Works (94)

Updated: November 7th, 2024 05:02

2024 article

Effi-Ace: Efficient and Accurate Prediction for High-Resolution Spectrum Tenancy

IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, pp. 2199–2208.

By: R. Zou n & W. Wang n

Sources: Web Of Science, NC State University Libraries
Added: November 4, 2024

2024 article

Hybrid Zone: Bridging Acoustic and Wi-Fi for Enhanced Gesture Recognition

IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, pp. 981–990.

By: M. Li n & W. Wang n

author keywords: Acoustic; Wi-Fi; Gesture recognition
Sources: Web Of Science, NC State University Libraries
Added: November 4, 2024

2023 journal article

Remedy or Resource Drain: Modeling and Analysis of Massive Task Offloading Processes in Fog

IEEE INTERNET OF THINGS JOURNAL, 10(13), 11669–11682.

By: J. Wang*, W. Wang n & C. Wang n

author keywords: Task analysis; Internet of Things; Edge computing; Gravity; Delays; Computational modeling; Performance evaluation; Fog computing; performance evaluation; task offloading
TL;DR: Simulation results show that the proposed gravity model can flexibly describe different offloading schemes in terms of application and node-level behavior, and finds that the expected lifetime and device effort of individual tasks decrease as the network effort decreases over the network size. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 7, 2023

2023 article

TOP: Total Occupancy Guided Prediction of Binary Spectrum Tenancy

ICC 2023 - IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, pp. 4597–4602.

By: R. Zou n & W. Wang n

author keywords: spectrum tenancy prediction; dynamic spectrum access; data granularity
TL;DR: This work analytically and numerically shows that the two key assumptions justifying the superior performance of TOP are valid, and significantly improves MLP accuracy from 0.84 to 0.91, outperforming many state-of-the-art prediction schemes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: March 4, 2024

2023 journal article

The vulnerability and enhancement of AKA protocol for mobile authentication in LTE/5G networks

COMPUTER NETWORKS, 228.

By: T. Fei n & W. Wang n

author keywords: Long-term evolution (LTE); Authentication protocol; Analysis and verification
TL;DR: An enhanced AKA protocol is proposed that essentially relies on the asymmetric encryption rather than symmetric in the AKA protocol, and additional digital signatures to countermeasure these attacks and to mitigate the newly found vulnerabilities through formal verification. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 15, 2023

2023 journal article

Toward Fast and Energy-Efficient Access to Cloudlets in Hostile Environments

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 22(11), 8320–8335.

By: J. Wang*, S. Pambudi n, W. Wang n & C. Wang n

author keywords: Cloud access; mobile ad-hoc network (MANET); performance evaluation
TL;DR: A packet mobility model is established that allows CAD and energy consumption to be analyzed as a function of the initial device-cloudlet distance, and it is found that the expected CAD scales either linearly or quadratically under distinct types of packet mobility. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: January 16, 2024

2021 journal article

Downlink Decoding Based Accurate Measurement of LTE Spectrum Tenancy

IEEE TRANSACTIONS ON MOBILE COMPUTING, 22(5), 2613–2627.

By: R. Zou n & W. Wang n

author keywords: Long Term Evolution; Downlink; Time measurement; Sensors; Reactive power; Frequency measurement; Uplink; LTE; dynamic spectrum access; measurements; software defined radio; test bed; modeling
TL;DR: This work builds U-CIMAN to UnCover spectrum occupancy and user Information in Mobile Access Networks and proposes to characterize LTE spectrum occupancy using Vector Autoregression that captures the statistical distributions of spectrum tenancy intervals in multiple channels and the correlations among them. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 30, 2023

2021 article

Temporal and Spectral Analysis of Spectrum Hole Distributions in an LTE Cell

2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: R. Zou n, W. Wang n & H. Dai n

author keywords: dynamic spectrum access; spectrum hole distribution; measurement granularity; power law
TL;DR: This work analyzes the spectrum hole distributions in fine resolutions along both the temporal and the spectral dimensions, and investigates the performance of two widely used spectrum tenancy models, the Markov and the on/off models, in terms of their capabilities on capturing the distributions of spectrum holes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: May 23, 2022

2020 journal article

Spectrum Activity Surveillance: Modeling and Analysis From Perspectives of Surveillance Coverage and Culprit Detection

IEEE TRANSACTIONS ON MOBILE COMPUTING, 21(5), 1829–1846.

By: J. Wang n, W. Wang n, C. Wang* & M. Song*

author keywords: Synthetic aperture sonar; Surveillance; Switches; Bandwidth; Wireless fidelity; Analytical models
TL;DR: This work introduces a three-factor space, composed of spectrum, time, and geographic region, over which the SAS problem is formulated by a two-step solution: 3D-tessellation for sweep (monitoring) coverage and graph walk for detecting spectrum culprits, that is, devices responsible for unauthorized spectrum occupancy. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: April 14, 2022

2019 journal article

Message coverage maximization in infrastructure-based urban vehicular networks

VEHICULAR COMMUNICATIONS, 16, 1–14.

