Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hsiao-Hwa Chen is active.

Publication


Featured researches published by Hsiao-Hwa Chen.


IEEE Wireless Communications | 2011

Physical layer security in wireless networks: a tutorial

Yi-Sheng Shiu; Shih Yu Chang; Hsiao-Chun Wu; Scott C.-H. Huang; Hsiao-Hwa Chen

Wireless networking plays an extremely important role in civil and military applications. However, security of information transfer via wireless networks remains a challenging issue. It is critical to ensure that confidential data are accessible only to the intended users rather than intruders. Jamming and eavesdropping are two primary attacks at the physical layer of a wireless network. This article offers a tutorial on several prevalent methods to enhance security at the physical layer in wireless networks. We classify these methods based on their characteristic features into five categories, each of which is discussed in terms of two metrics. First, we compare their secret channel capacities, and then we show their computational complexities in exhaustive key search. Finally, we illustrate their security requirements via some examples with respect to these two metrics.


IEEE Wireless Communications | 2008

IEEE 802.11n MAC frame aggregation mechanisms for next-generation high-throughput WLANs

Dionysios Skordoulis; Qiang Ni; Hsiao-Hwa Chen; Adrian P. Stephens; Changwen Liu; Abbas Jamalipour

IEEE 802.11n is an ongoing next-generation wireless LAN standard that supports a very highspeed connection with more than 100 Mb/s data throughput measured at the medium access control layer. This article investigates the key MAC enhancements that help 802.11n achieve high throughput and high efficiency. A detailed description is given for various frame aggregation mechanisms proposed in the latest 802.11n draft standard. Our simulation results confirm that A-MSDU, A-MPDU, and a combination of these methods improve extensively the channel efficiency and data throughput. We analyze the performance of each frame aggregation scheme in distinct scenarios, and we conclude that overall, the two-level aggregation is the most efficacious.


IEEE Transactions on Wireless Communications | 2008

On cognitive radio networks with opportunistic power control strategies in fading channels

Yan Chen; Guanding Yu; Zhaoyang Zhang; Hsiao-Hwa Chen; Peiliang Qiu

In this paper, we consider a cognitive radio system in fading wireless channels and propose an opportunistic power control strategy for the cognitive users, which serves as an alternative way to protect the primary users transmission and to realize spectrum sharing between the primary user and the cognitive users. The key feature of the proposed strategy is that, via opportunistically adapting its transmit power, the cognitive user can maximize its achievable transmission rate without degrading the outage probability of the primary user. If compared with the existing cognitive protocols, which usually try to keep the instantaneous rate of the primary user unchanged, our strategy relieves the cognitive users from the burden of detecting and relaying the message of the primary user and relaxes the system synchronization requirements. The achievable rate of a cognitive user under the proposed power control strategy is analyzed and simulated, taking into account the impact of imperfect channel estimation. A modified power control strategy is also proposed to reduce the sensitivity of our strategy to the estimation errors. Its effectiveness is verified by the simulations.


IEEE Communications Magazine | 2001

A multicarrier CDMA architecture based on orthogonal complementary codes for new generations of wideband wireless communications

Hsiao-Hwa Chen; Jun-Feng Yeh; N. Suehiro

This article is a review of our ongoing research effort to construct a new multicarrier CDMA architecture based on orthogonal complete complementary codes, characterized by its innovative spreading modulation scheme, uplink and downlink signaling design, and digital receiver implementation for multipath signal detection. There are several advantages of the proposed CDMA architecture compared to conventional CDMA systems pertinent to current 2G and 3G standards. First of all, it can achieve a spreading efficiency (SE) very close to one (the SE is defined as the amount of information bit(s) conveyed by each chip); whereas SEs of conventional CDMA systems equal 1/N, where N denotes the length of spreading codes. Second, it offers MAI-free operation in both upand downlink transmissions in an MAI-AWGN channel, which can significantly reduce the co-channel interference responsible for capacity decline of a CDMA system. Third, the proposed CDMA architecture is able to offer a high bandwidth efficiency due to the use of its unique spreading modulation scheme and orthogonal carriers. Lastly, the proposed CDMA architecture is particularly suited to multirate signal transmission due to the use of an offset stacked spreading modulation scheme, which simplifies the rate-matching algorithm relevant to multimedia services and facilitates asymmetric traffic in up- and downlink transmissions for IP-based applications. Based on the above characteristics and the obtained results, it is concluded that the proposed CDMA architecture has a great potential for applications in future wideband mobile communications beyond 3G, which is expected to offer a very high data rate in hostile mobile channels.


ad hoc networks | 2007

An effective key management scheme for heterogeneous sensor networks

Xiaojiang Du; Yang Xiao; Mohsen Guizani; Hsiao-Hwa Chen

Abstract Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor networks suffer from high communication overhead, computation overhead, and/or high storage requirement. Recently deployed sensor network systems are increasingly following heterogeneous designs. Key management is an essential cryptographic primitive to provide other security operations. In this paper, we present an effective key management scheme that takes advantage of the powerful high-end sensors in heterogeneous sensor networks. The performance evaluation and security analysis show that the key management scheme provides better security with low complexity and significant reduction on storage requirement, compared with existing key management schemes.


