Xuemin Sherman Shen
University of Waterloo
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Xuemin Sherman Shen.
IEEE Communications Magazine | 2011
Rongxing Lu; Xu Li; Xiaohui Liang; Xuemin Sherman Shen; Xiaodong Lin
Machine-to-machine communications is characterized by involving a large number of intelligent machines sharing information and making collaborative decisions without direct human intervention. Due to its potential to support a large number of ubiquitous characteristics and achieving better cost efficiency, M2M communications has quickly become a market-changing force for a wide variety of real-time monitoring applications, such as remote e-healthcare, smart homes, environmental monitoring, and industrial automation. However, the flourishing of M2M communications still hinges on fully understanding and managing the existing challenges: energy efficiency (green), reliability, and security (GRS). Without guaranteed GRS, M2M communications cannot be widely accepted as a promising communication paradigm. In this article, we explore the emerging M2M communications in terms of the potential GRS issues, and aim to promote an energy-efficient, reliable, and secure M2M communications environment. Specifically, we first formalize M2M communications architecture to incorporate three domains - the M2M, network, and application domains - and accordingly define GRS requirements in a systematic manner. We then introduce a number of GRS enabling techniques by exploring activity scheduling, redundancy utilization, and cooperative security mechanisms. These techniques hold promise in propelling the development and deployment of M2M communications applications.
IEEE Communications Magazine | 2015
Jian Qiao; Xuemin Sherman Shen; Jon W. Mark; Qinghua Shen; Yejun He; Lei Lei
Millimeter-wave communication is a promising technology for future 5G cellular networks to provide very high data rate (multi-gigabits-per-second) for mobile devices. Enabling D2D communications over directional mmWave networks is of critical importance to efficiently use the large bandwidth to increase network capacity. In this article, the propagation features of mmWave communication and the associated impacts on 5G cellular networks are discussed. We introduce an mmWave+4G system architecture with TDMA-based MAC structure as a candidate for 5G cellular networks. We propose an effective resource sharing scheme by allowing non-interfering D2D links to operate concurrently. We also discuss neighbor discovery for frequent handoffs in 5G cellular networks.
IEEE Transactions on Mobile Computing | 2014
Shibo He; Jiming Chen; Xu Li; Xuemin Sherman Shen; Youxian Sun
The barrier coverage problem in emerging mobile sensor networks has been an interesting research issue due to many related real-life applications. Existing solutions are mainly concerned with deciding one-time movement for individual sensors to construct as many barriers as possible, which may not be suitable when there are no sufficient sensors to form a single barrier. In this paper, we aim to achieve barrier coverage in the sensor scarcity scenario by dynamic sensor patrolling. Specifically, we design a periodic monitoring scheduling (PMS) algorithm in which each point along the barrier line is monitored periodically by mobile sensors. Based on the insight from PMS, we then propose a coordinated sensor patrolling (CSP) algorithm to further improve the barrier coverage, where each sensors current movement strategy is derived from the information of intruder arrivals in the past. By jointly exploiting sensor mobility and intruder arrival information, CSP is able to significantly enhance barrier coverage. We prove that the total distance that sensors move during each time slot in CSP is the minimum. Considering the decentralized nature of mobile sensor networks, we further introduce two distributed versions of CSP: S-DCSP and G-DCSP. We study the scenario where sensors are moving on two barriers and propose two heuristic algorithms to guide the movement of sensors. Finally, we generalize our results to work for different intruder arrival models. Through extensive simulations, we demonstrate that the proposed algorithms have desired barrier coverage performances.
IEEE Transactions on Intelligent Transportation Systems | 2012
Rongxing Lu; Xiaodong Lin; Xiaohui Liang; Xuemin Sherman Shen
In this paper, to achieve a vehicle users privacy preservation while improving the key update efficiency of location-based services (LBSs) in vehicular ad hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme called DIKE. Specifically, in the proposed DIKE scheme, we first introduce a privacy-preserving authentication technique that not only provides the vehicle users anonymous authentication but enables double-registration detection as well. We then present efficient LBS session key update procedures: 1) We divide the session of an LBS into several time slots so that each time slot holds a different session key; when no vehicle user departs from the service session, each joined user can use a one-way hash function to autonomously update the new session key for achieving forward secrecy. 2) We also integrate a novel dynamic threshold technique in traditional vehicle-to-vehicle (V-2-V) and vehicle-to-infrastructure (V-2-I) communications to achieve the session keys backward secrecy, i.e., when a vehicle user departs from the service session, more than a threshold number of joined users can cooperatively update the new session key. Performance evaluations via extensive simulations demonstrate the efficiency and effectiveness of the proposed DIKE scheme in terms of low key update delay and fast key update ratio.
IEEE Transactions on Dependable and Secure Computing | 2016
Hongwei Li; Yi Yang; Tom H. Luan; Xiaohui Liang; Liang Zhou; Xuemin Sherman Shen
Using cloud computing, individuals can store their data on remote servers and allow data access to public users through the cloud servers. As the outsourced data are likely to contain sensitive privacy information, they are typically encrypted before uploaded to the cloud. This, however, significantly limits the usability of outsourced data due to the difficulty of searching over the encrypted data. In this paper, we address this issue by developing the fine-grained multi-keyword search schemes over encrypted cloud data. Our original contributions are three-fold. First, we introduce the relevance scores and preference factors upon keywords which enable the precise keyword search and personalized user experience. Second, we develop a practical and very efficient multi-keyword search scheme. The proposed scheme can support complicated logic search the mixed “AND”, “OR” and “NO” operations of keywords. Third, we further employ the classified sub-dictionaries technique to achieve better efficiency on index building, trapdoor generating and query. Lastly, we analyze the security of the proposed schemes in terms of confidentiality of documents, privacy protection of index and trapdoor, and unlinkability of trapdoor. Through extensive experiments using the real-world dataset, we validate the performance of the proposed schemes. Both the security analysis and experimental results demonstrate that the proposed schemes can achieve the same security level comparing to the existing ones and better performance in terms of functionality, query complexity and efficiency.
IEEE Journal on Selected Areas in Communications | 2012
Yongkang Liu; Lin Cai; Xuemin Sherman Shen
In this paper, cognitive routing coupled with spectrum sensing and sharing in a multi-channel multi-hop cognitive radio network (CRN) is investigated. Recognizing the spectrum dynamics in CRN, we propose an opportunistic cognitive routing (OCR) protocol that allows users to exploit the geographic location information and discover the local spectrum access opportunities to improve the transmission performance over each hop. Specifically, based on location information and channel usage statistics, a secondary user (SU) distributedly selects the next hop relay and adapts its transmission to the dynamic spectrum access opportunities in its neighborhood. In addition, we introduce a novel metric, namely, cognitive transport throughput (CTT), to capture the unique properties of CRN and evaluate the potential relay gain of each relay candidate. A heuristic algorithm is proposed to reduce the searching complexity of the optimal selection of channel and relay. Simulation results are given to demonstrate that our proposed OCR well adapts to the spectrum dynamics and outperforms existing routing protocols in CRN.
IEEE Transactions on Wireless Communications | 2011
Jian Qiao; Lin Cai; Xuemin Sherman Shen; Jon W. Mark
Millimeter-wave (mmWave) communications is a promising enabling technology for high rate (Giga-bit) multimedia applications. However, because of the high propagation loss at 60 GHz band, mmWave signal power degrades significantly over distance. Therefore, a traffic flow being transmitted over multiple short hops can attain higher throughput than that over a single long hop. In this paper, we first design a hop selection metric for the piconet controller (PNC) to select appropriate relay hops for a traffic flow, aiming to improve the flow throughput and balance the traffic loads across the network. We then propose a multi-hop concurrent transmission (MHCT) scheme to exploit the spatial capacity of mmWave WPANs by allowing nodes to transmit concurrently in communication links without causing harmful interference. The analysis of concurrent transmission probability and time division multiplexing demonstrates that the MHCT scheme is capable of improving the time slot utilization. Extensive simulations are conducted to validate the analytical results and demonstrate that the proposed MHCT scheme can improve the average traffic flow throughput and network throughput.
IEEE Journal on Selected Areas in Communications | 2011
Ammar Alshamrani; Xuemin Sherman Shen; Liang-Liang Xie
In this paper, we propose a spectrum allocation framework that jointly considers the Quality-of-Service (QoS) provisioning for heterogeneous secondary Real-Time (RT) and Non-Real Time (NRT) users, the spectrum sensing, spectrum access decision, channel allocation, and call admission control in distributed cooperative Cognitive Radio Networks (CRNs). Giving priority to the RT users with QoS requirements in terms of the dropping and blocking probabilities, a number of the identified available channels are allocated to the optimum number of the RT users that can be admitted into the network, while the remaining identified available channels are allocated adaptively to the optimum number of the NRT users considering the spectrum sensing and utilization indispensability. Extensive analytical and simulation results are provided to demonstrate the effectiveness of the proposed QoS-based spectrum resource allocation framework.
IEEE Journal on Selected Areas in Communications | 2012
Hao Liang; Bong Jun Choi; Atef Abdrabou; Weihua Zhuang; Xuemin Sherman Shen
As essential building blocks of the future smart grid, microgrids can efficiently integrate various types of distributed generation (DG) units to supply the electric loads at the minimum cost based on the economic dispatch. In this paper, we introduce a decentralized economic dispatch approach such that the optimal decision on power generation is made by each DG unit locally without a central controller. The prerequisite power generation and load information for decision making is discovered by each DG unit via a multiagent coordination with guaranteed convergence. To avoid a slow convergence speed which potentially increases the generation cost because of the time-varying nature of DG output, we present a heterogeneous wireless network architecture for microgrids. Low-cost short-range wireless communication devices are used to establish an ad hoc network as a basic information exchange infrastructure, while auxiliary dual-mode devices with cellular communication capabilities are optionally activated to improve the convergence speed. Two multiagent coordination schemes are proposed for the single-stage and hierarchical operation modes, respectively. The optimal number of activated cellular communication devices is obtained based on the tradeoff between communication and generation costs. The performance of the proposed schemes is analyzed and evaluated based on real power generation and load data collected from the Waterloo Region in Canada. Numerical results indicate that our proposed schemes can better utilize the cellular communication links and achieve a desired tradeoff between the communication and generation costs as compared with the existing schemes.
IEEE Transactions on Wireless Communications | 2011
Zhongliang Liang; Shan Feng; Dongmei Zhao; Xuemin Sherman Shen
Traditional wireless sensor networks (WSNs) working in the license-free spectrum suffer from uncontrolled interference as the license-free spectrum becomes increasingly crowded. Designing a WSN based on cognitive radio can be promising in the near future in order to provide data transmissions with quality of service requirements. In this paper we introduce a cognitive radio sensor network (CRSN) and analyze its performance for supporting real-time traffic. The network opportunistically accesses vacant channels in the licensed spectrum. When the current channel becomes unavailable, the devices can switch to another available channel. Two types of channel switchings are considered, in periodic switching (PS) the devices can switch to a new channel only at the beginning of each channel switching (CS) interval, while in triggered switching (TS) the devices can switch to a new channel as soon as the current channel is lost. We consider two types of real-time traffic, i) a burst of packets are generated periodically and the number of packets in each burst is random, and ii) packet arrivals follow a Poisson process. We derive the average packet transmission delay for each type of the traffic and channel switching mechanisms. Our results indicate that real-time traffic can be effectively supported in the CRSN with small average packet transmission delay. For the network using PS, packets with the Poisson arrivals experience longer average delay than the bursty arrivals; while for the network using TS, packets with the bursty arrivals experience longer average delay.