By: A. Jalooli*, M. Song* & W. Wang n

author keywords: Vehicular ad-hoc network; Vehicle-to-vehicle; Roadside unit; Safety applications; Traffic efficiency; Intelligent transportation systems
TL;DR: This paper develops a message coverage maximization algorithm (MCMA) that carefully deploys the roadside units to achieve the maximum message coverage and demonstrates that MCMA improves traffic efficiency in a post-crash scenario. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: April 22, 2019

2019 journal article

Resilience of IoT Systems Against Edge-Induced Cascade-of-Failures: A Networking Perspective

IEEE INTERNET OF THINGS JOURNAL, 6(4), 6952–6963.

By: J. Wang n, S. Pambudi n, W. Wang n & M. Song*

author keywords: Interdependent networks; Internet of Things (IoT) architecture; network resilience
TL;DR: Resilience of an IoT system is quantified by two new metrics, the critical edge disconnecting probability and the maximum intensity of random failures the system can withstand, which are derived for IoT systems with Poisson degree distributions. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries, ORCID
Added: August 26, 2019

2017 conference paper

Detection of infections using graph signal processing in heterogeneous networks

Globecom 2017 - 2017 ieee global communications conference.

By: S. Hosseinalipour n, J. Wang n, H. Dai n & W. Wang n

TL;DR: This paper focuses on infection detection in heterogeneous networks and model the network situation as a graph signal based on the nodes' status, which helps distinguish between random failures and epidemic scenarios. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 conference paper

From isolation time to node resilience: Impact of cascades in D2D-based social networks

Globecom 2017 - 2017 ieee global communications conference.

By: S. Pambudi n, W. Wang n & C. Wang*

TL;DR: A maximum isolation time is introduced that quantifies the steps needed until the last node is isolated by the cascades, and it is shown that it scales non-monotonically to the fraction of initial survivors (non-failure nodes) and increases logarithmically with the network size. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 conference paper

How durable and stable is file sharing on the move in cellular-assisted D2D communications?

Globecom 2017 - 2017 ieee global communications conference.

By: Y. Wang n, W. Wang n & M. Song*

TL;DR: Both theoretical and simulation results suggest that D2D file sharing is more benefit for popular content among group moving users with longer service lifetime and distance and less delay caused by mobile user handover and peer discovery. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 conference paper

Modeling and strategy design for spectrum monitoring over a geographical region

Globecom 2017 - 2017 ieee global communications conference.

By: J. Wang n, W. Wang n & C. Wang*

TL;DR: The dimension of geographical space is introduced into the spectrum monitoring problem, and deployment strategies of multiple monitors are studied, in terms of coverage time and cost. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2017 journal article

On Characterizing Information Dissemination During City-Wide Cascading Failures in Smart Grid

IEEE SYSTEMS JOURNAL, 12(4), 3404–3413.

By: M. Wei*, Z. Lu* & W. Wang n

author keywords: Communication networks; computer networks; cyber-physical systems; power system faults; power system protection; smart grids
TL;DR: It is found that information dissemination is not always the winner in the race against fault propagation, and an innovative framework is built, the cascading failure with communications framework, to consolidate both communication networks and power grids. (via Semantic Scholar)
UN Sustainable Development Goal Categories
11. Sustainable Cities and Communities (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: December 10, 2018

2017 conference paper

On modeling and understanding vehicle evacuation attacks in VANETs

2017 ieee international conference on communications (icc).

By: M. Wei*, Z. Lu* & W. Wang n

TL;DR: This study demonstrates that there exists a linear relationship between the delay of message dissemination and the impact of the vehicle evacuation attack, which can be used as a guideline on security, reliability, and safety design in real-world VANETs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 conference paper

A locality-based mobile caching policy for D2D-based content sharing network

2016 ieee global communications conference (globecom).

By: Y. Wang n, Y. Li n, W. Wang n & M. Song*

TL;DR: This paper aims to design a caching policy by considering the joint impact of locality of real-world mobile data traffic and device contact pattern to improve the success rate of content fetching and derive the content caching probability and hit ratio through mathematical analysis. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 journal article

Data-centric threats and their impacts to real-time communications in smart grid

COMPUTER NETWORKS, 104, 174–188.

By: M. Wei n & W. Wang n

author keywords: Smart grid; Cyber security; Co-simulation
TL;DR: The impacts of data-centric attacks in the real-time communication network of smart gird are studied, and further the consequences caused to the power grid are studied. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

Divide and Conquer: Leveraging Topology in Control of Epidemic Information Dynamics

2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: J. Wang n, W. Wang n & C. Wang*

TL;DR: This paper analytically relate the extinction time of the virus to the diameter and giant component size of the remaining graph after the initial antidote distribution, taking topological characteristics of the underlying graph into consideration. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

Dominoes with Communications: On Characterizing the Progress of Cascading Failures in Smart Grid

2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC).

By: M. Wei n, Z. Lu* & W. Wang n

TL;DR: An in-depth inspection of cascading failures in smart grid is taken and insights are provided into the interactions between physical failure propagation and communication message dissemination that show that while ideal communications can undoubtedly help prevent cascades failures, under-achieved communications can, counter-intuitively, exacerbate cascading failure. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 conference paper

How robust Is a D2D-based messaging service?

2016 ieee global communications conference (globecom).

By: S. Pambudi n, W. Wang n & C. Wang*

TL;DR: A node survival probability that captures the impact of random and targeted node failures due to the open wireless environment is defined and a secondary infection rate is defined that measures how fast message propagates initially and is proportional to the ratio between the number of message-receiving users to all users, which is a good metric for quantifying the D2D-Msg's robustness. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2016 article

How the Anti-Rumor Kills the Rumor: Conflicting Information Propagation in Networks

2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC).

