Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fei Richard Yu is active.

Publication


Featured researches published by Fei Richard Yu.


IEEE Wireless Communications | 2004

A new method to support UMTS/WLAN vertical handover using SCTP

Li Ma; Fei Richard Yu; Victor C. M. Leung; Tejinder S. Randhawa

This article proposes a new method to facilitate seamless vertical handover between wide area cellular data networks such as UMTS and WLANs using the stream control transmission protocol (SCTP). The multihoming capability and dynamic address configuration extension of SCTP are applied in UMTS/WLAN overlay architecture to decrease handover delay and improve throughput performance. Unlike techniques based on mobile IP or session initiation protocol, the SCTP-based vertical handover scheme does not require the addition of components such as home/foreign agents or a SIP server to existing networks. Therefore, the proposed scheme provides a network-independent solution preferred by service providers. Performance evaluations are presented to demonstrate the effectiveness of the proposed scheme.


Proceedings of the IEEE | 2012

A Survey of Security Challenges in Cognitive Radio Networks: Solutions and Future Research Directions

Alireza Attar; Helen Tang; Athanasios V. Vasilakos; Fei Richard Yu; Victor C. M. Leung

In this survey, we present a comprehensive list of major known security threats within a cognitive radio network (CRN) framework. We classify attack techniques based on the type of attacker, namely exogenous (external) attackers, intruding malicious nodes and greedy cognitive radios (CRs). We further discuss threats related to infrastructure-based CRNs as well as infrastructure-less networks. Besides the short-term effects of attacks over CRN performance, we also discuss the often ignored longer term behavioral changes that are enforced by such attacks via the learning capability of CRN. After elaborating on various attack strategies, we discuss potential solutions to combat those attacks. An overview of robust CR communications is also presented. We finally elaborate on future research directions pertinent to CRN security. We hope this survey paper can provide the insight and the roadmap for future research efforts in the emerging field of CRN security.


IEEE Transactions on Vehicular Technology | 2010

A Distributed Consensus-Based Cooperative Spectrum-Sensing Scheme in Cognitive Radios

Zhiqiang Li; Fei Richard Yu; Minyi Huang

In cognitive radio (CR) networks, secondary users can cooperatively sense the spectrum to detect the presence of primary users. In this paper, we propose a fully distributed and scalable cooperative spectrum-sensing scheme based on recent advances in consensus algorithms. In the proposed scheme, the secondary users can maintain coordination based on only local information exchange without a centralized common receiver. Unlike most of the existing decision rules, such as the or-rule or the 1-out-of-N rule, we use the consensus of secondary users to make the final decision. Simulation results show that the proposed consensus scheme can have significant lower missing detection probabilities and false alarm probabilities in CR networks. It is also demonstrated that the proposed scheme not only has proven sensitivity in detecting the primary users presence but also has robustness in choosing a desirable decision threshold.


IEEE Transactions on Wireless Communications | 2012

Energy-Efficient Resource Allocation for Heterogeneous Cognitive Radio Networks with Femtocells

Renchao Xie; Fei Richard Yu; Hong Ji; Yi Li

Both cognitive radio and femtocell have been considered as promising techniques in wireless networks. However, most of previous works are focused on spectrum sharing and interference avoidance, and the energy efficiency aspect is largely ignored. In this paper, we study the energy efficiency aspect of spectrum sharing and power allocation in heterogeneous cognitive radio networks with femtocells. To fully exploit the cognitive capability, we consider a wireless network architecture in which both the macrocell and the femtocell have the cognitive capability. We formulate the energy-efficient resource allocation problem in heterogeneous cognitive radio networks with femtocells as a Stackelberg game. A gradient based iteration algorithm is proposed to obtain the Stackelberg equilibrium solution to the energy-efficient resource allocation problem. Simulation results are presented to demonstrate the Stackelberg equilibrium is obtained by the proposed iteration algorithm and energy efficiency can be improved significantly in the proposed scheme.


Computer Networks | 2002

Mobility-based predictive call admission control and bandwidth reservation in wireless cellular networks

Fei Richard Yu; Victor C. M. Leung

This paper presents call admission control and bandwidth reservation schemes in wireless cellular networks that have been developed based on assumptions more realistic than existing proposals. In order to guarantee the handoff dropping probability, we propose to statistically predict user mobility based on the mobility history of users. Our mobility prediction scheme is motivated by computational learning theory, which has shown that prediction is synonymous with data compression. We derive our mobility prediction scheme from data compression techniques that are both theoretically optimal and good in practice. In order to utilize resource more efficiently, we predict not only the cell to which the mobile will handoff but also when the handoff will occur. Based on the mobility prediction, bandwidth is reserved to guarantee some target handoff dropping probability. We also adaptively control the admission threshold to achieve a better balance between guaranteeing handoff dropping probability and maximizing resource utilization. Simulation results show that the proposed schemes meet our design goals and outperform the static-reservation and cell-reservation schemes.


IEEE Network | 2011

Communication systems for grid integration of renewable energy resources

Fei Richard Yu; Peng Zhang; Weidong Xiao; Paul Choudhury

There is growing interest in renewable energy around the world. Since most renewable sources are intermittent in nature, it is a challenging task to integrate renewable energy resources into the power grid infrastructure. In this grid integration, communication systems are crucial technologies, which enable the accommodation of distributed renewable energy generation and play an extremely important role in monitoring, operating, and protecting both renewable energy generators and power systems. In this article, we review some communication technologies available for grid integration of renewable energy resources. Then we present the communication systems used in a real renewable energy project, Bear Mountain Wind Farm in British Columbia, Canada. In addition, we present the communication systems used in photovoltaic power systems. Finally, we outline some research challenges and possible solutions about the communication systems for grid integration of renewable energy resources.


IEEE Transactions on Vehicular Technology | 2010

Prediction-Based Topology Control and Routing in Cognitive Radio Mobile Ad Hoc Networks

Quansheng Guan; Fei Richard Yu; Shengming Jiang; Gang Wei

Cognitive radio (CR) technology will have significant impacts on upper layer performance in mobile ad hoc networks (MANETs). In this paper, we study topology control and routing in CR-MANETs. We propose a distributed Prediction-based Cognitive Topology Control (PCTC) scheme to provision cognition capability to routing in CR-MANETs. PCTC is a midware-like cross-layer module residing between CR module and routing. The proposed PCTC scheme uses cognitive link availability prediction, which is aware of the interference to primary users, to predict the available duration of links in CR-MANETs. Based on the link prediction, PCTC constructs an efficient and reliable topology, which is aimed at mitigating re-routing frequency and improving end-to-end network performance such as throughput and delay. Simulation results are presented to show the effectiveness of the proposed scheme.


international conference on communications | 2009

A FCM-Based Peer Grouping Scheme for Node Failure Recovery in Wireless P2P File Sharing

Xinpeng Li; Hong Ji; Fei Richard Yu; R. Zheng

An effective node failure recovery scheme is very important in wireless peer-to-peer (P2P) file sharing networks. Most of the existing failure recovery protocols are based on backup path mechanism, in which a new path will be used if the original one breaks. However, due to the limited resources in wireless environments, the maintenance of backup paths is expensive. Moreover, the time spending on path switch may be unacceptable long. In this paper, we propose a novel peer grouping scheme to select a qualified peer from a group to replace the failed node. The main criteria in deciding the backup node is derived with the help of recent advances in fuzzy cognitive maps (FCM). Several influential factors are considered, including energy, movement, lingering time and security, with further investigation on their respective contributions to node failure risk. We compare the performance of the proposed scheme with that of traditional path redirection and multi-path backup algorithms. The FCM-based peer grouping scheme has significant improvement in failure recovery time and file transfer time.


IEEE Transactions on Wireless Communications | 2009

Optimal combined intrusion detection and biometric-based continuous authentication in high security mobile ad hoc networks

Jie Liu; Fei Richard Yu; Chung-Horng Lung; Helen Tang

Two complementary classes of approaches exist to protect high security mobile ad hoc networks (MANETs), prevention-based approaches, such as authentication, and detection-based approaches, such as intrusion detection. Most previous work studies these two classes of issues separately. In this paper, we propose a framework of combining intrusion detection and continuous authentication in MANETs. In this framework, multimodal biometrics are used for continuous authentication, and intrusion detection is modeled as sensors to detect system security state. We formulate the whole system as a partially observed Markov decision process considering both system security requirements and resource constraints. We then use dynamic programming-based hidden Markov model scheduling algorithms to derive the optimal schemes for both intrusion detection and continuous authentication. Extensive simulations show the effectiveness of the proposed scheme.


IEEE Journal on Selected Areas in Communications | 2012

Cross-Layer Handoff Design in MIMO-Enabled WLANs for Communication-Based Train Control (CBTC) Systems

Li Zhu; Fei Richard Yu; Bin Ning; Tao Tang

Communication-Based Train Control (CBTC) system is an automated train control system using bidirectional train-ground communications to ensure the safe operation of rail vehicles. Handoff design has significant impacts on the train control performance in CBTC systems based on multi-input and multi-output (MIMO)-enabled WLANs. Most of previous works use traditional design criteria, such as network capacity and communication latency, in handoff designs. However, these designs do not necessarily benefit the train control performance. In this paper, we take an integrated design approach to jointly optimize handoff decisions and physical layer parameters to improve the train control performance in CBTC systems. We use linear quadratic cost for the train controller as the performance measure. The handoff decision and physical layer parameters adaptation problem is formulated as a stochastic control process. Simulation result shows that the proposed approach can significantly improve the control performance in CBTC systems.

Collaboration


Dive into the Fei Richard Yu's collaboration.

Top Co-Authors

Avatar

Victor C. M. Leung

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Tao Tang

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Li Zhu

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hong Ji

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Helen Tang

Defence Research and Development Canada

View shared research outputs
Top Co-Authors

Avatar

Bin Ning

Beijing Jiaotong University

View shared research outputs
Top Co-Authors

Avatar

Pengbo Si

Beijing University of Technology

View shared research outputs
Top Co-Authors

Avatar

Li Ma

University of British Columbia

View shared research outputs
Top Co-Authors

Avatar

Vincent W. S. Wong

University of British Columbia

View shared research outputs
Researchain Logo
Decentralizing Knowledge