Learn More
Seamless handover in IEEE 802.11 for Quality of Service (QoS) demanding applications is one of the critical issues because of handover latency. In this paper, we propose the Neighbor Graph Cache (NGC) mechanism to reduce scanning latency while a mobile station tries to make a link-layer handover. The handoff latency can be greatly reduced through the NGC(More)
A wireless MANET is a collection of wireless mobile hosts that dynamically create a temporary network without a fixed infrastructure. The topology of the network may change unpredictably and frequently. Therefore, multicast routing in ad hoc networks is a very challenging problem. This paper proposes a multi-constrained QoS multicast routing method using(More)
Over the last decade, mobile agent (MA) systems for surveillance applications in wireless sensor networks (WSNs) has gained much attention. However, a conventional MA-based WSN may have the issues of energy efficiency and task duration as the scale of the network is increased. In order to overcome the drawbacks of using a single MA, dispatching two or more(More)
Many anonymity enhancing techniques have been proposed based on packet encryption to protect the communication anonymity of mobile ad hoc networks (MANETs). However, in this paper, we show that MANETs are still vulnerable under passive statistical traffic analysis attacks. To demonstrate how to discover the communication patterns without decrypting the(More)
Network simulators are necessary for testing algorithms of large scale wireless sensor networks (WSNs), but lack the accuracy of real-world deployments. Deploying real WSN test-bed provides a more realistic test environment, and allows users to get more accurate test results. However, deploying real testbed is highly constrained by the available budget when(More)
Traditional electronic program guides (EPGs) cannot be used to find popular TV programs. A personalized digital video broadcasting – terrestrial (DVB-T) digital TV program recommendation system is ideal for providing TV program suggestions based on statistics results obtained from analyzing large-scale data. The frequency and duration of the programs that(More)
The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this(More)
Cognitive radio technique is the next step toward efficient wireless bandwidth utilization. While some of the spectrum bands (unlicensed band) have been increasingly used, most of the other spectrum resources (licensed band) are underutilized. This drives the challenges of open spectrum and dynamic spectrum access concepts, which allows unlicensed users (or(More)