By: J. Wang n, W. Wang n & C. Wang*

TL;DR: This work proposes an inference algorithm to study the transient behavior of the competing propagation processes in connected networks, and provides an analytic method to derive the conditional infection count distribution for networks with special topologies to understand the evolution. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 article

Modeling and Estimating the Structure of D2D-Based Mobile Social Networks

2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC).

By: S. Pambudi n, W. Wang n & C. Wang*

TL;DR: A random walk with self loop (RWSL) scheme that quickly converges to its stationary distribution and achieves higher joint degree distribution accuracy, and visits less number of nodes is proposed, compared to existing graph exploration schemes. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2016 conference paper

To live or to die: Encountering conflict information dissemination over simple networks

IEEE INFOCOM 2016 - the 35th annual IEEE international Conference on Computer Communications.

By: J. Wang n & W. Wang n

TL;DR: A Susceptible-Infectious-Cured (SIC) propagation model is established to examine two simple network topologies, clique and star, in terms of extinction time and half-life time of information under controllable, epidemic dynamics, and develops a method to estimate the conditional infection count distribution. (via Semantic Scholar)
UN Sustainable Development Goal Categories
3. Good Health and Well-being (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 article

Claim What You Need: A Text-Mining Approach on Android Permission Request Authorization

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: M. Wei n, . Gong* & W. Wang n

UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 conference paper

G2G: Privacy-preserving group matching for proximity-based mobile social networks

2015 IEEE/CIC International Conference on Communications in China (ICCC).

By: X. Zhu*, Z. Chen* & W. Wang n

TL;DR: G2G, a novel privacy-preserving group matching mechanism, which can support group matching with preserving the privacy of all group members by applying permutation function is proposed and an enhanced version G2G+, which can further improve group privacy is designed. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2015 journal article

On Topology and Resilience of Large-Scale Cognitive Radio Networks Under Generic Failures

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 14(6), 3390–3401.

By: L. Sun n, W. Wang n & Z. Lu n

author keywords: Resilience; cognitive radio networks; topology; generic failures
TL;DR: This work first defines two metrics, namely the failure occurrence probability p and failure connection function g(·), to characterize node failures and their spreading properties, respectively, and proves that each blackhole is exponentially bounded based on percolation theory. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 journal article

On the Evolution and Impact of Mobile Botnets in Wireless Networks

IEEE TRANSACTIONS ON MOBILE COMPUTING, 15(9), 2304–2316.

By: Z. Lu*, W. Wang n & C. Wang*

author keywords: Mobile botnet; malware; proximity propagation; wireless networks; denial-of-service; modeling and evaluation
TL;DR: It is found that node mobility can be a trigger to botnet propagation storms: the average size of a botnet increases quadratically over time if the mobility range that each node can reach exceeds a threshold; otherwise, the botnet can only contaminate a limited number of nodes with average size always bounded above. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 article

Safety Can Be Dangerous: Secure Communications Impair Smart Grid Stability Under Emergencies

2015 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM).

By: M. Wei n & W. Wang n

UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2015 journal article

The Impact of Network Size and Mobility on Information Delivery in Cognitive Radio Networks

IEEE TRANSACTIONS ON MOBILE COMPUTING, 15(1), 217–231.

By: L. Sun n, W. Wang n & Y. Li n

author keywords: Latency; cognitive radio networks; scalability; generic mobility
TL;DR: This paper studies the end-to-end latency in CRNs to find the sufficient and necessary conditions for real-time applications in finite networks and large-scale deployments, and provides a general mobility framework which captures most characteristics of the existing mobility models and takes spatial heterogeneity into account. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2014 journal article

Camouflage Traffic: Minimizing Message Delay for Smart Grid Applications under Jamming

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 12(1), 31–44.

By: Z. Lu n, W. Wang n & C. Wang*

author keywords: Smart grid; wireless applications; performance modeling; worst-case analysis; message delay; jamming attacks
TL;DR: A lightweight yet promising system, transmitting adaptive camouflage traffic (TACT), is demonstrated, to combat jamming attacks, which minimizes the message delay by generating extra traffic called camouflage to balance the network load at the optimum. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2014 conference paper

Greenbench: A benchmark for observing power grid vulnerability under data-centric threats

2014 proceedings ieee infocom, 2625–2633.

By: M. Wei n & W. Wang n

TL;DR: Greenbench is presented, a benchmark that is designed to evaluate real-time power grid dynamics in response to data-centric attacks, and the simulation results provide several counter-intuitive suggestions to both smart grid security research and deployment. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2014 conference paper

How can botnets cause storms? Understanding the evolution and impact of mobile botnets

2014 proceedings ieee infocom, 1501–1509.

By: Z. Lu n, W. Wang n & C. Wang*

TL;DR: The last chipper time is defined, which is the last time that service requests, even partially, can still be processed on time as the botnet keeps propagating and launching attacks, and reveals that although increasing network bandwidth can help with mobile services; at the same time, it can indeed escalate the risk for services being disrupted by mobile botnets. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2014 journal article

Message Dissemination in Intermittently Connected D2D Communication Networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 13(7), 3978–3990.

