has been developing standard named Protocol version 6 (IPv6) over low-power personal area networks (6LoWPAN) enable IP-based devices connect open Internet....
The narrowband Internet of Things (NB-IoT) system has become an integral part the future fifth generation (5G) network. Although NB-IoT gradually been improved in traditional LTE network currently, does not have effective access authentication scheme 5G According to current 3rd Generation Partnership Project (3GPP) standard, devices still use method perform mutual with network, which may bring a large amount signaling and communication overhead. This problem will be magnified large-scale...
Due to the dynamic in nature, vulnerabilities that exist VANET are much higher when compared with of wired network infrastructure. In DoS attacks, legitimate users prohibited from accessing services or resource. The primary goal attack make desired destination vehicle unavailable relegate message all way through affects reachability. proposed reCAPTCHA controller mechanism prevents automated attacks similarly like botnet zombies. is used check and prohibit most DDoS attacks. For implementing...
Machine learning (ML) technology has shown its unique advantages in many fields and excellent performance applications, such as image recognition, speech recommendation systems, natural language processing. Recently, the applicability of ML wireless sensor networks (WSNs) attracted much attention. As resources are limited WSNs, identifying how to improve resource utilization achieve power-efficient load balancing is becoming a critical issue WSNs. Traditional green routing algorithms aim...
Network lifetime (NL) is a critical metric in the design of energy-constrained wireless sensor networks (WSNs). In this paper, we investigate joint optimal physical, medium access control (MAC) and routing layers to maximize NL multiple-sources single-sink (MSSS) WSN with energy constraints. The problem maximization (NLM) can be formulated as mixed integer-convex optimization adoption time division multiple (TDMA) technique. When integer constraints are relaxed take real values, transformed...
"Vehicle-to-grid" (V2G) power will be a new green energy scheme in which electric or plug-in hybrid vehicles communicate with the smart grid to sell demand response services by either delivering electricity into throttling their charging rate. Due high vehicular speed, sporadic connection, limited communication range, and large volume of data that need transmitted, V2G communications have crucial requirements fast authentication encryption/decryption. This paper proposes unique batch...
The recent advancements in nanotechnology, electronic technology, and biology enable bio-inspired nanosensors. Bionanosensor networks, which are composed of nanoscale devices, envisioned to apply a great number potential applications. Clock synchronization is essential establish distributed cooperation among the bionanosensors. This paper investigates clock issue bionanosensors presence Gaussian propagation delay for their molecular communication mechanism. A two-way message exchange...
The dynamic nature of vehicular networks imposes a lot challenges in multihop data transmission as links are vulnerable their existence due to associated mobility vehicles. Thus, packets frequently find it difficult get through the destination limited lifetimes links. conventional broadcasting based ad-hoc network (VANET) routing protocols struggle accurately analyze link dynamicity unavailability global information and inefficiencies route discovering schemes. However, with recently emerged...
Molecular communication is a promising paradigm which enables information exchange by emitting and sensing molecules at micro- or nano-scale. Time synchronization basic but important issue for molecular communication. This letter proposes maximum likelihood estimator the clock offset between two nanomachines in system with drift. In directional fluid medium, transmitter nanomachine records message sending time instant passes it to receiver. The receiver uses this estimate offset....
we have become too dependent on technology owing to which the quantity of e-waste produced at end their life cycle has increased a rapid pace. In later centuries, there would be an equivalent amount carbon footprint by smartphone sector as that transportation industry. The approximate estimation total while taking other existing abundant electronic gadgets is enormous. Considering growing volume e-waste, possibilities these non-biodegradable elements contaminating atmosphere are towering....
Gait recognition enables many potential applications requiring identification. Wi-Fi-based gait is predominant because of its noninvasive and ubiquitous advantages. However, since the information changes with walking direction, existing systems require subject to walk along a predetermined path. This direction dependence restriction impedes from being widely used. In order address this issue, direction-independent system, called WiDIGR proposed. can recognize through no matter what...