Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yuguang Fang is active.

Publication


Featured researches published by Yuguang Fang.


vehicular technology conference | 2002

Call admission control schemes and performance analysis in wireless mobile networks

Yuguang Fang; Yi Zhang

Call admission control (CAC) plays a significant role in providing the desired quality of service in wireless networks. Many CAC schemes have been proposed. Analytical results for some performance metrics such as call blocking probabilities are obtained under some specific assumptions. It is observed, however, that due to the mobility, some assumptions may not be valid, which is the case when the average values of channel holding times for new calls and handoff calls are not equal. We reexamine some of the analytical results for call blocking probabilities for some call admission control schemes under more general assumptions and provide some easier-to-compute approximate formulas.


IEEE Journal on Selected Areas in Communications | 2006

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Yanchao Zhang; Wei Liu; Wenjing Lou; Yuguang Fang

Node compromise is a serious threat to wireless sensor networks deployed in unattended and hostile environments. To mitigate the impact of compromised nodes, we propose a suite of location-based compromise-tolerant security mechanisms. Based on a new cryptographic concept called pairing, we propose the notion of location-based keys (LBKs) by binding private keys of individual nodes to both their IDs and geographic locations. We then develop an LBK-based neighborhood authentication scheme to localize the impact of compromised nodes to their vicinity. We also present efficient approaches to establish a shared key between any two network nodes. In contrast to previous key establishment solutions, our approaches feature nearly perfect resilience to node compromise, low communication and computation overhead, low memory requirements, and high network scalability. Moreover, we demonstrate the efficacy of LBKs in counteracting several notorious attacks against sensor networks such as the Sybil attack, the identity replication attack, and wormhole and sinkhole attacks. Finally, we propose a location-based threshold-endorsement scheme, called LTE, to thwart the infamous bogus data injection attack, in which adversaries inject lots of bogus data into the network. The utility of LTE in achieving remarkable energy savings is validated by detailed performance evaluation.


Wireless Communications and Mobile Computing | 2004

Performance analysis of IEEE 802.11 MAC protocols in wireless LANs

Hongqiang Zhai; Younggoo Kwon; Yuguang Fang

Summary IEEE 802.11 MAC protocol is the de facto standard for wireless local area networks (LANs), and has also been implemented in many network simulation packages for wireless multi-hop ad hoc networks. However, it is well known that, as the number of active stations increases, the performance of IEEE 802.11 MAC in terms of delay and throughput degrades dramatically, especially when each station’s load approaches its saturation state. To explore the inherent problems in this protocol, it is important to characterize the probability distribution of the packet service time at the MAC layer. In this paper, by modeling the exponential backoff process as a Markov chain, we can use the signal transfer function of the generalized state transition diagram to derive an approximate probability distribution of the MAC layer service time. We then present the discrete probability distribution for MAC layer packet service time, which is shown to accurately match the simulation data from network simulations. Based on the probability model for the MAC layer service time, we can analyze a few performance metrics of the wireless LAN and give better explanation to the performance degradation in delay and throughput at various traffic loads. Furthermore, we demonstrate that the exponential distribution is a good approximation model for the MAC layer service time for the queueing analysis, and the presented queueing models can accurately match the simulation data obtained from ns-2 when the arrival process at MAC layer is Poissonian. Copyright # 2004 John Wiley & Sons, Ltd.


IEEE Communications Surveys and Tutorials | 2008

Securing wireless sensor networks: a survey

Yun Zhou; Yuguang Fang; Yanchao Zhang

The significant advances of hardware manufacturing technology and the development of efficient software algorithms make technically and economically feasible a network composed of numerous, small, low-cost sensors using wireless communications, that is, a wireless sensor network. WSNs have attracted intensive interest from both academia and industry due to their wide application in civil and military scenarios. In hostile scenarios, it is very important to protect WSNs from malicious attacks. Due to various resource limitations and the salient features of a wireless sensor network, the security design for such networks is significantly challenging. In this article, we present a comprehensive survey of WSN security issues that were investigated by researchers in recent years and that shed light on future directions for WSN security.