By: Y. Li n & W. Wang n

author keywords: Device-to-device (D2D) communication network; message dissemination; dissemination distance; hitting time
TL;DR: How far the message dissemination can reach by time t and how long the dissemination takes to inform nodes located at distanced are studied, especially in dynamic, intermittently connected networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2014 journal article

Modeling, Evaluation and Detection of Jamming Attacks in Time-Critical Wireless Applications

IEEE TRANSACTIONS ON MOBILE COMPUTING, 13(8), 1746–1759.

By: Z. Lu n, W. Wang n & C. Wang*

author keywords: Performance modeling; wireless network; time-critical messaging; jamming attack detection; smart grid applications
TL;DR: There exists a phase transition phenomenon for successful time-critical message delivery under a variety of jamming attacks, and a new metric, message invalidation ratio, is introduced to quantify the performance of time- critical applications. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 journal article

An Empirical Study of Communication Infrastructures Towards the Smart Grid: Design, Implementation, and Evaluation

IEEE TRANSACTIONS ON SMART GRID, 4(1), 170–183.

By: X. Lu n, W. Wang n & J. Ma*

author keywords: Communication infrastructures; DNP3 over TCP/IP; field deployment and performance evaluations; FREEDM systems; smart grid; system design
TL;DR: A case study of a smart grid demonstration project, the Future Renewable Electric Energy Delivery and Management (FREEDM) systems, and measures the message delivery performance of the DNP3-based communication infrastructure, revealing that diverse timing requirements of message deliveries are arguably primary concerns in a way that dominates viabilities of protocols or schemes in the communication infrastructure of the smart grid. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 journal article

Cyber security in the Smart Grid: Survey and challenges

COMPUTER NETWORKS, 57(5), 1344–1371.

By: W. Wang n & Z. Lu n

author keywords: Smart Grid; Cyber security; Attacks and countermeasures; Cryptography; Security protocols
TL;DR: This paper focuses on reviewing and discussing security requirements, network vulnerabilities, attack countermeasures, secure communication protocols and architectures in the Smart Grid, and aims to provide a deep understanding of security vulnerabilities and solutions in the smart grid. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 journal article

Internode Mobility Correlation for Group Detection and Analysis in VANETs

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 62(9), 4590–4601.

By: Y. Li n, M. Zhao n & W. Wang n

author keywords: Correlated mobility; group detection; vehicular ad hoc networks
TL;DR: A new metric, i.e., dual-locality ratio (DLR), is introduced, which quantifies mobility correlation of nodes and can be used to effectively identify stable user groups, which in turn could be used for network performance enhancement. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 article

PPNA special issue on "the green, reliability and security of machine-to-machine communications"

Li, X., Lin, X., Wang, W., & Mitton, N. (2014, September). PEER-TO-PEER NETWORKING AND APPLICATIONS, Vol. 7, pp. 213–214.

By: X. Li*, X. Lin*, W. Wang n & N. Mitton*

TL;DR: This special issue includes six state-of-the-art contributions on the GRS aspects of M2M communications, which identifies that the problem of information cascading and oversampling, which commonly arise in social networks, adversely affects trust management schemes in VANETs. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 journal article

Scheduling Partition for Order Optimal Capacity in Large-Scale Wireless Networks

IEEE TRANSACTIONS ON MOBILE COMPUTING, 12(4), 666–679.

By: Y. Xu n & W. Wang n

author keywords: Wireless multihop networks; capacity scaling; link scheduling; network decomposition; network design
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2013 conference paper

Understanding blackholes in large-scale cognitive radio networks under generic failures

2013 proceedings ieee infocom, 728–736.

By: L. Sun n & W. Wang n

TL;DR: The topology of Cognitive Radio Networks is focused on and it is proved that each Blackhole is exponentially bounded based on percolation theory, and an upper bound on the expected size of Blackholes is derived. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2013 journal article

Wireless Mesh Network in Smart Grid: Modeling and Analysis for Time Critical Communications

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 12(7), 3360–3371.

By: Y. Xu n & W. Wang n

author keywords: Wireless network; smart grid; time critical communication; network performance; communication delay
TL;DR: This paper model the smart grid wireless networks and presents the communication delay analysis in typical wireless network deployment scenarios in the grid to provide the delay bounds that can help design satisfactory wireless networks to meet the demanding communication requirements in thesmart grid. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2012 conference paper

Development of distributed grid intelligence platform for solid state transformer

2012 IEEE Third International Conference on Smart Grid Communications (SmartGridComm), 481–485.

By: F. Wang n, X. Lu n, W. Wang n & A. Huang n

TL;DR: A platform intended as a distributed controller for grid intelligence (DGI) system at FREEDM Systems Center serves as both a hard real-time local converter controller and a communication node for distributed deployment of energy management schemes. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 conference paper

Enabling adaptive rate and relay selection for 802.11 mobile ad hoc networks

2012 ieee international conference on communications (icc), 4150–4154.

By: N. Mehta n, A. Duel-Hallen n & W. Wang n

Event: at Piscataway, NJ, USA

TL;DR: This work proposes a novel method to reduce the effect of the feedback delay at the MAC layer in the presence of Rayleigh fading, which significantly improves the throughput, delay, and packet delivery ratio for high mobile velocities relative to previously proposed approaches that employ outdated CSI at the transmitter. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries, ORCID
Added: August 6, 2018

2012 conference paper

Geo-dissemination in vehicular ad hoc networks

2012 ieee international conference on communications (icc).

By: Y. Li n & W. Wang n

TL;DR: This paper analyzes how far a geo-dissemination can possibly reach over a period of time t, and what is the latency for a message to reach locations that are d distance far from the source (denoted as the stopping time τ). (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 conference paper

Hiding traffic with camouflage: Minimizing message delay in the smart grid under jamming

2012 Proceedings IEEE infocom, 3066–3070.

By: Z. Lu n, W. Wang n & C. Wang*

TL;DR: It is demonstrated via experiments that transmitting camouflage traffic can decrease the probability that a message is not delivered on time in order of magnitude for smart grid applications, indicating that the worst-case message delay is a U-shaped function of network traffic load. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 conference paper

On latency distribution and scaling: From finite to large cognitive radio networks under general mobility

2012 Proceedings IEEE infocom, 1287–1295.

By: L. Sun n & W. Wang n

TL;DR: This paper studies the end-to-end latency in Cognitive Radio Networks and considers a general mobility framework that captures most characteristics of the existing models and accounts for spatial heterogeneity resulting from the scenario that some locations are more likely to be visited by mobile nodes. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 conference paper

On the connectivity of large multi-channel cognitive radio networks

2012 ieee international conference on communications (icc), 1854–1858.

By: L. Sun n & W. Wang n

TL;DR: The sufficient and necessary condition to achieve full connectivity is λ = Θ(log n/πr2 Ps), where λ is the density, n is the number and r is the transmission range of secondary users respectively, and Ps is the probability that any two secondary users can communicate with each other without interfering with primary users. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2012 conference paper

The latency of gaining alpha-reliability for message dissemination in vehicle-to-vehicle networks

2012 ieee global communications conference (globecom), 5550–5555.

By: Y. Li n, W. Wang n & A. Duel-Hallen n

Event: at Piscataway, NJ, USA

TL;DR: Under a 1-Dimensional (1-D) network scenario with unreliable channel and constrained vehicle mobility, the minimum latency of gaining almost sure α-reliability is derived, denoted as tmin(α), which is dominated by the first attempt to send the message to a destination. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries, ORCID
Added: August 6, 2018

2012 conference paper

Understanding the tempo-spatial limits of information dissemination in multi-channel cognitive radio networks

2012 Proceedings IEEE infocom, 1278–1286.

By: L. Sun n & W. Wang n

TL;DR: The sufficient and necessary conditions under which there exist spatial and temporal limits of information dissemination in CRNs are determined and it is found that when information cannot be disseminated to the entire network, the limiting dissemination radius is statistically dominated by an exponential distribution, while the limiting information propagation speed approaches to zero. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 journal article

A survey on the communication architectures in smart grid

COMPUTER NETWORKS, 55(15), 3604–3629.

By: W. Wang n, Y. Xu n & M. Khanna n

author keywords: Smart grid; Power communications; Communication networks; Communication protocols; Grid standards
TL;DR: This survey attempts to summarize the current state of research efforts in the communication networks of smart grid, which may help to identify the research problems in the continued studies. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (Web of Science; OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2011 conference paper

From jammer to gambler: Modeling and detection of jamming attacks against time-critical traffic

2011 proceedings ieee infocom, 1871–1879.

By: Z. Lu n, W. Wang n & C. Wang*

TL;DR: A new metric, message invalidation ratio, is introduced, to quantify the performance of time-critical applications and shows that there in general exists a phase transition phenomenon for a time- critical application under jamming attacks. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 conference paper

Information delivery in large wireless networks with minimum energy expense

2011 proceedings ieee infocom, 1584–1592.

By: Y. Xu n & W. Wang n

TL;DR: This work provides the fundamental understandings of energy needs and the efficient solutions for energy usages in major communication scenarios, which contribute to the rational dimensioning and wise utilization of the energy resources in large wireless networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 conference paper

Intermittently connected vehicle-to-vehicle networks: Detection and analysis

2011 ieee global telecommunications conference (globecom 2011).

By: Y. Li n, M. Zhao n & W. Wang n

TL;DR: This paper observes that mobility of vehicle shows temporal locality similarity and introduces a new metric, namely \emph{dual locality ratio} (DLR), which represents the mobility correlation of vehicles, and demonstrates applications of DLR for improving performances of data forwarding and clustering in vehicle-to-vehicle networks. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 conference paper

On network performance evaluation toward the smart grid: A case study of DNP3 over TCP/IP

2011 ieee global telecommunications conference (globecom 2011).

By: X. Lu n, Z. Lu n, W. Wang n & J. Ma*

TL;DR: A micro smart grid is established to measure the delay performance of a predominant SCADA protocol, distributed network protocol 3.0 (DNP3) over TCP/IP, and results indicate that DNP3 over UDP can be further optimized in terms of delay efficiency, and a lightweight communication protocol is essential for time-critical smart grid applications. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 conference paper

On the access time in mobile hybrid networks

2011 ieee global telecommunications conference (globecom 2011).

By: H. Zheng n & W. Wang n

TL;DR: A theoretical framework to analyze the packet propagation speed in MHNs is proposed, and it is shown that there is a unified lower bound on the access time regardless of data forwarding schemes. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2011 journal article

Toward robust multi-hop data forwarding in large scale wireless networks

COMPUTER NETWORKS, 55(11), 2608–2621.

