Lawrence Wai-Choong Wong

Learn More
—The emergence of personal mobile device with low cost sensors, such as accelerometer and digital compass, has made dead-reckoning (DR) an attractive choice for indoor pedestrian tracking. In this paper, we propose a robust DR pedestrian tracking system on top of such commercially accessible sensor sets capable of DR. The proposed method exploits the fact(More)
—This paper surveys recently proposed works on Intrusion Detection Systems (IDS) in WSNs, and presents a comprehensive classification of various IDS approaches according to their employed detection techniques. The three main categories explored in this paper are anomaly detection, misuse detection, and specification-based detection protocols. We give a(More)
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Abstract— In this paper, we consider the medium access control (MAC) protocol design for random access cognitive radio networks (CRNs). A two-level opportunistic spectrum access strategy is proposed(More)
Micro-sensor human motion capture has shown its potentials because of its ubiquity and low cost. One of the biggest challenges in micro-sensor motion estimation is the drift problem caused by integration of angular rates to obtain orientation. To reduce the drift, existing algorithms make use of gravity and earth magnetic filed measured by accelerometers(More)
This paper presents a novel hierarchical information fusion algorithm to obtain human global displacement for different gait patterns, including walking, running, and hopping based on seven body-worn inertial and magnetic measurement units. In the first-level sensor fusion, the orientation for each segment is achieved by a complementary Kalman filter (CKF)(More)
This paper proposes a content-aware authentication scheme optimized to account for distortion and overhead for media streaming. When authenticated media is streamed over a lossy network, a received packet is consumed only when it is both decodable and authenticated. In most media formats, some packets are more important than others. This naturally motivates(More)