Chisheng Zhang

Learn More
Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. one attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and(More)
In cognitive networks, spectrum handoff occurs when primary users reclaim their rights to access their licensed spectrum. When links perform spectrum handoff, their communication may be interrupted for a certain period and incurs spectrum handoff delay. Existing work only considered the problem of minimizing spectrum handoff delay of a single link in(More)