international conference on computer communications | 2003

A novel MAC protocol with fast collision resolution for wireless LANs

Younggoo Kwon; Yuguang Fang; Haniph A. Latchman

Design of efficient medium access control (MAC) protocols with both high throughput performance and high-degree of fairness performance is a major focus in distributed contention-based MAC protocol research. In this paper, we propose a novel and efficient contention-based MAC protocol for wireless local area networks, namely, the fast collision resolution (FCR) algorithm. This algorithm is developed based on the following innovative ideas: to speed up the collision resolution, we actively redistribute the backoff timers for all active nodes; to reduce the average number of idle slots, we use smaller contention window sizes for nodes with successful packet transmissions and reduce the backoff timers exponentially fast when a fixed number of consecutive idle slots are detected. We show that the proposed FCR algorithm provides high throughput performance and low latency in wireless LANs. The extensive simulation studies show that the FCR algorithm could significantly improve the performance of the IEEE 802.11 MAC protocol if our efficient collision resolution algorithm is used and that the fairly scheduled FCR (FS-FCR) algorithm could simultaneously achieve high throughput performance and a high degree of fairness.


IEEE Transactions on Wireless Communications | 2005

How well can the IEEE 802.11 wireless LAN support quality of service

Hongqiang Zhai; Xiang Chen; Yuguang Fang

This paper studies an important problem in the IEEE 802.11 distributed coordination function (DCF)-based wireless local area network (WLAN): how well can the network support quality of service (QoS). Specifically, this paper analyzes the networks performance in terms of maximum protocol capacity or throughput, delay, and packet loss rate. Although the performance of the 802.11 protocol, such as throughput or delay, has been extensively studied in the saturated case, it is demonstrated that maximum protocol capacity can only be achieved in the nonsaturated case and is almost independent of the number of active nodes. By analyzing packet delay, consisting of medium access control (MAC) service time and waiting time, accurate estimates were derived for delay and delay variation when the throughput increases from zero to the maximum value. Packet loss rate is also given for the nonsaturated case. Furthermore, it is shown that the channel busyness ratio provides precise and robust information about the current network status, which can be utilized to facilitate QoS provisioning. The authors have conducted a comprehensive simulation study to verify their analytical results and to tune the 802.11 to work at the optimal point with maximum throughput and low delay and packet loss rate. The simulation results show that by controlling the total traffic rate, the original 802.11 protocol can support strict QoS requirements, such as those required by voice over Internet protocol (VoIP) or streaming video, and at the same time achieve high channel utilization.


IEEE Transactions on Computers | 1998

Channel occupancy times and handoff rate for mobile computing and PCS networks

Yuguang Fang; Imrich Chlamtac; Yi-Bing Lin

This paper presents a study of channel occupancy times and handoff rate for mobile computing in MC (Mobile Computing) and PCS (Personal Communications Services) networks, using general operational assumptions. It is shown that, for exponentially distributed call holding times, a distribution more appropriate for conventional voice telephony, the channel occupancy times are exponentially distributed if and only if the cell residence times are exponentially distributed. It is further shown that the merged traffic from new calls and handoff calls is Poisson if and only if the cell residence times are exponentially distributed, too. When cell residence times follow a general distribution, a more appropriate way to model mobile computing sessions, new formulae for channel occupancy time distributions are obtained. Moreover, when the call holding times and the cell residence times have general (nonlattice) distributions, general formulae for computing the handoff rate during a call connection and handoff call arrival rate to a cell are given. Our analysis illustrates why the exponential assumption for call holding time results in the underestimation of handoff rate, which then leads to the actual blocking probabilities being higher than the blocking probabilities for MC/PCS networks designed using the exponential distribution approximation for call holding time. The analytical results presented in this paper can be expected to play a significant role in teletraffic analysis and system design for MC/PCS networks.