By: F. Xing* & W. Wang n

author keywords: Multi-hop routing; Network robustness; Wireless networks; Performance evaluation
TL;DR: This paper proposes to design a network topology and data forwarding algorithms, namely PROACtive, in order to distribute data packets among cooperative nodes only, subject to k-connectivity constraint, and shows that there exists a trade-off between achieving network robustness and k-connected with high probability. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2011 conference paper

on distribution and limits of information dissemination latency and speed in mobile cognitive radio networks

2011 proceedings ieee infocom, 246–250.

By: L. Sun n & W. Wang n

TL;DR: It is shown that the dissemination latency depends on the stationary spatial distribution and mobility capability α (characterizing the region that a mobile secondary user can reach) of secondary users and that as the network grows to infinity, the latency asymptotically scales linearly with the “distance” between the source and the destination. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 conference paper

All-terminal network reliability optimization in fading environment via cross entropy method

2010 ieee international conference on communications - ICC 2010.

By: S. Kharbash n & W. Wang n

TL;DR: This paper presents a new algorithm that can be readily applied to solve all-terminal network reliability optimization problem of a wireless network in a fading environment that uses a global stochastic optimization technique, Cross Entropy (CE) to generate the optimal network topology and control nodes transmission powers such that all- terminal network reliability is maximized. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 conference paper

Characterizing the spread of correlated failures in large wireless networks

2010 proceedings ieee infocom.

By: Y. Xu n & W. Wang n

TL;DR: The spread of correlated failures is characterized in this paper, which lays the foundation for evaluating and improving the failure resilience of existing wireless networks. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 conference paper

On order gain of backoff misbehaving nodes in CSMA/CA-based wireless networks

2010 proceedings ieee infocom.

By: Z. Lu n, W. Wang n & C. Wang*

TL;DR: This paper defines and study two general classes of backoff misbehavior, and introduces a new performance metric, namely order gain, which is to characterize the performance benefits of misbehaving nodes in comparison to legitimate nodes. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 conference paper

On the connectivity analysis over large-scale hybrid wireless networks

2010 proceedings ieee infocom.

By: C. Yi n & W. Wang n

TL;DR: The results provide a theoretical understanding of to what extent ad hoc nodes can benefit from base stations in multi-hop wireless networks and study a hybrid network architecture that makes a significant connectivity improvement with transmission range larger than r_{\beta}$ larger than $r_{\alpha}$ forAd hoc nodes. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 conference paper

Review and evaluation of security threats on the communication networks in the smart grid

Military communications conference, 2010 (milcom 2010), 1830–1835.

By: Z. Lu n, X. Lu n, W. Wang n & C. Wang*

TL;DR: This work provides initial experimental data of DoS attacks against a power network and shows that the network performance degrades dramatically only when the DoS attack intensity approaches to the maximum. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2010 journal article

The Limit of Information Propagation Speed in Large-Scale Multihop Wireless Networks

IEEE-ACM TRANSACTIONS ON NETWORKING, 19(1), 209–222.

By: Y. Xu n & W. Wang n

author keywords: Information propagation; multihop communication; network connectivity; packet delay; wireless network
TL;DR: The speed limit of information propagation in large-scale multihop wireless networks is investigated, which provides fundamental understanding of the fastest information transportation and delivery that a wireless network is able to accommodate. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2010 conference paper

Topology-incurred delay for information dissemination in large multi-channel cognitive radio networks

2010 ieee global telecommunications conference globecom 2010.

By: L. Sun n & W. Wang n

TL;DR: The nature of topology-incurred end-to-end delay in large multi-channel CR networks is investigated and the conditions under which the asymptotic topology -incurred delay scales linearly with the Euclidean distance are identified. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2009 journal article

An Experimental Study of the Performance Impact of Path-Based DoS Attacks in Wireless Mesh Networks

Mobile Networks and Applications, 15(5), 693–709.

By: A. Agarwal n & W. Wang n

author keywords: performance evaluation; wireless mesh; denial of service; implementation
TL;DR: It is found that medium errors have significant impact on the performance of WMNs when a path-based DoS attack is carried out, and the impact is exacerbated by the MAC layer retransmissions. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: March 1, 2020

2009 article

Special Issue on Advances in Broadband Wireless Networks

Wang, W., & Devetsikiotis, M. (2009, August). MOBILE NETWORKS & APPLICATIONS, Vol. 14, pp. 365–367.

By: W. Wang n & M. Devetsikiotis n

Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2009 journal article

Topology Stability Analysis and Its Application in Hierarchical Mobile Ad Hoc Networks

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 58(3), 1546–1560.

By: Y. Xu n & W. Wang n

author keywords: Clustering; hierarchical architecture; mobility network topology; wireless ad hoc networks
TL;DR: A clustering algorithm and a hierarchical routing protocol are proposed that work together to achieve the maximum network stability and the fundamental understanding of the bounds on network stability is provided. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

Finding the fastest path in wireless networks

2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, pp. 3188–3192.

By: Y. Xu n & W. Wang n

TL;DR: This paper shows that the end-to-end packet delay depends largely on the locations of the relay nodes that forward the packet and there exists a shortest-delay path theoretically, and proposes a routing algorithm to locate a fast relay path in actual networks to achieve the near-shortest packet delay. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 journal article

On the Survivability of Wireless Ad Hoc Networks with Node Misbehaviors and Failures

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 7(3), 284–299.

