Helen Tang

ORCID: 0000-0003-3589-3980
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Wireless Communication Security Techniques
  • Cooperative Communication and Network Coding
  • Opportunistic and Delay-Tolerant Networks
  • Vehicular Ad Hoc Networks (VANETs)
  • Security in Wireless Sensor Networks
  • Cognitive Radio Networks and Spectrum Sensing
  • User Authentication and Security Systems
  • Distributed Sensor Networks and Detection Algorithms
  • Blockchain Technology Applications and Security
  • Advanced Authentication Protocols Security
  • Biometric Identification and Security
  • Wireless Networks and Protocols
  • Privacy-Preserving Technologies in Data
  • Cryptography and Data Security
  • IoT and Edge/Fog Computing
  • Wireless Communication Networks Research
  • UAV Applications and Optimization
  • Software-Defined Networks and 5G
  • Smart Cities and Technologies
  • IPv6, Mobility, Handover, Networks, Security
  • Wireless Signal Modulation Classification
  • Advanced Wireless Communication Technologies
  • Gait Recognition and Analysis
  • Adsorption, diffusion, and thermodynamic properties of materials

Defence Research and Development Canada
2011-2020

Carleton University
2012-2016

Louisiana State University
2008

Saint Louis University
1963

In recent years, the rapid urbanization of world's population causes many economic, social, and environmental problems, which affect people's living conditions quality life significantly. The concept "smart city" brings opportunities to solve these urban problems. objectives smart cities are make best use public resources, provide high-quality services citizens, improve life. Information communication technology plays an important role in implementation cities. Blockchain as emerging has...

10.1109/comst.2019.2899617 article EN IEEE Communications Surveys & Tutorials 2019-01-01

In this survey, we present a comprehensive list of major known security threats within cognitive radio network (CRN) framework. We classify attack techniques based on the type attacker, namely exogenous (external) attackers, intruding malicious nodes and greedy radios (CRs). further discuss related to infrastructure-based CRNs as well infrastructure-less networks. Besides short-term effects attacks over CRN performance, also often ignored longer term behavioral changes that are enforced by...

10.1109/jproc.2012.2208211 article EN Proceedings of the IEEE 2012-08-29

With recent advances of information and communication technology, smart city has been emerged as a new paradigm to dynamically optimize the resources in cities provide better facilities quality life for citizens. Smart involve variety components, including ubiquitous sensing devices, heterogeneous networks, large-scale databases, powerful data centers collect, transfer, store, intelligently process real-time information. can offer applications services augmenting daily citizens on making...

10.1109/comst.2018.2867288 article EN IEEE Communications Surveys & Tutorials 2018-08-28

The distinctive features of mobile ad hoc networks (MANETs), including dynamic topology and open wireless medium, may lead to MANETs suffering from many security vulnerabilities. In this paper, using recent advances in uncertain reasoning that originated the artificial intelligence community, we propose a unified trust management scheme enhances MANETs. proposed scheme, model has two components: direct observation indirect observation. With an observer node, value is derived Bayesian...

10.1109/tvt.2014.2313865 article EN IEEE Transactions on Vehicular Technology 2014-04-01

Game theory can provide a useful tool to study the security problem in mobile ad hoc networks (MANETs). Most of existing works on applying game theories only consider two players model: an attacker and defender. While this assumption may be valid for network with centralized administration, it is not realistic MANETs, where administration available. In paper, using recent advances mean field theory, we propose novel theoretic approach multiple MANETs. The provides powerful mathematical...

10.1109/twc.2013.122313.131118 article EN IEEE Transactions on Wireless Communications 2014-01-31

Cognitive radios (CRs) have been considered for use in mobile ad hoc networks (MANETs). The area of security Radio MANETs (CR-MANETs) has yet to receive much attention. However, some distinct characteristics CRs introduce new, non-trivial risks CR-MANETs. In this paper, we study spectrum sensing data falsification (SSDF) attacks CR-MANETs, which intruders send false local results cooperative sensing, and SSDF may result incorrect decisions by CRs. We present a consensus-based scheme counter...