IEEE Transactions on Communications | 1999

Teletraffic analysis and mobility modeling of PCS networks

Yuguang Fang; Imrich Chlamtac

Channel holding time is of primary importance in teletraffic analysis of PCS networks. This quantity depends on users mobility which can be characterized by the cell residence time. We show that when the cell residence time is not exponentially distributed, the channel holding time is not exponentially distributed either, a fact also confirmed by available field data. In order to capture the essence of PCS network behaviour, including the characterization of channel holding time, a correct mobility model is therefore necessary. The new model must be good enough to fit field data, while at the same time resulting in a tractable queueing system. We propose a new mobility model, called the hyper-Erlang distribution model, which is consistent with these requirements. Under the new realistic operational assumption of this model, in which the cell residence time is generally distributed, we derive analytical results for the channel holding time distribution, which are readily applicable to the hyper-Erlang distribution models. Using the derived analytical results we demonstrate how the distribution of the cell residence time affects the channel holding time distribution. The results presented in this paper can provide guidelines for field data processing in PCS network design and performance evaluation.


international conference on computer communications | 2004

SPREAD: enhancing data confidentiality in mobile ad hoc networks

Wenjing Lou; Wei Liu; Yuguang Fang

Security is a critical issue in a mobile ad hoc network (MANET). We propose and investigate a novel scheme, security protocol for reliable data delivery (SPREAD), to enhance the data confidentiality service in a mobile ad hoc network. The proposed SPREAD scheme aims to provide further protection to secret messages from being compromised (or eavesdropped) when they are delivered across the insecure network. The basic idea is to transform a secret message into multiple shares by secret sharing schemes and then deliver the shares via multiple independent paths to the destination so that even if a small number of nodes that are used to relay the message shares are compromised, the secret message as a whole is not compromised. We present the overall system architecture and investigate the major design issues. We first describe how to obtain message shares using the secret sharing schemes. Then we study the appropriate choice of the secret sharing schemes and the optimal allocation of the message shares onto each path in order to maximize the security. The results show that the SPREAD is more secure and also provides a certain degree of reliability without sacrificing the security. Thirdly, the multipath routing techniques are discussed and the path set optimization algorithm is developed to find the multiple paths with the desired property, i.e., the overall path set providing maximum security. Finally, we present the simulation results to justify the feasibility and evaluate the effectiveness of SPREAD.


ieee international conference computer and communications | 2006

Physical Carrier Sensing and Spatial Reuse in Multirate and Multihop Wireless Ad Hoc Networks

Hongqiang Zhai; Yuguang Fang

Physical carrier sensing is an effective mechanism of medium access control (MAC) protocols to reduce collisions in wireless networks, and the size of the carrier sensing range has a great impact on the system performance. Previous studies have shown that the MAC layer overhead plays an important role in determining the optimal carrier sensing range. However, variable transmission ranges and receiver sensitivities for different channel rates and the impact of multihop forwarding have been ignored. In this paper, we investigate the impacts of these factors as well as several other important factors, such as SINR (signal to interference plus noise ratio), node topology, hidden/exposed terminal problems and bidirectional handshakes, on determining the optimum carrier sensing range to maximize the throughput through both analysis and simulations. The results show that if any one of these factors is not addressed properly, the system performance may suffer a significant degradation. Furthermore, considering both multirate capability and carrier sensing ranges, we propose to use bandwidth distance product as a routing metric, which improves end-to-end throughput by up to 27% in the simulated scenario.

Collaboration


Dive into the Yuguang Fang's collaboration.

Top Co-Authors

Avatar

Chi Zhang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Pan Li

Case Western Reserve University

View shared research outputs
Top Co-Authors

Avatar

Miao Pan

University of Houston

View shared research outputs
Top Co-Authors

Avatar

Yanchao Zhang

Arizona State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wei Liu

University of Florida

View shared research outputs
Top Co-Authors

Avatar

Hao Yue

University of Florida

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Linke Guo

Binghamton University

View shared research outputs
Researchain Logo
Decentralizing Knowledge