By: F. Xing* & W. Wang n

author keywords: Network survivability; node misbehaviors; semi-Markov process; node behavior modeling; node isolation problem; k-connectivity; wireless ad hoc networks
TL;DR: A novel semi-Markov process model is proposed to characterize the evolution of node behaviors and the effects of node misbehaviors on both topological survivability and network performance and is validated by simulations and numerical analysis. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

On the devolution of large-scale sensor networks in the presence of random failures

2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, pp. 2304–2308.

By: F. Xing n & W. Wang n

TL;DR: A new metric is defined called the first partition time, which is the first time that a network starts to discomposes to multiple isolated small components, and the devolution process in a geometric random graph from a percolation-based connectivity perspective is analyzed. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 article

Self-orienting wireless multimedia sensor networks for maximizing multimedia coverage

2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, pp. 2206–2210.

By: N. Tezcan n & W. Wang n

TL;DR: This paper proposes a distributed algorithm to detect a node's multimedia coverage and then determine its orientation, while minimizing the effect of occlusions and total overlapping regions in the sensing field, and shows that using distributed messaging and self-orientation having occlusion-free viewpoints significantly increase the multimedia coverage. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2008 journal article

Self-orienting wireless multimedia sensor networks for occlusion-free viewpoints

COMPUTER NETWORKS, 52(13), 2558–2567.

By: N. Tezcan n & W. Wang n

author keywords: multimedia coverage; multimedia sensor network; visible field of view; occlusion; self-orientation; distributed algorithm
TL;DR: This paper proposes a new algorithm to determine a node's multimedia coverage and find the sensor orientation that minimizes the negative effect of occlusions and overlapping regions in the sensing field, and shows that the occlusion-free viewpoint approach increases the multimedia coverage significantly. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 journal article

A dynamic TCP-Aware call admission control scheme. for generic next generation packet-switched wireless networks

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 6(9), 3344–3352.

By: X. Wang*, D. Eun n & W. Wang n

author keywords: admission control; wireless networks; TCP
TL;DR: This work proposes a TCP-aware CAC scheme to regulate the packet-level dynamics of TCP flows and demonstrates that the proposed scheme can effectively improve the system performance in terms of call blocking probability, call-level throughput (call/min) and link utilization. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 journal article

A unified mobility model for analysis and simulation of mobile wireless networks

WIRELESS NETWORKS, 15(3), 365–389.

By: M. Zhao n & W. Wang n

author keywords: Mobility model; Smooth movement; Semi-Markov process; Stochastic analysis; Network performance evaluation; Mobile wireless networks
TL;DR: This model is proved to be smooth and steady because there is no speed decay problem for arbitrary starting speed, while maintaining uniform spatial node distribution regardless of node placement, and can be easily and flexibly applied for simulating node mobility in wireless networks. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 article

AN EXPERIMENTAL STUDY ON SECURITY PROTOCOLS IN WLANS

WIRELESS NETWORK SECURITY, pp. 295–322.

By: A. Agarwal n & W. Wang n

TL;DR: It is suggested to provide substantial security at a reasonable cost of overhead with respect to mobile scenarios and traffic streams, and it is noticed that authentication time will be a more significant factor contributing towards QoS degradation than cryptographic cost, which is critical to real-time service in wireless networks. (via Semantic Scholar)
UN Sustainable Development Goal Categories
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2007 chapter

On the Resilient Overlay Topology Formation in Multi-hop Wireless Networks

In NETWORKING 2007. Ad Hoc and Sensor Networks, Wireless Networks, Next Generation Internet (pp. 1–12).

By: F. Xing n & W. Wang n

TL;DR: This paper proposes a new distributed topology control protocol called PROACtive, which helps to design overlay topologies in multi-hop wireless networks such that the overlays achieve perfect resilience, in terms of all cooperative nodes included but misbehaving nodes excluded, and preserve the k-connectivity with high probability. (via Semantic Scholar)
Sources: Crossref, NC State University Libraries
Added: March 1, 2020

2006 conference paper

A novel semi-Markov smooth mobility model for mobile ad hoc networks.

Globecom 2006 - 2006 ieee global telecommunications conference.

By: M. Zhao n & W. Wang n

TL;DR: Through steady state analysis, it is demonstrated that SMS model has no average speed decay problem and always maintains a uniform spatial node distribution. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2006 journal article

A simulation study of IP-based vertical handoff in wireless convergent networks

WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 6(5), 629–650.

By: L. Song n & W. Wang n

author keywords: handoff; heterogeneous wireless networks; mobile IP; UMTS/WLANs
TL;DR: The performance of a transport layer handoff approach, mobile stream control transmission protocol (mSCTP), is evaluated and that of a network layer solution, MIP is compared by introducing handoff delay, end-to-end transmission throughput, and packet loss. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2006 journal article

Energy-efficient bandwidth allocation in wireless networks: Algorithms, analysis, and simulations

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 5(5), 1103–1114.

By: W. Wang, X. Wang & A. Nilsson

author keywords: wireless networks; energy consumption; and connection admission control
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2006 conference paper

Modeling and analysis of connectivity in mobile ad hoc networks with misbehaving nodes

2006 ieee international conference on communications, vols 1-12, 1879–1884.

