Zhenxing Luo

Learn More
High demands for broadband mobile wireless communications and the emergence of new wireless multimedia applications constitute the motivation to the development of broadband wireless access technologies in recent years. The Long Term Evolution/System Architecture Evolution (LTE/SAE) system has been specified by the Third Generation Partnership Project(More)
Role based access control (RBAC) has emerged as a leading access control model to other traditional access control models. However, the traditional RBAC models can not capture fine-grained authorization with mono-type inheritance. In this paper, we discuss the hybrid inheritance based on our extended RBAC model, which is very desirable for capturing the(More)
This paper presents a novel energy-based target localization method in wireless sensor networks with selected sensors. In this method, sensors use Turbo Product Code (TPC) to transmit decisions to the fusion center. TPC can reduce bit error probability if communication channel errors exist. Moreover, in this method, thresholds for the energy-based target(More)
Cognitive Radio (CR) is considered as an effective technology for alleviating the spectrum shortage problem by enabling secondary users to utilize vacant spectrum allocated to a primary user (PU). IEEE 802.22 which is the first standard based on CR is developed to increase the efficiency of TV bands. However the physical layer security of IEEE 802.22 has(More)
This paper reviews target localization methods in wireless sensor networks. Target localization methods have been investigated extensively due to their wide applications. Main target localization methods include time delay of arrival methods, direction of arrival methods, energy-based target localization methods, radio mapping methods and so on. In this(More)
Intrusion detection in a wireless sensor network (WSN) has drawn intensive attentions recently due to its wide applications. Many issues in intrusion detection, such as sensor deployment, mobility of sensors and data fusion have been investigated extensively. However, the behavior of the intruder has rarely been investigated. In this paper, we introduce a(More)