Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Frank Y. Li is active.

Publication


Featured researches published by Frank Y. Li.


IEEE Transactions on Vehicular Technology | 2012

Modeling and Performance Analysis of Channel Assembling in Multichannel Cognitive Radio Networks With Spectrum Adaptation

Lei Jiao; Frank Y. Li; Vicent Pla

To accommodate spectrum access in multichannel cognitive radio networks (CRNs), the channel-assembling technique, which combines several channels together as one channel, has been proposed in many medium access control (MAC) protocols. However, analytical models for CRNs enabled with this technique have not been thoroughly investigated. In this paper, two representative channel-assembling strategies that consider spectrum adaptation and heterogeneous traffic are proposed, and the performance of these strategies is evaluated based on the proposed continuous-time Markov chain (CTMC) models. Moreover, approximations of these models in the quasistationary regime are analyzed, and closed-form capacity expressions are derived in different conditions. The performance of different strategies, including the strategy without assembling, is compared with one another based on the numerical results obtained from these models and validated by extensive simulations. Furthermore, simulation studies are also performed for other types of traffic distributions to evaluate the validity and the preciseness of the mathematical models. Through both analyses and simulations, we demonstrate that channel assembling represented by the investigated strategies can improve the system performance if a proper strategy is selected with appropriate system parameter configurations.


IEEE Transactions on Wireless Communications | 2014

Channel Assembling with Priority-Based Queues in Cognitive Radio Networks: Strategies and Performance Evaluation

Indika A. M. Balapuwaduge; Lei Jiao; Vicent Pla; Frank Y. Li

With the implementation of channel assembling (CA) techniques, higher data rate can be achieved for secondary users in multi-channel cognitive radio networks. Recent studies which are based on loss systems show that maximal capacity can be achieved using dynamic CA strategies. However the channel allocation schemes suffer from high blocking and forced termination when primary users become active. In this paper, we propose to introduce queues for secondary users so that those flows that would otherwise be blocked or forcibly terminated could be buffered and possibly served later. More specifically, in a multi-channel network with heterogeneous traffic, two queues are separately allocated to real-time and elastic users and channel access opportunities are distributed between these two queues in a way that real-time services receive higher priority. Two queuing schemes are introduced based on the delay tolerance of interrupted elastic services. Furthermore, continuous time Markov chain models are developed to evaluate the performance of the proposed CA strategy with queues, and the correctness as well as the preciseness of the derived theoretical models are verified through extensive simulations. Numerical results demonstrate that the integration of queues can further increase the capacity of the secondary network and spectrum utilization while decreasing blocking probability and forced termination probability.


IEEE Transactions on Mobile Computing | 2014

A Novel Approach to Trust Management in Unattended Wireless Sensor Networks

Yi Ren; Vladimir Zadorozhny; Vladimir A. Oleshchuk; Frank Y. Li

Unattended Wireless Sensor Networks (UWSNs) are characterized by long periods of disconnected operation and fixed or irregular intervals between sink visits. The absence of an online trusted third party implies that existing WSN trust management schemes are not applicable to UWSNs. In this paper, we propose a trust management scheme for UWSNs to provide efficient and robust trust data storage and trust generation. For trust data storage, we employ a geographic hash table to identify storage nodes and to significantly decrease storage cost. We use subjective logic based consensus techniques to mitigate trust fluctuations caused by environmental factors. We exploit a set of trust similarity functions to detect trust outliers and to sustain trust pollution attacks. We demonstrate, through extensive analyses and simulations, that the proposed scheme is efficient, robust and scalable.


international symposium on wireless communication systems | 2008

Link adaptation with combined optimal frame size and rate selection in error-prone 802.11n networks

Xin He; Frank Y. Li; Jiaru Lin

In error-prone channel with low SNRs, the network throughput may drop significantly if the packet length becomes too large. On the other hand, too much protocol overhead will be introduced if the packet length is too small. In this paper, we study this tradeoff and propose an adaptive frame size algorithm for A-MPDU in 802.11n networks, which can maximize the throughput by selecting the optimized frame length under different channel conditions. When used together with rate selection, the network throughput can be further improved. Both analytical model and simulation results are presented, demonstrating that our algorithm outperforms the fixed length transmission scheme in 802.11n networks under poor channel conditions.


global communications conference | 2011

Dynamic Channel Aggregation Strategies in Cognitive Radio Networks with Spectrum Adaptation

Lei Jiao; Frank Y. Li; Vicent Pla

In cognitive radio networks, channel aggregation techniques which combine several channels together as one channel have been proposed in many MAC protocols. In this paper, spectrum adaptation is proposed in channel aggregation and two strategies which dynamically adjust channel occupancy of ongoing traffic flows are further developed. The performance of these strategies is evaluated using continuous time Markov chain models. Moreover, models in the quasi-stationary regime are analyzed and the closed-form capacity expression is derived in this regime. Numerical results demonstrate that the capacity of the secondary network can be improved by using channel aggregation with spectrum adaptation.