systems man and cybernetics | 2010

Spectrum Sharing in Cognitive Radio Networks—An Auction-Based Approach

Xinbing Wang; Zheng Li; Pengchao Xu; Youyun Xu; Xinbo Gao; Hsiao-Hwa Chen

Cognitive radio is emerging as a promising technique to improve the utilization of the radio frequency spectrum. In this paper, we consider the problem of spectrum sharing among primary (or ¿licensed¿) users (PUs) and secondary (or ¿unlicensed¿) users (SUs). We formulate the problem based on bandwidth auction, in which each SU makes a bid for the amount of spectrum and each PU may assign the spectrum among the SUs by itself according to the information from the SUs without degrading its own performance. We show that the auction is a noncooperative game and that Nash equilibrium (NE) can be its solution. We first consider a single-PU network to investigate the existence and uniqueness of the NE and further discuss the fairness among the SUs under given conditions. Then, we present a dynamic updating algorithm in which each SU achieves NE in a distributed manner. The stability condition of the dynamic behavior for this spectrum-sharing scheme is studied. The discussion is generalized to the case in which there are multiple PUs in the network, where the properties of the NE are shown under appropriate conditions. Simulations were used to evaluate the system performance and verify the effectiveness of the proposed algorithm.


IEEE Communications Magazine | 2008

On effective offloading services for resource-constrained mobile devices running heavier mobile Internet applications

Kun Yang; Shumao Ou; Hsiao-Hwa Chen

Rapid advances in wireless mobile network technologies and mobile handsets (MHs) facilitate ubiquitous infrastructure that can support a range of mobile services and applications in addition to conventional mobile Internet access. One recent trend is to effectively run desktop PC-oriented heavier applications on MHs. However, due to their miniature, portable size, MHs are resource-constrained and therefore, running these applications directly on an MH is not satisfactory given a users expectations. To cope with this problem, this article proposes a novel offloading service that can seamlessly offload some of the tasks of a mobile application from an MH to nearby, resource-rich PCs (called surrogates). The system architecture and key components of the proposed offloading service are presented, prototyped, and evaluated. The results of experiments and simulations have demonstrated the effectiveness and efficiency of this offloading service for mobile applications.


IEEE Transactions on Vehicular Technology | 2013

Intracluster Device-to-Device Relay Algorithm With Optimal Resource Utilization

Bin Zhou; Honglin Hu; Sheng-Qiang Huang; Hsiao-Hwa Chen

Device-to-device (D2D) communications help improve the performance of wireless multicast services in cellular networks via cooperative retransmissions among multicast recipients within a cluster. Resource utilization efficiency should be taken into account in the design of D2D communication systems. To maximize resource efficiency of D2D retransmissions, there is a tradeoff between multichannel diversity and multicast gain. In this paper, by analyzing the relationship between the number of relays and minimal time-frequency resource cost on retransmissions, we derive a closed-form probability density function (pdf) for an optimal number of D2D relays. Motivated by the analysis, we then propose an intracluster D2D retransmission scheme with optimized resource utilization, which can adaptively select the number of cooperative relays performing multicast retransmissions and give an iterative subcluster partition algorithm to enhance retransmission throughput. Exploiting both multichannel diversity and multicast gain, the proposed scheme achieves a significant gain in terms of resource utilization if compared with its counterparts with a fixed number of relays.


IEEE Transactions on Smart Grid | 2013

Smart Grid Communication: Its Challenges and Opportunities

Ruofei Ma; Hsiao-Hwa Chen; Yu-Ren Huang; Weixiao Meng

The necessity to promote smart grid (SG) has been recognized with a strong consensus. The SG integrates electrical grids and communication infrastructures and forms an intelligent electricity network working with all connected components to deliver sustainable electricity supplies. Many advanced communication technologies have been identified for SG applications with a potential to significantly enhance the overall efficiency of power grids. In this paper, the challenges and applications of communication technologies in SG are discussed. In particular, we identify three major challenges to implement SG communication systems, including standards interoperability, cognitive access to unlicensed radio spectra, and cyber security. The issues to implement SG communications on an evolutional path and its future trends are also addressed. The aim of this paper is to offer a comprehensive review of state-of-the-art researches on SG communications.


IEEE Wireless Communications | 2008

Security in wireless sensor networks

Xiaojiang Du; Hsiao-Hwa Chen

Recent advances in electronics and wireless communication technologies have enabled the development of large-scale wireless sensor networks that consist of many low-power, low-cost, and small-size sensor nodes. Sensor networks hold the promise of facilitating large-scale and real-time data processing in complex environments. Security is critical for many sensor network applications, such as military target tracking and security monitoring. To provide security and privacy to small sensor nodes is challenging, due to the limited capabilities of sensor nodes in terms of computation, communication, memory/storage, and energy supply. In this article we survey the state of the art in research on sensor network security.

Collaboration


Dive into the Hsiao-Hwa Chen's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hamid Sharif

University of Nebraska–Lincoln

View shared research outputs
Top Co-Authors

Avatar

Yang Xiao

University of Alabama

View shared research outputs
Top Co-Authors

Avatar

Weixiao Meng

Harbin Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Honglin Hu

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Dongming Peng

University of Nebraska–Lincoln

View shared research outputs
Top Co-Authors

Avatar

Wei Wang

San Diego State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Honggang Wang

University of Massachusetts Dartmouth

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge