Thao P. Nghiem

Learn More
Together with advanced positioning and mobile technologies, P2P query processing has attracted a growing interest number of location-aware applications such as answering kNN queries in mobile ad hoc networks. It not only overcomes drawbacks of centralized systems, for example single point of failure and bottleneck issues, but more importantly harnesses(More)
Keywords: Wireless sensor networks (WSNs) En-route filtering scheme Compromised node Security a b s t r a c t A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved hop-by-hop authentication (IHA) scheme has been proposed to minimize such serious damage by(More)
The increasing use of mobile communications has raised many issues of decision support and resource allocation. A crucial problem is how to solve queries of Reverse Nearest Neighbor (RNN). An RNN query returns all objects that consider the query object as their nearest neighbor. Existing methods mostly rely on a centralized base station. However, mobile P2P(More)
The increasing use of location-based services has raised many issues of decision support and resource allocation. A crucial problem is how to solve queries of Group k-Nearest Neighbour (GkNN). A typical example of a GkNN query is finding one or many nearest meeting places for a group of people. Existing methods mostly rely on a centralised base station.(More)
Together with the advance of positioning and mobile technologies, P2P query processing has attracted a growing interest number of location-aware applications such as answering <i>k</i>NN queries in Mobile Ad-hoc Networks. It not only overcomes drawbacks of centralized paradigms; for example single point of failure and bottle-neck issues, but more(More)
In sensor networks, a compromised node can generate fabricated reports, which cause severe damage such as false alarms and energy drain. An interleaved hop-by-hop authentication (IHA) scheme addresses the attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify(More)
  • 1