Jingwei Miao

Learn More
—A prediction-based routing protocol for mobile delay tolerant networks functions by forwarding a message from one intermediate node to another if the latter has higher probability of encountering the destination node. However, this process compromises the privacy of the nodes by revealing their mobility patterns. In this paper, we propose a privacy(More)
Message routing in mobile delay tolerant networks inherently relies on the cooperation between nodes. In most existing routing protocols, the participation of nodes in the routing process is taken as granted. However, in reality, nodes can be unwilling to participate. We first show in this paper the impact of the unwillingness of nodes to participate in(More)
—In this paper, we present a novel routing protocol for mobile delay tolerant networks, called Community-based Adaptive Spray (CAS). How to maximize routing performance (delivery ratio) and minimize resource consumption (number of message copies) is a common goal in these networks. Our protocol considers the following two aspects toward this goal: 1)(More)
Solutions for data dissemination in traditional peer-to-peer networks are not suitable for mobile peer-to-peer networks due to the special characteristics of mobile environments, particularly highly variable connectivity, and dis-connection. Mobile peer-to-peer data dissemination over Delay Tolerant Networks (DTNs) is a promising paradigm since they can(More)
The increasing pervasiveness of mobile devices with networking capabilities has led to the emergence of Mobile Delay Tolerant Networks (MDTNs). The characteristics of MDTNs, which include frequent and long-term partitions, make message routing a major challenge in these networks. Most of the existing routing protocols either allocate an unlimited number of(More)
—In mobile Delay Tolerant Networks (DTNs), messages are routed in a mobility-assisted manner. Therefore, the willingness of nodes to relay messages for other nodes plays a significant role in the routing process. Moreover, since the resources in mobile devices are generally limited, carriers of mobile devices may be unwilling to relay messages for other(More)
—The vehicular ad-hoc network (VANET) aims to make road traffic safer and more efficient. Security and privacy are two important but somewhat contradictory objectives. On the one hand, vehicle-to-vehicle (V2V) authentication requires drivers to present some individual credentials. On the other hand, drivers need privacy protections on their identities,(More)
Due to the increasingly serious information attacks in network times, the electronic commerce is facing additional challenges in the aspects of security and efficiency. Therefore, in this paper, we propose a new practical e-cash protocol based on dynamic group signature in BSZ model, using the Non-Interactive Zero-Knowledge proofs system. And it is proved(More)