By: F. Xing n & W. Wang n

TL;DR: This work proposes a novel model to characterize node misbehaviors based on a semi-Markov process and analyzes the impact of node misbehavior on network connectivity in a mobile ad hoc network stochastically. (via Semantic Scholar)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2006 article

On the impact of quality of protection in wireless local area networks with IP mobility

Agarwal, A. K., & Wang, W. (2007, February). MOBILE NETWORKS & APPLICATIONS, Vol. 12, pp. 93–110.

By: A. Agarwal n & W. Wang n

author keywords: wireless local area networks; quality of service; quality of protection; security protocols; mobile IP; performance analysis
TL;DR: A quality of protection (QoP) model is introduced to indicate the benefits and the performance cost of security protocols in terms of authentication time, cryptographic overhead and throughput and it is found that some protocols are robust against mobility with little variation in system performance; thus, it is possible to provision steady service by choosing security protocols when users' mobility pattern is unknown. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2006 conference paper

effective energy conservation in wireless sensor networks

2006 ieee international conference on communications, vols 1-12, 3359–3364.

By: N. Tezcan n & W. Wang n

TL;DR: Through extensive simulations in ns2, it is demonstrated that the two-tier scheduling can reduce average energy consumption up to 40% while balancing the residual energy of sensors. (via Semantic Scholar)
UN Sustainable Development Goal Categories
7. Affordable and Clean Energy (OpenAlex)
Sources: NC State University Libraries, NC State University Libraries
Added: August 6, 2018

2005 journal article

A cost-minimization algorithm for fast location tracking in mobile wireless networks

COMPUTER NETWORKS, 50(15), 2713–2726.

By: W. Wang n & G. Xue*

author keywords: wireless networks; location tracking; partition; optimization
TL;DR: A new location tracking algorithm is developed to determine the position of mobile terminals under delay constraints, while minimizing the average locating cost based on a unimodal property, and it is demonstrated that the new algorithm has a lower computational complexity compared to existing algorithms. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2005 journal article

A survey of cross-layer performance enhancements for Mobile IP networks

COMPUTER NETWORKS, 49(2), 119–146.

By: J. McNair*, T. Tugcu*, W. Wang n & J. Xie*

author keywords: mobile IP; mobility; authentication; handoff
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2005 journal article

Integration of authentication and mobility management in third generation and WLAN data networks

WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 5(6), 665–678.

By: W. Wang n, W. Liang n & A. Agarwal n

author keywords: authentication; mobility management; 3G systems; wireless local area networks (WLANs)
TL;DR: This work introduces a new authentication architecture for fast authentication during inter-networking handoff and large-scale heterogeneous networks based on IP infrastructure and shows that the new architecture can reduce authentication latency significantly and be adaptive to user mobility and traffic. (via Semantic Scholar)
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2004 journal article

On performance analysis of challenge/response based authentication in wireless networks

COMPUTER NETWORKS, 48(2), 267–288.

By: W. Liang n & W. Wang n

author keywords: wireless networks; challenge/response authentication; security association; performance analysis
TL;DR: The impact of authentication on the security and quality of service (QoS) through the authentication in wireless networks is analyzed quantitatively and the concept of security levels is proposed to describe the protection of communications with regard to the nature of security. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

2004 journal article

The predictive user mobility profile framework for wireless multimedia networks

IEEE-ACM TRANSACTIONS ON NETWORKING, 12(6), 1021–1035.

By: I. Akyildiz* & W. Wang n

author keywords: mobility and resource management; quality of service (QoS); user mobility profile (UMP); wireless network
TL;DR: Simulation results are shown to indicate that the proposed schemes are effective on mobility and resource management by evaluating blocking/dropping probabilities and location tracking costs in wireless networks. (via Semantic Scholar)
Sources: Web Of Science, NC State University Libraries
Added: August 6, 2018

conference paper

Joint effects of radio channels and node mobility on link dynamics in wireless networks

Wang, W. Y., & Zhao, M. 27th ieee conference on computer communications (infocom), vols 1-5, 1606–1614.

By: W. Wang & M. Zhao

Source: NC State University Libraries
Added: August 6, 2018

conference paper

Measuring performance impact of security protocols in wireless local area networks

Agarwal, A. K., & Wang, W. Y. 2nd International Conference on Broadband Networks (Broadnets 2005), 625-.

By: A. Agarwal & W. Wang

Source: NC State University Libraries
Added: August 6, 2018

journal article

Modeling and analysis of single-hop mobile cloudlet

Li, Y. J., & Wang, W. Y. Advances in Mobile Cloud Computing Systems, 231–256.

By: Y. Li & W. Wang

Source: NC State University Libraries
Added: August 6, 2018

conference paper

On the resilience of D2D-based social networking service against random failures

Pambudi, S. A., Wang, W. Y., & Wang, C. 2016 ieee global communications conference (globecom).

By: S. Pambudi, W. Wang & C. Wang

Source: NC State University Libraries
Added: August 6, 2018

conference paper

The speed of information propagation in large wireless networks

Xu, Y., & Wang, W. Y. 27th IEEE Conference on Computer Communications (Infocom), vols 1-5, 403–411.

By: Y. Xu & W. Wang

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.