- Mobile Ad Hoc Networks
- Cooperative Communication and Network Coding
- Opportunistic and Delay-Tolerant Networks
- Wireless Networks and Protocols
- Wireless Communication Networks Research
- Advanced Wireless Network Optimization
- Advanced MIMO Systems Optimization
- Energy Efficient Wireless Sensor Networks
- Optical Network Technologies
- Advanced Optical Network Technologies
- IPv6, Mobility, Handover, Networks, Security
- Energy Harvesting in Wireless Networks
- Indoor and Outdoor Localization Technologies
- Interconnection Networks and Systems
- Advanced Wireless Communication Technologies
- Vehicular Ad Hoc Networks (VANETs)
- Network Traffic and Congestion Control
- Semiconductor Lasers and Optical Devices
- UAV Applications and Optimization
- Security in Wireless Sensor Networks
- Caching and Content Delivery
- Advanced Wireless Communication Techniques
- Antenna Design and Analysis
- Satellite Communication Systems
- Cryptography and Data Security
The University of Texas at Dallas
2016-2025
Cornell University
2014-2023
U.S. National Science Foundation
2011
Jet Propulsion Laboratory
2006
Nokia (United States)
1990-2005
AT&T (United States)
1991-2005
Seoul National University
2004
Alcatel Lucent (Germany)
2000-2002
Stanford University
1987
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional networks, ad do not rely on any fixed infrastructure. Instead, hosts each other to keep the network connected. Military tactical and security-sensitive operations still main applications of although there is trend adopt commercial uses due their unique properties. One challenge in design these vulnerability security attacks. In this article, we study threats faces goals be achieved. We identify...
Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations, many messages propagated unnecessarily. We propose a gossiping-based approach, where each node forwards message with probability, to reduce the overhead protocols. Gossiping exhibits bimodal behavior in sufficiently large networks: executions, gossip dies out quickly and hardly any gets message; remaining substantial fraction nodes message. The executions which most get depends gossiping...
This paper presents a mobile tracking scheme that exploits the predictability of user mobility patterns in wireless PCS networks. Instead constant velocity fluid-flow or random-walk model, more realistic Gauss-Markov model is introduced, where mobile's correlated time to various degree. Based on future location predicted by network based information gathered from last report and velocity. When call made, pages destination at around order descending probability until found. A shares same...
We propose a new routing protocol, the Zone Routing Protocol (ZRP), for reconfigurable wireless networks, large scale, highly mobile ad-hoc networking environment. The novelty of ZRP protocol is that it applicable to flat-routed networks. Furthermore, through use zone radius parameter, scheme exhibits adjustable hybrid behavior proactive and reactive schemes. evaluate performance showing reduction in number control messages, as compared with other schemes, such flooding.
We study the performance of route query control mechanisms for zone routing protocol (ZRP) ad hoc networks. The ZRP proactively maintains information a local neighborhood (routing zone), while reactively acquiring routes to destinations beyond zone. This hybrid approach can be more efficient than traditional schemes. However, without proper techniques, cannot provide expected reduction in traffic. Our proposed schemes exploit structure enhanced detection and prevention overlapping queries....
In ad hoc networks, the hidden- and exposed-terminal problems can severely reduce network capacity on MAC layer. To address these problems, ready-to-send clear-to-send (RTS/CTS) dialogue has been proposed in literature. However, schemes using only RTS/CTS cannot completely solve hidden exposed terminal as pure "packet sensing" are not safe even fully connected networks. We propose a new protocol, termed dual busy tone multiple access (DBTMA) scheme. The operation of DBTMA protocol is based...
In wireless ad hoc networks, capacity can be traded for delay. This tradeoff has been the subject of a number studies, mainly concentrating on two extremes: either minimizing delay or maximizing capacity. However, in between these extremes, there are schemes that allow instantiations various degrees this tradeoff. Infostations, which offer geographically intermittent coverage at high speeds, one such an example. Indeed, through use Infostation networking paradigm, mobile network increased...
The zone routing protocol (ZRP) is a hybrid that proactively maintains routes within local region of the network (which we refer to as zone). Knowledge this topology leveraged by ZRP improve efficiency reactive route query/reply mechanism. can be configured for particular through adjustment single parameter, radius. We address issue configuring provide best performance at any time. Previous work has demonstrated an optimally operates least efficiently traditional flood-search or proactive...
Many ad hoc routing protocols are based on some variant of flooding. Despite various optimizations flooding, many messages propagated unnecessarily. We propose a gossiping-based approach, where each node forwards message with probability, to reduce the overhead protocols. Gossiping exhibits bimodal behavior in sufficiently large networks: executions, gossip dies out quickly and hardly any gets message; remaining substantial fraction nodes message. The executions which most get depends...
The secure operation of the routing protocol is one major challenges to be met for proliferation Mobile Ad hoc Networking (MANET) paradigm. Nevertheless, security enhancements have been proposed mostly reactive MANET protocols. here Secure Link State Routing Protocol (SLSP) provides proactive topology discovery, which can multiply beneficial network operation. SLSP employed as a stand-alone protocol, or fit naturally into hybrid framework, when combined with protocol. robust against...
Alternate path routing (APR) can provide load balancing and route failure protection by distributing traffic among a set of diverse paths. These benefits make APR appear to be an ideal candidate for the bandwidth limited mobile ad-hoc networks. However, we find that APR's potential is not fully realized in networks because coupling resulting from geographic proximity paths between common endpoints. In multiple channel networks, occurs when share intermediate nodes. The problem much more...
In this paper, we study the statistical characterization and modeling of distributed multi-reconfigurable intelligent surface (RIS)-aided wireless systems. Specifically, consider a practical system model where RISs with different geometric sizes are distributively deployed, channels associated to assumed be independent but not identically (i.n.i.d.). We propose two purpose-oriented multi-RIS-aided schemes, namely, exhaustive RIS-aided (ERA) opportunistic (ORA) schemes. A mathematical...
This paper presents a mobile tracking scheme that exploits the predictability of user mobility patterns in wireless PCS networks. In this scheme, mobile's future location is predicted by network, based on information gathered from recent report and velocity. When call made, network pages destination around location. A makes same prediction as does; it inspects its own periodically reports new when distance between actual locations exceeds threshold. To more realistically represent various...
Wireless and mobile network technologies often impose severe limitations on the availability of resources, resulting in poor unsatisfactory performance commonly used wireless networking protocols. For instance, power memory/storage constraints miniaturized nodes reduce throughput capacity increase latency. Through various approaches technological advances, researchers attempt to somehow compensate for such hardware limitations. However, this is not always necessary. Sometimes, required...
The IEEE 802.16 WiMax standard provides a mechanism for creating multi-hop mesh, which can be deployed as high speed wide-area wireless network To realize the full potential of such high-speed mesh networks, two efficient radio resource allocation extensions were developed objective this paper is to propose an approach increasing utilization through appropriate design routing and scheduling. As multiple-access interference major limiting factor communication systems, we adopt here...
In this paper, we introduce the Shared Wireless Infostation Model (SWIM), which extends model by incorporating information replication, storage, and diffusion into a mobile ad hoc network architecture with intermittent connectivity. SWIM is able to reduce delay of packet delivery at expense increased storage nodes. Furthermore, improves overall capacity-delay tradeoff only moderately increasing requirements. This examined here in context practical application-acquisition telemetry data from...
A distributed mobility management scheme using a class of uniform quorum systems (UQS) is proposed for ad hoc networks. In the scheme, location databases are stored in network nodes themselves, which form self-organizing virtual backbone within flat structure. The dynamically organized into quorums, every two intersect at constant number databases. Upon update or call arrival, mobile's information written to read from all quorum, chosen nondeterministic manner. Compared with conventional...
Although most wireless terrestrial networks are based on two-dimensional (2D) design, in reality, such operate three-dimensions (3D). Since often the size (i.e., length and width) of is significantly larger than differences third dimension height) nodes, 2D assumption somewhat justified usually it does not lead to major inaccuracies. However, some environments, this case; underwater, atmospheric, or space communications being apparent examples. In fact, recent interest underwater acoustic ad...
Alternate path routing (APR) can provide load balancing and route failure protection by distributing traffic among a set of diverse paths. These benefits make APR appear to be an ideal candidate for the bandwidth limited mobile ad-hoc networks. However, we find that APR's potential is not fully realized in networks because coupling resulting from geographic proximity paths between common endpoints. In multiple channel networks, occurs when share intermediate nodes. The problem much more...
A central challenge in ad hoc networks is the design of routing protocols that can adapt their behavior to frequent and rapid changes network. The performance proactive reactive varies with network characteristics, one protocol may outperform other different conditions. optimal strategy depends on underlying topology, rate change, traffic pattern, dynamically. This paper introduces Sharp Hybrid Adaptive Routing Protocol (SHARP), which automatically finds balance point between by adjusting...
In packet radio networks, the hidden terminal problem and exposed can severely reduce utilization of a medium access control (MAC) protocols. To avoid these problems, request-to-send/clear-to-send (RTS/CTS)-based schemes were proposed. However, as shown in this paper, is still degraded, especially cases which propagation transmission delays are long. We propose new MAC protocol, termed dual busy tone multiple (DBTMA), we evaluate its performance. DBTMA, two tones used to separate use forward...
In this paper, we study the effect of multihop relaying on throughput downstream channel in cellular networks. particular, compare system with that conventional system, demonstrating achievable improvement by relaying. We also propose a hybrid control strategy for relaying, which advocate use both, direct transmission and Our shows most gain can be obtained two- three-hop scheme. Substantial could additionally operating concurrent conjunction nonconcurrent transmission. argue here technology...
In this article we propose a framework for multipath routing in mobile ad hoc networks and provide its analytical evaluation. The instability of the topology (e.g., failure links) these types networks, due to nodal mobility changes wireless propagation conditions, makes transmission time-sensitive information challenging problem. To combat inherent unreliability scheme that uses multiple paths simultaneously by splitting among multitude paths, increase probability essential portion is...
Discrete event simulators are important scientific tools and their efficient design execution is the subject of much research. In this paper, we propose a new approach for constructing that leverages virtual machines combines advantages from traditional systems-based language-based simulator designs. We introduce JiST, Java-based simulation system executes discrete simulations both efficiently transparently by embedding semantics directly into Java model. The provides standard benefits...