Thao P. Nghiem

Learn More
Together with advanced positioning and mobile technologies, P2P query processing has attracted a growing interest number of location-aware applications such as answering kNN queries in mobile ad hoc networks. It not only overcomes drawbacks of centralized systems, for example single point of failure and bottleneck issues, but more importantly harnesses(More)
0140-3664/$ see front matter 2010 Elsevier B.V. A doi:10.1016/j.comcom.2010.03.006 * Corresponding author. Tel.: +82 31 290 7221; fax E-mail addresses: thaonp@ece.skku.ac.kr (T.P. Ng (T.H. Cho). A compromised node can generate a fabricated report, which results in false alarms, information loss, and a waste of precious network energy. An interleaved(More)
The increasing use of location-based services has raised many issues of decision support and resource allocation. A crucial problem is how to solve queries of Group k-Nearest Neighbour (GkNN). A typical example of a GkNN query is finding one or many nearest meeting places for a group of people. Existing methods mostly rely on a centralised base station.(More)
The increasing use of mobile communications has raised many issues of decision support and resource allocation. A crucial problem is how to solve queries of Reverse Nearest Neighbor (RNN). An RNN query returns all objects that consider the query object as their nearest neighbor. Existing methods mostly rely on a centralized base station. However, mobile P2P(More)
In sensor networks, a compromised node can generate fabricated reports, which cause severe damage such as false alarms and energy drain. An interleaved hop-by-hop authentication (IHA) scheme addresses the attack by detecting and filtering false reports in a deterministic and hop-by-hop fashion. Unfortunately, in IHA, all en-route nodes must join to verify(More)