1-3hit |
Baokang ZHAO Dan WANG Zili SHAO Jiannong CAO Keith C.C. CHAN Jinshu SU
In wireless sensor networks, preserving location privacy under successive inference attacks is extremely critical. Although this problem is NP-complete in general cases, we propose a dynamic programming based algorithm and prove it is optimal in special cases where the correlation only exists between p immediate adjacent observations.
Fan CHAN Jiannong CAO Alvin T.S. CHAN Minyi GUO
Many parallel applications involve different independent tasks with their own data. Using the MPMD model, programmers can have a modular view and simplified structure of the parallel programs. Although MPI supports both SPMD and MPMD models for programming, MPI libraries do not provide an efficient way for task communication for the MPMD model. We have developed a programming environment, called ClusterGOP, for building and developing parallel applications. Based on the graph-oriented programming (GOP) model, ClusterGOP provides higher-level abstractions for message-passing parallel programming with the support of software tools for developing and running parallel applications. In this paper, we describe how ClusterGOP supports programming of MPMD parallel applications on top of MPI. We discuss the issues of implementing the MPMD model in ClusterGOP using MPI and evaluate the performance by using example applications.
Gang YAO Jiannong CAO Ye YAN Yusheng JI
Authentication issue has been mostly ignored to ensure fast handoff in 802.11 Wireless Mesh Network (WMN). With the proliferation of WMNs in recent years for practical deployment, secured fast handoff has drawn much attention to enforce authenticated access while reduce the extra delay caused by enabling authentication operations. In this paper, we present an overview on the state-of-the-art advance in this field and tackle the problem from a practical perspective based on experiments and analysis on our real-world testbed HAWK. We propose a novel fast handoff scheme Network-assisted Radio Signature to eliminate probing delay by taking advantage of the characteristic of the actual dynamic topology about mesh routers in WMN. Moreover, we apply an optimistic authentication mechanism Dual Re-authentication to counteract the authentication delay while providing the secured wireless access. In this manner, we have reduced the end-to-end handoff delay of WMN back again to a level below 50 ms to achieve secured handoff and support time-sensitive applications. We describe detailed mechanisms, simulation, implementation and experimental results. To our best knowledge, we are the first to achieve such an optimal performance of secured fast handoff.