10.1109/milcom.2009.5379832 article EN 2009-10-01

Cognitive radios, which are capable of sensing their surrounding environment and adapting internal parameters, have been considered in mobile ad hoc networks. Secondary users can cooperatively sense the spectrum to detect presence primary users. In this article we present a novel biologically inspired consensus-based cooperative scheme CR-MANETs. Our is based on recent advances consensus algorithms that taken inspiration from self-organizing behavior animal groups such as birds, fish, ants,...

10.1109/mnet.2010.5464224 article EN IEEE Network 2010-05-01

Multimodal biometric technology provides potential solutions for continuous user-to-device authentication in high-security mobile ad hoc networks (MANETs). This paper studies distributed combined and intrusion detection with data fusion such MANETs. biometrics are deployed to work systems (IDSs) alleviate the shortcomings of unimodal systems. Since each device network has measurement estimation limitations, more than one needs be chosen, observations can fused increase observation accuracy...

10.1109/tvt.2010.2103098 article EN IEEE Transactions on Vehicular Technology 2011-01-03

We propose a robust physical layer authentication scheme for wireless communications based on hypothesis testing of the inherent properties channel impulse response (CIR) in time-varying multipath environment. In this paper, variation between two consecutive CIRs from transmitter interest is monitored at receiver to distinguish identities transmitters purpose. To improve performance, we develop new test statistic difference noise-mitigated CIRs, minimize impact noise and interference achieve...

10.1109/milcom.2011.6127727 article EN 2011-11-01

Hierarchical key management schemes would serve well for military applications where the organization of network is already hierarchical in nature. Most existing concentrate only on structures and allocation algorithms, ignoring attributes nodes themselves. Due to distributed dynamic nature MANETs, it possible show that there a security benefit be attained when node states are considered process constructing private generator (PKG). In this paper, we propose scheme which can get their keys...

10.1109/tnsm.2010.1012.0362 article EN IEEE Transactions on Network and Service Management 2010-12-01

Cognitive radios (CRs), which are capable of sensing its surrounding environment and adapting internal parameters, have been considered in mobile ad hoc networks (MANETs). The area security CR-MANETs has received far less attention than other areas. However, some distinct characteristics CRs introduce new non-trivial risks to CR-MANETs. In this article, the authors study spectrum data falsification (SSDF) attacks CR-MANETs, intruders send false local results cooperative sensing, it will...

10.1049/iet-com.2010.0553 article EN IET Communications 2012-05-22

Vehicular ad hoc networks (VANETs) have become a promising technology in intelligent transportation systems (ITS) with rising interest of expedient, safe, and high-efficient transportation. VANETs are vulnerable to malicious nodes result performance degradation because dynamicity infrastructure-less. In this paper, we propose trust based dueling deep reinforcement learning approach (T-DDRL) for communication connected vehicles, deploy network architecture into logically centralized...

10.1145/3272036.3272037 article EN 2018-10-25

In this work, we propose a novel sidechain structure via an optimized two-way peg protocol for device authentication in the smart community order to overcome limitations of existing approaches. The proposed scheme uses private side blockchains distribute and manage local registration processes, addition mainchain block circulate information record with other systems. More importantly, system prevent worthless injection attack during sharing procedure between main chain blockchains....

10.1109/ojcoms.2020.2972742 article EN cc-by IEEE Open Journal of the Communications Society 2020-01-01

Cooperative communication has been considered as a promising technique to improve quality of service (QoS) in wireless networks, including mobile ad hoc networks (MANETs). Due their unorganized and decentralized infrastructure, cooperative MANETs (CO-MANETs) are vulnerable attacks initiated on relays. Although encryption authentication protocols may prevent compromised data transmission when selected relay is attacked, cost high. In this paper, we propose game-theoretic approach...

10.1186/1687-1499-2013-188 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2013-07-09

Traditional authentication techniques for wireless communications are facing great challenges, due to the open radio propagation environment and limited options of transmission techniques. A new continuous physical layer technique with time-varying parameters is investigated enhance security orthogonal frequency division multiplexing (OFDM) system. preceded cyclic prefix (PCP) sequence, which introduces an additional signaling link carry parameters, employed in each OFDM symbol...

10.1109/icc.2011.5962692 article EN 2011-06-01

In cooperative wireless networks, relay nodes are used to improve the channel capacity of system. However, presence malicious relays in network may severely degrade performance More specifically, there exists a possibility that node refuses cooperate when it is selected for cooperation or deliberately drop received packets. Trust establishment mechanism detect misbehaving network. this paper, we propose trust method networks using Bayesian framework. contrast with previous schemes, approach...

10.1109/milcom.2010.5680086 article EN 2010-10-01

Improved Carbonate Reservoir Facies Classification Using Artificial Neural Network Method H. Tang Louisiana State University Search for other works by this author on: This Site Google Scholar Paper presented at the Canadian International Petroleum Conference, Calgary, Alberta, June 2008. Number: PETSOC-2008-122 https://doi.org/10.2118/2008-122 Published: 17 2008 Cite View Citation Add to Manager Share Icon Facebook Twitter LinkedIn Email Get Permissions Tang, "Improved Method." doi: Download...

10.2118/2008-122 article EN Canadian International Petroleum Conference 2008-01-01

This paper studies distributed, combined authentication and intrusion detection with data fusion in mobile ad-hoc networks (MANETs). Multimodal biometrics are deployed to work systems (IDSs) alleviate the shortcomings of unimodal biometric systems. Since each device network has measurement estimation errors, more than one needs be chosen, observations can fused increase observation accuracy using Dempster-Shafer theory for fusion. The system decides whether or not user (or IDS input) is...

10.1109/milcom.2010.5680201 article EN 2010-10-01

In mobile ad hoc networks (MANETs), security is a challenging research topic due to the special characteristics of MANETs, such as no pre-defined infrastructure, unreliable link connections, and nomadic nature. Trust-based schemes are considered effective mechanisms associated with cryptographic techniques for thwarting variety attacks, e.g., Packet drop attacks. Because properties trust establishment needs an intelligent approach identify attackers' misbehavior. this paper, we focus on...

10.1109/milcom.2014.34 article EN 2014-10-01

With the rapid proliferation of Internet Thing (IoT) devices, many security challenges could be introduced at low-end routers. Misbehaving routers affect availability networks by dropping packets selectively and rejecting data forwarding services. Although existing Reputation Management (RM) systems are useful in identifying misbehaving routers, centralized nature RM center has risk one-point failure. The emerging blockchain techniques, with inherent decentralized consensus mechanism,...

10.1109/iccw.2019.8757083 article EN 2022 IEEE International Conference on Communications Workshops (ICC Workshops) 2019-05-01

Hierarchical key management schemes would serve well for military applications where the organization of network is already hierarchical in nature. Most existing concentrate only on structures and allocation algorithms, ignoring attributes nodes themselves. Due to distributed dynamic nature MANETs, it possible show that there a security benefit be attained when node states are considered process constructing private generator (PKG). In this paper, we propose scheme which can get their keys...

10.1109/milcom.2009.5379731 article EN 2009-10-01

In mobile ad hoc networks (MANETs), continuous authentication is desirable so that a system can be monitored for the duration of session to reduce vulnerability. This paper presents an optimal biometric-based scheme in MANETs. We formulate process as partially observed Markov decision process, and use dynamic programming-based hidden model scheduling algorithms derive authentication. Extensive simulations show effectiveness proposed scheme.

10.1109/wimob.2007.4390870 article EN 2007-10-01
Coming Soon ...