Dapeng Oliver Wu

Learn More
This paper provides a theoretical framework of energy-optimal mobile cloud computing under stochastic wireless channel. Our objective is to conserve energy for the mobile device, by optimally executing mobile applications in the mobile device (i.e., mobile execution) or offloading to the cloud (i.e., cloud execution). One can, in the former case(More)
This paper proposes an efficient authentication scheme, which is suitable for low-power mobile devices. It uses an elliptic-curve-eryptosystem based trust delegation mechanism to generate a delegation passcode for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attack.(More)
Opportunistic spectrum access and adaptive power management are effective techniques to improve throughput, delay performance, and energy efficiency for wireless networks. In this paper, we consider the joint design of opportunistic spectrum access and adaptive power management under the setting of multi-radio nodes and multi-channel wireless local area(More)
With the emergence of broadband wireless networks and increasing demand of multimedia information on the Internet, wireless multimedia services are foreseen to become widely deployed in the next decade. Real-time video transmission typically has requirements on quality of service (QoS). However, wireless channels are unreliable and the channel bandwidth(More)
With the widespread use of mobile devices, the privacy of mobile location information becomes an important issue. In this paper, we present the requirements on protecting mobile privacy in wireless networks, and identify the privacy weakness of the third generation partnership project - authentication and key agreement (3GPP-AKA) by showing a practical(More)
Due to the uncertainty of transmission opportunities between mobile nodes, delay tolerant networks (DTNs) exploit the opportunistic forwarding mechanism. This mechanism requires nodes to forward messages in a cooperative and selfish way. However, in the real word, most of the nodes exhibit selfish behaviors, such as individual and social selfishness. In(More)
Large-scale underwater ad-hoc networks (UANET) and underwater sensor networks (UWSN) are novel networking paradigms to explore the uninhabited oceans. However, the characteristics of these new networks, such as huge propagation delay, floating node mobility, and limited acoustic link capacity, are significantly different from ground-based mobile ad-hoc(More)
In this paper, we investigate the scheduling policy for collaborative execution in mobile cloud computing. A mobile application is represented by a sequence of fine-grained tasks formulating a linear topology, and each of them is executed either on the mobile device or offloaded onto the cloud side for execution. The design objective is to minimize the(More)
The ever increasing traffic demand becomes a serious concern of mobile network operators. To solve this traffic explosion problem, there have been many efforts to offload the traffic from cellular links to direct communications among users. In this paper, we propose the framework of Traffic Offloading assisted by Social network services (SNS) via(More)
Cloud is becoming a dominant computing platform. Naturally, a question that arises is whether we can beat notorious DDoS attacks in a cloud environment. Researchers have demonstrated that the essential issue of DDoS attack and defense is resource competition between defenders and attackers. A cloud usually possesses profound resources and has full control(More)