Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Richard Han is active.

Publication


Featured researches published by Richard Han.


Mobile Networks and Applications | 2005

MANTIS OS: an embedded multithreaded operating system for wireless micro sensor platforms

Shah Bhatti; James Carlson; Hui Dai; Jing Deng; Jeff Rose; Anmol Sheth; Brian Shucker; Charles Gruenwald; Adam Torgerson; Richard Han

The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded cross-platform embedded operating system for wireless sensor networks. As sensor networks accommodate increasingly complex tasks such as compression/aggregation and signal processing, preemptive multithreading in the MANTIS sensor OS (MOS) enables micro sensor nodes to natively interleave complex tasks with time-sensitive tasks, thereby mitigating the bounded buffer producer-consumer problem. To achieve memory efficiency, MOS is implemented in a lightweight RAM footprint that fits in less than 500 bytes of memory, including kernel, scheduler, and network stack. To achieve energy efficiency, the MOS power-efficient scheduler sleeps the microcontroller after all active threads have called the MOS sleep() function, reducing current consumption to the μA range. A key MOS design feature is flexibility in the form of cross-platform support and testing across PCs, PDAs, and different micro sensor platforms. Another key MOS design feature is support for remote management of in-situ sensors via dynamic reprogramming and remote login.


IEEE Personal Communications | 1998

Dynamic adaptation in an image transcoding proxy for mobile Web browsing

Richard Han; Pravin Bhagwat; Richard O. LaMaire; Todd W. Mummert; Veronique Perret; Jim Rubas

Transcoding proxies are used as intermediaries between generic World Wide Web servers and a variety of client devices in order to adapt to the greatly varying bandwidths of different client communication links and to handle the heterogeneity of possibly small-screened client devices. Such transcoding proxies can adaptively adjust the amount by which a data stream is reduced, using an aggressive lossy compression method (e.g., an image becomes less clear, text is summarized). We present an analytical framework for determining whether to transcode and how much to transcode an image for the two cases of store-and-forward transcoding as well as streamed transcoding. These methods require prediction of transcoding delay, prediction of transcoded image size (in bytes), and estimation of network bandwidth. We discuss methods of adaptation based on fixed quality as well as fixed delay (automated/dynamic transcoding). We conclude with a description of the practical adaptation policies that have been implemented in our adaptive image transcoding proxy.


conference on computer supported cooperative work | 2000

WebSplitter: a unified XML framework for multi-device collaborative Web browsing

Richard Han; Veronique Perret; Mahmoud Naghshineh

WebSplitter symbolizes the union of pervasive multi-device computing and collaborative multi-user computing. WebSplitter provides a unified XML framework that enables multi-device and multi-user Web browsing. WebSplitter splits a requested Web page and delivers the appropriate partial view of each page to each user, or more accurately to each users set of devices. Multiple users can participate in the same browsing session, as in traditional conferencing groupware. Depending on the access privileges of the user to the different components of content on each page, WebSplitter generates a personalized partial view. WebSplitter further splits the partial view among the devices available to each user, e.g. laptop, wireless PDA, projection display, stereo speakers, orchestrating a composite presentation across the devices. A wireless PDA can browse while remotely controlling the multimedia capabilities of nearby devices. The architecture consists of an XML metadata policy file defining access privileges to XML tags on a Web page, a middleware proxy that splits XML Web content to create partial views, and a client-side component, e.g. applet, enabling user login and reception of pushed browsing data. Service discovery finds and registers proxies, browsing sessions, and device capabilities. We demonstrate the feasibility of splitting the different tags in an XML Web page to different end users browsers, and of pushing updates from the browsing session to heterogeneous devices, including a laptop and a PDA.


international conference on mobile systems, applications, and services | 2006

FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments

Carl Hartung; Richard Han; Carl Seielstad; Saxon Lorien Holbrook

In this paper we present FireWxNet, a multi-tiered portable wireless system for monitoring weather conditions in rugged wildland fire environments. FireWxNet provides the fire fighting community the ability to safely and easily measure and view fire and weather conditions over a wide range of locations and elevations within forest fires. This previously unattainable information allows fire behavior analysts to better predict fire behavior, heightening safety considerations. Our system uses a tiered structure beginning with directional radios to stretch deployment capabilities into the wilderness far beyond current infrastructures. At the end point of our system we designed and integrated a multi-hop sensor network to provide environmental data. We also integrated web-enabled surveillance cameras to provide visual data. This paper describes a week long full system deployment utilizing 3 sensor networks and 2 web-cams in the Selway-Salmon Complex Fires of 2005. We perform an analysis of system performance and present observations and lessons gained from our deployment.


international workshop on security | 2005

Countermeasures Against Traffic Analysis Attacks in Wireless Sensor Networks

Jing Deng; Richard Han; Shivakant Mishra

Wireless sensor networks are highly vulnerable to the failure of base stations. An adversary can render a wireless sensor network useless by launching remote, softwarebased attacks or physical attacks on the base stations. This paper addresses the problem of defending a base station against physical attacks by concealing the geographic location of a base station. Typical packet traffic in a sensor network reveals pronounced patterns that allow an adversary analyzing packet traffic to deduce the location of a base station. The paper investigates several countermeasures against traffic analysis techniques aimed at disguising the location of a base station. First, a degree of randomness is introduced in the multi-hop path a packet takes from a sensor node to a base station. Second, random fake paths are introduced to confuse an adversary from tracking a packet as it moves towards a base station. Finally, multiple, random areas of high communication activity are created to deceive an adversary as to the true location of the base station. The paper evaluates these techniques analytically and via simulation using three evaluation criteria: total entropy of the network, total energy consumed, and the ability to guard against heuristic-based techniques to locate a base station.


Mobile Computing and Communications Review | 2004

TSync: a lightweight bidirectional time synchronization service for wireless sensor networks

Hui Dai; Richard Han

Time synchronization in a wireless sensor network is critical for accurate timestamping of events and fine-tuned coordination of wake/sleep duty cycles to reduce power consumption. This paper proposes TSync, a novel lightweight bidirectional time synchronization service for wireless sensor networks. TSyncs bidirectional service offers both a push mechanism for accurate and low overhead global time synchronization as well as a pull mechanism for on-demand synchronization by individual sensor nodes. Multi-channel enhancements improve TSyncs performance. We deploy a GPS-enabled framework in live sensor networks to evaluate the accuracy and overhead of TSync in comparison with other in-situ time synchronization algorithms.


information processing in sensor networks | 2003

A performance evaluation of intrusion-tolerant routing in wireless sensor networks

Jing Deng; Richard Han; Shivakant Mishra

This paper evaluates the performance of INSENS, an INtrusion-tolerant routing protocol for wireless SEnsor Networks. Security in sensor networks is important in battlefield monitoring and home security applications to prevent intruders from eavesdropping, from tampering with sensor data, and from launching denial-of-service (DOS) attacks against the entire network. The resilience of INSENSs multipath performance against various forms of communication-based attacks by intruders is evaluated in simulation. Within the context of INSENS, the paper evaluates implementations on the motes of the RC5 and AES encryption standards, an RC5-based scheme to generate message authentication codes (MACs), and an RC5-based generation of one-way sequence numbers.


sensor networks and applications | 2003

MANTIS: system support for multimodAl NeTworks of in-situ sensors

Hector Abrach; Shah Bhatti; James Carlson; Hui Dai; Jeff Rose; Anmol Sheth; Brian Shucker; Jing Deng; Richard Han

The MANTIS MultimodAl system for NeTworks of In-situ wireless Sensors provides a new multithreaded embedded operating system integrated with a general-purpose single-board hardware platform to enable flexible and rapid prototyping of wireless sensor networks. The key design goals of MANTIS are ease of use, i.e. a small learning curve that encourages novice programmers to rapidly prototype novel sensor networking applications in software and hardware, as well as flexibility, so that expert researchers can leverage or develop advanced software features and hardware extensions to suit the needs of advanced research in wireless sensor networks.


dependable systems and networks | 2004

Intrusion tolerance and anti-traffic analysis strategies for wireless sensor networks

Jing Deng; Richard Han; Shivakant Mishra

Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which acts as a collection point of sensor data. In this paper, we investigate two attacks that can lead to isolation or failure of the base station. In one set of attacks, the base station is isolated by blocking communication between sensor nodes and the base station, e.g. by DOS attacks. In the second attack, the location of the base station is deduced by analyzing data traffic towards the base station, which can lead to jamming and/or discovery and destruction of the base station. To defend against these attacks, two secure strategies are proposed. First, secure multi-path routing to multiple destination base stations is designed to provide intrusion tolerance against isolation of a base station. Second, anti-traffic analysis strategies are proposed to help disguise the location of the base station from eavesdroppers. A performance evaluation is provided for a simulated sensor network, as well as measurements of cryptographic overhead on real sensor nodes.


Computer Communications | 2006

INSENS: Intrusion-tolerant routing for wireless sensor networks

Jing Deng; Richard Han; Shivakant Mishra

This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS constructs forwarding tables at each node to facilitate communication between sensor nodes and a base station. It minimizes computation, communication, storage, and bandwidth requirements at the sensor nodes at the expense of increased computation, communication, storage, and bandwidth requirements at the base station. INSENS does not rely on detecting intrusions, but rather tolerates intrusions by bypassing the malicious nodes. An important property of INSENS is that while a malicious node may be able to compromise a small number of nodes in its vicinity, it cannot cause widespread damage in the network. A prototype implementation in the ns2click simulator is presented to demonstrate and assess INSENSs tolerance to malicious attacks launched by intruder nodes in random and

Collaboration


Dive into the Richard Han's collaboration.

Top Co-Authors

Avatar

Shivakant Mishra

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Qin Lv

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Jing Deng

University of North Carolina at Greensboro

View shared research outputs
Top Co-Authors

Avatar

Anmol Sheth

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Mike Gartrell

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Homa Hosseinmardi

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Xinyu Xing

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Aaron Beach

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Brian Shucker

University of Colorado Boulder

View shared research outputs
Top Co-Authors

Avatar

Hui Dai

University of Colorado Boulder

View shared research outputs
Researchain Logo
Decentralizing Knowledge