Jyh-Ming Huang

Learn More
Due to the power restriction of sensor nodes, efficient routing, in wireless sensor networks, is a critical approach to saving node's energy and thus prolonging the network lifetime. Even the chain-based routing is one of significant routing mechanisms, several common flaws, such as data propagation delay and redundant transmission, are associated. In this(More)
Traffic congestion avoidance is a critical issue associated with data routing in Wireless Sensor Networks (WSNs). Previous researches employ either traffic or resource control strategies as solutions. In this paper, we propose an energy-efficient grid-based traffic congestion avoidance scheme in WSNs, termed as TALONet. With our mechanism, the approaches(More)
A critical security threat in a WSN is the compromising of sensor nodes. Not only can attackers use such vulnerability to eavesdrop on the dataflow, but could also inject bogus information into the network. However, most current secure data collection methods trade fault-tolerant ability for end-to-end protection, thus with poor performance. This work(More)
In comparison to randomly deployed WSNs (Wireless Sensor Networks), pre-configured WSNs are superior in network performance for many aspects, including end-to-end delay time, data delivery ratio, and energy consumption. Several topologies concerning with pre-configured WSNs, such as grid, hexagonal, or de Bruijn, were proposed in past studies. The common(More)
Mobile Voice over IP (Mobile VoIP) allows mobile users to continuously talk with each others while roaming across different networks. In such wireless application, it is vulnerable to information security. In this paper, we present two efficient and secure authentication protocols for mobile VoIP services. In our approaches, we first develop a secure(More)
This paper presents tensor product formulas for modeling fault tolerant architectures and their corresponding reconfiguration algorithms. In our approaches, a network topology is first described with simple tensor product formulas, and then, by adding a set of permutation matrices and applying the direct sum operation, the reconfigurable architecture can be(More)
Massively Multiplayer Games (MMGs) is an attractive example of virtual environment applications on the Internet. In such application, a great deal of update messages will be introduced, and thus consume a large amount of network bandwidth and multicast addresses. Interest Management (IM) is a mechanism provided for diminishing the redundant communication(More)
A desired mesh architecture, based on connected-cycle modules, is constructed. To enhance the reliability, multiple bus sets and spare nodes are dynamically inserted to construct modular blocks. Two reconfiguration schemes are associated, and can eliminate the spare substitution domino effect. Simulations show that both schemes provide for increase in(More)