Search For:

Displaying 1-25 out of 25 total
EPPA: An Efficient and Privacy-Preserving Aggregation Scheme for Secure Smart Grid Communications
Found in: IEEE Transactions on Parallel and Distributed Systems
By Rongxing Lu,Xiaohui Liang,Xu Li,Xiaodong Lin,Xuemin (Sherman) Shen
Issue Date:September 2012
pp. 1621-1631
The concept of smart grid has emerged as a convergence of traditional power system engineering and information and communication technology. It is vital to the success of next generation of power grid, which is expected to be featuring reliable, efficient,...
 
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Xiaohui Liang,Xiaodong Lin,Xuemin Sherman Shen
Issue Date:February 2014
pp. 310-320
In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores ...
 
A Lightweight Conditional Privacy-Preservation Protocol for Vehicular Traffic-Monitoring Systems
Found in: IEEE Intelligent Systems
By Rongxing Lu,Xiaodong Lin,Zhiguo Shi,Xuemin Sherman Shen
Issue Date:May 2013
pp. 62-65
Vehicular traffic monitoring (VTM) is a promising cyber-physical system, but it faces many security and privacy challenges. Here, a new lightweight conditional privacy preservation (LCPP) protocol utilizes simple hash-chain techniques to secure VTM systems...
 
SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks
Found in: 2012 IEEE 32nd International Conference on Distributed Computing Systems (ICDCS)
By Xiaohui Liang,Xu Li,Rongxing Lu,Xiaodong Lin,Xuemin (Sherman) Shen
Issue Date:June 2012
pp. 647-656
In this paper, we consider service-oriented mobile social networks (S-MSNs) and propose a Secure and Efficient service Review (SEER) system to enable user feedback. Each service provider independently maintains a SEER system for itself, which collects and ...
 
Dependability Analysis of Control Center Networks in Smart Grid Using Stochastic Petri Nets
Found in: IEEE Transactions on Parallel and Distributed Systems
By Rongfei Zeng,Yixin Jiang,Chuang Lin,Xuemin (Sherman) Shen
Issue Date:September 2012
pp. 1721-1730
As an indispensable infrastructure for the future life, smart grid is being implemented to save energy, reduce costs, and increase reliability. In smart grid, control center networks have attracted a great deal of attention, because their security and depe...
 
Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shan Chang,Yong Qi,Hongzi Zhu,Jizhong Zhao,Xuemin (Sherman) Shen
Issue Date:June 2012
pp. 1103-1114
In urban vehicular networks, where privacy, especially the location privacy of anonymous vehicles is highly concerned, anonymous verification of vehicles is indispensable. Consequently, an attacker who succeeds in forging multiple hostile identifies can ea...
 
Toward Reliable Actor Services in Wireless Sensor and Actor Networks
Found in: Mobile Ad-Hoc and Sensor Systems, IEEE International Conference on
By Xu Li,Xiaohui Liang,Rongxing Lu,Shibo He,Jiming Chen,Xuemin (Sherman) Shen
Issue Date:October 2011
pp. 351-360
Wireless sensor and actor networks (WSANs) are service-oriented environments, where sensors request actors to service their detected events and actors move to deliver the desired services. Because of their openness and unattended nature, these networks are...
 
Leveraging Prediction to Improve the Coverage of Wireless Sensor Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shibo He,Jiming Chen,Xu Li,Xuemin (Sherman) Shen,Youxian Sun
Issue Date:April 2012
pp. 701-712
As sensors are energy constrained devices, one challenge in wireless sensor networks (WSNs) is to guarantee coverage and meanwhile maximize network lifetime. In this paper, we leverage prediction to solve this challenging problem, by exploiting temporal-sp...
 
MAC in Motion: Impact of Mobility on the MAC of Drive-Thru Internet
Found in: IEEE Transactions on Mobile Computing
By Tom H. Luan,Xinhua Ling,Xuemin (Sherman) Shen
Issue Date:February 2012
pp. 305-319
The pervasive adoption of IEEE 802.11 radios in the past decade has made possible for the easy Internet access from a vehicle, notably drive-thru Internet. Originally designed for the static indoor applications, the throughput performance of IEEE 802.11 in...
 