Computer Communications | 2013

Optimized secure and reliable distributed data storage scheme and performance evaluation in unattended WSNs

Yi Ren; Vladimir A. Oleshchuk; Frank Y. Li

Unattended Wireless Sensor Networks (UWSNs), characterized by the absence of real-time communication between sensors and sinks, impose sensors to retain data till the next visit of a mobile sink to off-load their data. In such networks, if a sensor is compromised, data accumulated in the sensor are exposed to attackers. In addition, by holding the secret key of the compromised sensor, attackers can also learn post-compromise data accumulated by the sensor. Furthermore, once sensors stop working due to, for instance, node crash or battery depletion, all the accumulated data will be lost. In this paper, we propose a secure and reliable data distribution scheme that addresses these challenges. Detailed analysis shows that our scheme can provide forward secrecy, probabilistic backward secrecy and data reliability. To further improve probabilistic backward secrecy and data reliability, a constrained optimization data distribution scheme is also proposed. Detailed analysis and simulation results show the superiority of the proposed scheme in comparison with several existing schemes developed for UWSNs.


Journal of Communications | 2011

Security in Mobile Wireless Sensor Networks – A Survey

Yi Ren; Vladimir A. Oleshchuk; Frank Y. Li; Xiaohu Ge

Thanks to recent advances in robotics, sensors and wireless communications, it is feasible to develop a variety of new architectures for Mobile Wireless Sensor Networks (MWSNs) that play an important role in various applications such as battlefield surveillance, harbor monitoring, etc. However, due to the dynamic of mobile network topology in MWSNs, many new security challenges have emerged. In this article, we give a survey on the state of the art technologies in security aspects of MWSNs. We review existing work that provides security in MWSNs, with an emphasis on data survival, forward secrecy, backward secrecy, authentication, and methods for sensor capture detection. Furthermore, in order to stimulate the exploration of new research areas, we point out a few open research topics that can be further pursued, and also shed light on these topics.


local computer networks | 2009

A Single radio based channel datarate-aware parallel rendezvous MAC protocol for cognitive radio networks

Lei Jiao; Frank Y. Li

Channel hopping based parallel rendezvous multichannel MAC protocols have several advantages since they do not need a control channel, require only one transceiver, and produce higher system capacity. However, channel hopping sequences in existing parallel rendezvous MAC protocols have been designed as irrelevant to channel datarates, leading to under-utilization of channel resources in multi-rate multi-channel networks. Considering that datarates among channels may be different, we propose a dynamic parallel rendezvous multichannel MAC protocol for synchronized cognitive radio networks in which the secondary users adjust their own distinct hopping sequences according to the datarates of the available channels, in a datarate-aware manner. A Markov chain based model has been developed to analyze the aggregate datarate of the proposed protocol. Numerical results show that the proposed method can improve the aggregate datarate significantly, compared with that of the existing parallel rendezvous MAC protocol.


global communications conference | 2010

A Scheme for Secure and Reliable Distributed Data Storage in Unattended WSNs

Yi Ren; Vladimir A. Oleshchuk; Frank Y. Li

Unattended Wireless Sensor Networks (UWSNs) operated in hostile environments face a risk on data security due to the absence of real-time communication between sensors and sinks, which imposes sensors to accumulate data till the next visit of a mobile sink to off-load the data. Thus, how to ensure forward secrecy, backward secrecy and reliability of the accumulated data is a great challenge. For example, if a sensor is compromised, pre-compromise data accumulated in the sensor is exposed to access. In addition, by holding key secrecy of the compromised sensor, attackers also can learn post-compromise data in the sensor. Furthermore, in practical UWSNs, once sensors stop working for accidents due to node crash or battery depletion, all the data accumulated will be lost. To address the challenges, we propose a secure and reliable data distribution scheme in this paper. Detailed analysis shows that our scheme can provide forward secrecy, probabilistic backward secrecy and data reliability. To further improve probabilistic backward secrecy and data reliability, a constrained optimization data distribution scheme is proposed. Detailed analysis and simulation results show the superiority of the proposed scheme in comparison with several previous approaches developed for UWSNs.


european wireless conference | 2010

Throughput and energy efficiency comparison of one-hop, two-hop, virtual relay and cooperative retransmission schemes

Xin He; Frank Y. Li

Two main types of approaches exist for implementing cooperative communications at the MAC layer: virtual-hop relay and cooperative retransmission. While the virtual-hop relay schemes employ relay nodes to forward packets when higher end-to-end throughput can be achieved compared with the direct transmission, the cooperative retransmission schemes use relays to retransmit data only after the direct transmission fails. However, the performance of the these different approaches has not been compared in the literature, especially when energy efficiency is considered. In order to find out the best transmission scheme, this paper evaluates and compares the performance of the one-hop direct transmission, two-hop transmission, efficient multi-rate relaying, cooperative MAC and automatic cooperative retransmission schemes, in terms of throughput, packet delivery rate and energy efficiency in distributed wireless networks.

Collaboration


Dive into the Frank Y. Li's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xin He

University of Agder

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi Ren

University of Agder

View shared research outputs
Top Co-Authors

Avatar

Vicent Pla

Polytechnic University of Valencia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge