Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jianxia Ning is active.

Publication


Featured researches published by Jianxia Ning.


International Journal of Vehicular Technology | 2012

A Comprehensive Evaluation of RPL under Mobility

Kevin C. Lee; Raghuram S. Sudhaakar; Jianxia Ning; Lillian Lei Dai; Sateesh Addepalli; J. P. Vasseur; Mario Gerla

This paper focuses on routing for vehicles getting access to infrastructure either directly or via multiple hops through other vehicles. We study routing protocol for low-power and lossy networks (RPL), a tree-based routing protocol designed for sensor networks. Many design elements from RPL are transferable to the vehicular environment. We provide a simulation performance study of RPL and RPL tuning in VANETs. More specifically, we seek to study the impact of RPLs various parameters and external factors (e.g., various timers and speeds) on its performance and obtain insights on RPL tuning for its use in VANETs. We then fine tune RPL and obtain performance gain over existing RPL.


mobile adhoc and sensor systems | 2012

VICO: A framework for configuring indoor visible light communication networks

Yiyang Li; Leijie Wang; Jianxia Ning; Konstantinos Pelechrinis; Srikanth V. Krishnamurthy; Zhengyuan Xu

Visible light communications (VLC) are gaining popularity and may provide an alternative means of communications in indoor settings. However, to date, there is very little research on the deployment or higher layer protocol design for VLC. In this paper, we first perform channel measurements using a physical layer testbed in the visible light band to understand its physical layer characteristics. Our measurements suggest that in order to increase data rates with VLC (1) the beam width of a communicating link can be shrunk, and (2) the transmission beam can be tuned to point towards the target recipient. We then perform Matlab simulations to verify that the human eye is able to accommodate the changes brought by shrinking a beam or by tuning the beam direction appropriately. As our main contribution, we then design a configuration framework for a VLC indoor local area network, which we call VICO; we leverage the above features towards achieving the highest throughput while maintaining fairness. VICO first tunes the beamwidths and pointing angles of the transmitters to configurations that provide the highest throughput for each client. It then tries to schedule transmissions while accounting for conflicts and the VLC PHY characteristics. Finally, it opportunistically tunes the idle LEDs to reinforce existing transmissions to increase throughput to the extent possible. We perform extensive simulations to demonstrate the effectiveness of VICO. We find that VICO provides as much as 5-fold increase in throughput compared to a simple scheduler that does not exploit the possible variations in beamwidth or beam-angle.


IEEE ACM Transactions on Networking | 2013

Topology control for effective interference cancellation in multiuser MIMO networks

Ece Gelal; Jianxia Ning; Konstantinos Pelechrinis; Tae-Suk Kim; Ioannis Broustis; Srikanth V. Krishnamurthy; Bhaskar D. Rao

In multiuser multiple-input-multiple-output (MIMO) networks, receivers decode multiple concurrent signals using successive interference cancellation (SIC). With SIC, a weak target signal can be deciphered in the presence of stronger interfering signals. However, this is only feasible if each strong interfering signal satisfies a signal-to-noise-plus-interference ratio (SINR) requirement. This necessitates the appropriate selection of a subset of links that can be concurrently active in each receivers neighborhood; in other words, a subtopology consisting of links that can be simultaneously active in the network is to be formed. If the selected subtopologies are of small size, the delay between the transmission opportunities on a link increases. Thus, care should be taken to form a limited number of subtopologies. We find that the problem of constructing the minimum number of subtopologies such that SIC decoding is successful with a desired probability threshold is NP-hard. Given this, we propose MUSIC, a framework that greedily forms and activates subtopologies in a way that favors successful SIC decoding with a high probability. MUSIC also ensures that the number of selected subtopologies is kept small. We provide both a centralized and a distributed version of our framework. We prove that our centralized version approximates the optimal solution for the considered problem. We also perform extensive simulations to demonstrate that: 1) MUSIC forms a small number of subtopologies that enable efficient SIC operations; the number of subtopologies formed is at most 17% larger than the optimum number of topologies, discovered through exhaustive search (in small networks); 2) MUSIC outperforms approaches that simply consider the number of antennas as a measure for determining the links that can be simultaneously active. Specifically, MUSIC provides throughput improvements of up to four times, as compared to such an approach, in various topological settings. The improvements can be directly attributable to a significantly higher probability of correct SIC based decoding with MUSIC.


Performance Evaluation | 2011

Directional neighbor discovery in 60 GHz indoor wireless networks

Jianxia Ning; Tae-Suk Kim; Srikanth V. Krishnamurthy; Carlos Cordeiro

Signal propagation in the 60 GHz band significantly differs from that in the 2.4 and 5 GHz bands. In particular, the signals are often reflected in indoor settings in this band. Directional antennas can help limit the impact of reflection, but make the process of neighbor discovery complex. We consider this problem in this paper. We examine two approaches (a) direct discovery where each node explicitly discovers its neighbors, and (b) gossip-based discovery where nodes exchange information about their already discovered neighbors. We analyze the two approaches and validate our models via simulations. We examine the impact of system parameters such as varying beamwidth and node density.


sensor mesh and ad hoc communications and networks | 2011

Coping with packet replay attacks in wireless networks

Zi Feng; Jianxia Ning; Ioannis Broustis; Konstantinos Pelechrinis; Srikanth V. Krishnamurthy; Michalis Faloutsos

In this paper, we consider a variant of packet replay attacks wherein, an attacker simply replays overheard frames as they are, or with minor manipulations in the packet header; we refer to this as the copycat attack. When routers forward such replayed packets, the levels of congestion and interference increase in large portions of the network. Our experiments indicate that even a single attacker can degrade the route throughput by up to 61%. While simple to use techniques such as digitally signing every packet can stem the dissemination of such packets, they are resource intense. Thus, we design a lightweight detection and prevention system, COPS (for Copycat Online Prevention System), that intelligently uses a combination of digital signatures and Bloom filters to cope with the attack. With our system, the task of identifying and discarding replayed packets is distributed across a plurality of nodes on a route. We implement COPS on real hardware and perform experiments on our 42 node wireless testbed. Our measurements indicate that COPS achieves its objective; it can efficiently contain the effects of replayed packets to a local neighborhood without incurring high resource consumption penalties. Specifically, we show that COPS reduces the route throughput degradation by up to 66%.


IEEE ACM Transactions on Networking | 2016

Forensic Analysis of Packet Losses in Wireless Networks

Jianxia Ning; Shailendra Singh; Konstantinos Pelechrinis; Bin Liu; Srikanth V. Krishnamurthy; Ramesh Govindan

Due to the lossy nature of wireless links, it is difficult to determine if packet losses are due to wireless-induced effects or from malicious discarding. Many prior efforts on detecting malicious packet drops rely on evidence collected via passive monitoring by neighbor nodes. However, they do not analyze the cause of packet losses. In this paper, we ask: 1) Given certain macroscopic parameters of the network (like traffic intensity and node density) what is the likelihood that evidence exists with respect to a transmission? 2) How can these parameters be used to perform a forensic analysis of the reason for the losses? Toward answering the above questions, we first build an analytical framework that computes the likelihood that evidence (we call this transmission evidence, or TE for short) exists with respect to transmissions, in terms of a set of network parameters. We validate our analytical framework via both simulations as well as real-world experiments on two different wireless testbeds. The analytical framework is then used as a basis for a protocol within a forensic analyzer to assess the cause of packet losses and determine the likelihood of forwarding misbehaviors. Through simulations, we find that our assessments are close to the ground truth in all examined cases, with an average deviation of 2.3% from the ground truth and a worst case deviation of 15.0%.


international conference on computer communications and networks | 2012

Network Coding Aware Queue Management in Multi-Rate Wireless Networks

Nicola De Coppi; Jianxia Ning; George Papageorgiou; Michele Zorzi; Srikanth V. Krishnamurthy; Thomas F. La Porta

While network coding can potentially provide significant throughput benefits by combining packets prior to forwarding them, the achievable gains are directly related to the coding opportunities at a relay that performs encoding. If the relay does not have packets destined for distinct destinations, that can be encoded together, the network coding gains could be marginal. Towards increasing the opportunities for network coding, in this paper we propose a queue management scheme, that arbitrates the rate at which distinct transmitters send packets to a common relay which applies network coding. Our queue management approach prioritizes the channel access of nodes that do not have enough enqueued packets at the common relay, thereby essentially attempting to balance the number of packets from the distinct senders at the relay. We perform extensive simulations of our approach (built as a wrapper on top of the popular network coding approach COPE) in multi-rate scenarios. We find that our approach yields throughput gains of up to 57% compared to COPE due to enhanced opportunities towards encoding packets.