Adaptive Asynchronous Sleep Scheduling Protocols for Delay Tolerant Networks
Found in: IEEE Transactions on Mobile Computing
By Bong Jun Choi, Xuemin (Sherman) Shen
Issue Date:September 2011
pp. 1283-1296
In this paper, we focus on power management for Delay/Disruption Tolerant Network (DTN), and propose two asynchronous clock-based sleep scheduling protocols that are distributed, adaptive, and energy efficient. Moreover, the sleep schedules can be construc...
 
Multipath Routing and Max-Min Fair QoS Provisioning under Interference Constraints in Wireless Multihop Networks
Found in: IEEE Transactions on Parallel and Distributed Systems
By Preetha Thulasiraman, Jiming Chen, Xuemin (Sherman) Shen
Issue Date:May 2011
pp. 716-728
In this paper, we investigate the problem of flow routing and fair bandwidth allocation under interference constraints for multihop wireless networks. We first develop a novel isotonic routing metric, RI^{3}M, considering the influence of interflow and int...
 
Optimal Relay Station Placement in Broadband Wireless Access Networks
Found in: IEEE Transactions on Mobile Computing
By Bin Lin, Pin-Han Ho, Liang-Liang Xie, Xuemin (Sherman) Shen, János Tapolcai
Issue Date:February 2010
pp. 259-269
To satisfy the stringent requirement of capacity enhancement in wireless networks, cooperative relaying is envisioned as one of the most effective solutions. In this paper, we study the capacity enhancement problem by way of Relay Stations (RSs) placement ...
 
Adaptive Route Optimization in Hierarchical Mobile IPv6 Networks
Found in: IEEE Transactions on Mobile Computing
By Sangheon Pack, Xuemin (Sherman) Shen, Jon W. Mark, Jianping Pan
Issue Date:August 2007
pp. 903-914
By introducing a mobility anchor point (MAP), Hierarchical Mobile IPv6 (HMIPv6) reduces the signaling overhead and handoff latency associated with Mobile IPv6. However, if a mobile node (MN)'s session activity is high and its mobility is relatively low, HM...
 
Update-Based Cache Access and Replacement in Wireless Data Access
Found in: IEEE Transactions on Mobile Computing
By Hui Chen, Yang Xiao, Xuemin (Sherman) Shen
Issue Date:December 2006
pp. 1734-1748
Cache has been applied for wireless data access with different replacement policies in wireless networks. Most of the current cache replacement schemes are access-based replacement policies since they are based on object access frequency/recency informatio...
 
Power Allocation and Scheduling for MAC Layer Design in UWB Networks
Found in: Quality of Service in Heterogeneous Wired/Wireless Networks, International Conference on
By Jun Cai, Kuang-Hao Liu, Xuemin (Sherman) Shen, Jon W. Mark, Terence D. Todd
Issue Date:August 2005
pp. 2
<p>This paper proposes a practical joint power allocation and scheduling scheme for medium access control (MAC) layer design in ultra-wideband (UWB) networks. The scheme increases system spectral efficiency and reduces power consumption by fully cons...
 
Voice Capacity Analysis of WLAN with Unbalanced Traffic
Found in: Quality of Service in Heterogeneous Wired/Wireless Networks, International Conference on
By Lin Cai, Xuemin (Sherman) Shen, Jon W. Mark, Yang Xiao
Issue Date:August 2005
pp. 9
<p>We evaluate the performance of voice transmission over a single-AP WLAN analytically and via simulation. Given the parameters of the Medium Access Control protocol and different voice codecs, the voice capacity of the WLAN, in terms of the maximum...
 
Fair Resource Allocation with Guaranteed Statistical QoS for Multimedia Traffic in Wideband CDMA Cellular Network
Found in: IEEE Transactions on Mobile Computing
By Liang Xu, Xuemin (Sherman) Shen, Jon W. Mark
Issue Date:March 2005
pp. 166-177
A dynamic fair resource allocation scheme is proposed to efficiently support real-time and non-real-time multimedia traffic with guaranteed statistical quality of service (QoS) in the uplink of a wideband code-division multiple access (CDMA) cellular netwo...
 
Call Admission Control in Wideband CDMA Cellular Networks by Using Fuzzy Logic
Found in: IEEE Transactions on Mobile Computing
By Jun Ye, Xuemin (Sherman) Shen, Jon W. Mark
Issue Date:March 2005
pp. 129-141
In this paper, a novel call admission control (CAC) scheme using fuzzy logic is proposed for the reverse link transmission in wideband code division multiple access (CDMA) cellular communications. The fuzzy CAC scheme first estimates the effective bandwidt...
 
ESIP: Secure Incentive Protocol with Limited Use of Public-Key Cryptography for Multihop Wireless Networks
Found in: IEEE Transactions on Mobile Computing
By Mohamed Elsalih Mahmoud,Xuemin (Sherman) Shen
Issue Date:July 2011
pp. 997-1010
In multihop wireless networks, selfish nodes do not relay other nodes' packets and make use of the cooperative nodes to relay their packets, which has negative impact on the network fairness and performance. Incentive protocols use credits to stimulate the...
 
Modeling and Analysis of Dependability Attributes of Services Computing Systems
Found in: IEEE Transactions on Services Computing
By Jiwei Huang,Chuang Lin,Xiangzhen Kong,Bing Wei,Xuemin (Sherman) Shen
Issue Date:February 2013
pp. 1
Dependability is an important consideration during the design and development of IT systems and services. But in services computing systems, the traditional definition and evaluation methods from the systems' and components' point of view meet challenges. ...
 
Secure provenance: the essential of bread and butter of data forensics in cloud computing
Found in: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS '10)
By Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (Sherman) Shen
Issue Date:April 2010
pp. 282-292
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue today. In this paper, to tackle this unexplored area in cloud computing, we propo...
     
PTFW: a protocol testing framework for wireless sensor networks
Found in: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing: Connecting the World Wirelessly (IWCMC '09)
By Jialu Fan, Jiming Chen, Ruilong Deng, Xuemin (Sherman) Shen, Youxian Sun
Issue Date:June 2009
pp. 5-6
Protocol testing has been one of the most active fields in computer networks. In Wireless Sensor Networks (WSNs), before directly employing protocols on hardware testbed, we expect an effective test framework to verify the logical correctness of protocols ...
     
A new energy efficient approach by separating data collection and data report in wireless sensor networks
Found in: Proceeding of the 2006 international conference on Communications and mobile computing (IWCMC '06)
By Xuemin (Sherman) Shen, Yongbing Zhang, Yuning He, Yusheng Ji
Issue Date:July 2006
pp. 1165-1170
A sensor network consists of a large number of distributed wireless sensors which are equipped with low power wireless transceivers. Network lifetime, scalability, and load balancing are important requirements for many data gathering sensor network applica...
     
Performance evaluation for unsolicited grant service flows in 802.16 networks
Found in: Proceeding of the 2006 international conference on Communications and mobile computing (IWCMC '06)
By Fen Hou, Pin-Han Ho, Xuemin (Sherman) Shen
Issue Date:July 2006
pp. 991-996
In this paper, the performance of unsolicited grant service (UGS) connections defined in IEEE 802.16 Std. is investigated. A simple admission control strategy based on the periodic exhaustive service principle is first introduced to provide Quality of Serv...
     
Handoff trigger table for integrated 3G/WLAN networks
Found in: Proceeding of the 2006 international conference on Communications and mobile computing (IWCMC '06)
By Dongmei Zhao, Wenjie Guan, Xinhua Ling, Xuemin (Sherman) Shen
Issue Date:July 2006
pp. 575-580
Vertical handoff is a switching process between heterogeneous wireless networks in a hybrid 3G/WLAN network. Vertical handoffs from WLAN to 3G network often fail due to the abrupt degrade of the WLAN signal strength in the transition areas. In this paper, ...
     
 1