international conference on network protocols | 2010

UVOC-MAC: A MAC protocol for outdoor ultraviolet networks

Yiyang Li; Jianxia Ning; Zhengyuan Xu; Srikanth V. Krishnamurthy; Gang Chen

As an alternative to radio-frequency (RF) communications, optical wireless communications (OWC) can support high data rates and low power operations while providing good jamming resistance. Our focus in this paper is on deep ultraviolet (UV) outdoor communications (UVOC) where solar blind and non-line-of-sight operations are attractive. Light beams from UV LED arrays serve as information carriers. In an abstract sense, this is similar to directional transmissions in RF; however, the PHY layer characteristics significantly differ due to atmospheric scattering. First, we perform extensive experiments on a UV testbed towards understanding signal propagation and the impact of the PHY on medium access. We find that UV propagation supports (a) fully duplex communications and (b) multiple data rate transmissions. Next, we propose a novel contention-based media access control (UVOC-MAC) protocol that inherently accounts for the UV PHY layer and fully exploits multi-fold spatial reuse opportunities. Evaluations via both simulations and analysis show that UVOC-MAC effectively mitigates collisions and achieves high throughput. In particular, up to a 4-fold increase in throughput and 50% reduction in collision are possible compared to a MAC protocol agnostic to the UV PHY properties.


communications and networking symposium | 2014

Secret message sharing using online social media

Jianxia Ning; Indrajeet Singh; Harsha V. Madhyastha; Srikanth V. Krishnamurthy; Guohong Cao; Prasant Mohapatra

Recently, there have been proposals to evade censors by using steganography to embed secret messages in images shared on public photo-sharing sites. However, establishing a covert channel in this manner is not straightforward. First, photo-sharing sites often process uploaded images, thus destroying any embedded message. Second, prior work assumes the existence of an out-of-band channel, using which the communicating users can exchange metadata or secret keys a priori; establishing such out-of-band channels, not monitored by censors, is difficult. In this paper, we address these issues to facilitate private communications on photo-sharing sites. In doing so, first, we conduct an in-depth measurement study of the feasibility of hiding data on four popular photo-sharing sites. Second, based on the understanding derived, we propose a novel approach for embedding secret messages in uploaded photos while preserving the integrity of such messages. We demonstrate that, despite the processing on photo-sharing sites, our approach ensures reliable covert communication, without increasing the likelihood of being detected via steganalysis. Lastly, we design and implement a scheme for bootstrapping private communications without an out-of-band channel, i.e., by exchanging keys via uploaded images.


international conference on network protocols | 2012

Forensic analysis of packet losses in wireless networks

Jianxia Ning; Shailendra Singh; Konstantinos Pelechrinis; Bin Liu; Srikanth V. Krishnamurthy; Ramesh Govindan

Due to the lossy nature of wireless links, it is difficult to determine if packet losses are due to wireless-induced effects or from malicious discarding. Many prior efforts on detecting malicious packet drops rely on evidence collected via passive monitoring by neighbor nodes; however, they do not analyze the cause of packet losses. In this paper, we ask: (a) Given certain macroscopic parameters of the network (like traffic intensity and node density) what is the likelihood that evidence exists with respect to a transmission? and, (b) How can these parameters be used to perform a forensic analysis of the reason for the losses? Towards answering the above questions, we first build an analytical framework that computes the likelihood that evidence (we call this transmission evidence or TE for short) exists with respect to transmissions, in terms of a set of network parameters. We validate our analytical framework via both simulations as well as real-world experiments on two different wireless testbeds. The analytical framework is then used as a basis for a protocol within a forensic analyzer to assess the cause of packet losses and determine the likelihood of forwarding misbehaviors. Through simulations, we find that our assessments are close to the ground truth in all examined cases, with an average deviation of 2.3% from the ground truth and a worst case deviation of 15.0%.

Collaboration


Dive into the Jianxia Ning's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ramesh Govindan

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Yiyang Li

University of California

View shared research outputs
Top Co-Authors

Avatar

Zhengyuan Xu

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Bin Liu

University of Southern California

View shared research outputs
Top Co-Authors

Avatar

Gang Chen

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Tae-Suk Kim

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge