Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zengwen Yuan is active.

Publication


Featured researches published by Zengwen Yuan.


acm/ieee international conference on mobile computing and networking | 2016

Mobileinsight: extracting and analyzing cellular network information on smartphones

Yuanjie Li; Chunyi Peng; Zengwen Yuan; Jiayao Li; Haotian Deng; Tao Wang

We design and implement MobileInsight, a software tool that collects, analyzes and exploits runtime network information from operational cellular networks. MobileInsight runs on commercial off-the-shelf phones without extra hardware or additional support from operators. It exposes protocol messages on both control plane and (below IP) data plane from the 3G/4G chipset. It provides in-device protocol analysis and operation logic inference. It further offers a simple API, through which developers and researchers obtain access to low-level network information for their mobile applications. We have built three showcases to illustrate how MobileInsight is applied to cellular network research.


computer and communications security | 2015

Insecurity of Voice Solution VoLTE in LTE Mobile Networks

Chi-Yu Li; Guan-Hua Tu; Chunyi Peng; Zengwen Yuan; Yuanjie Li; Songwu Lu; Xinbing Wang

VoLTE (Voice-over-LTE) is the designated voice solution to the LTE mobile network, and its worldwide deployment is underway. It reshapes call services from the traditional circuit-switched telecom telephony to the packet-switched Internet VoIP. In this work, we conduct the first study on VoLTE security before its full rollout. We discover several vulnerabilities in both its control-plane and data-plane functions, which can be exploited to disrupt both data and voice in operational networks. In particular, we find that the adversary can easily gain free data access, shut down continuing data access, or subdue an ongoing call, etc. We validate these proof-of-concept attacks using commodity smartphones (rooted and unrooted) in two Tier-1 US mobile carriers. Our analysis reveals that, the problems stem from both the device and the network. The device OS and chipset fail to prohibit non-VoLTE apps from accessing and injecting packets into VoLTE control and data planes. The network infrastructure also lacks proper access control and runtime check.


acm/ieee international conference on mobile computing and networking | 2017

The Tick Programmable Low-Latency SDR System

Haoyang Wu; Tao Wang; Zengwen Yuan; Chunyi Peng; Zhiwei Li; Zhaowei Tan; Boyan Ding; Xiaoguang Li; Yuanjie Li; Jun Liu; Songwu Lu

Tick is a new SDR system that provides programmability and ensures low latency at both PHY and MAC. It supports modular design and element-based programming, similar to the Click router framework [23]. It uses an accelerator-rich architecture, where an embedded processor executes control flows and handles various MAC events. User-defined accelerators offload those tasks, which are either computation-intensive or communication-heavy, or require fine-grained timing control, from the processor, and accelerate them in hardware. Tick applies a number of hardware and software co-design techniques to ensure low latency, including multi-clock-domain pipelining, field-based processing pipeline, separation of data and control flows, etc. We have implemented Tick and validated its effectiveness through extensive evaluations as well as two prototypes of 802.11ac SISO/MIMO and 802.11a/g full-duplex.


acm/ieee international conference on mobile computing and networking | 2017

A Control-Plane Perspective on Reducing Data Access Latency in LTE Networks

Yuanjie Li; Zengwen Yuan; Chunyi Peng

Control-plane operations are indispensable to providing data access to mobile devices in the 4G LTE networks. They provision necessary control states at the device and network nodes to enable data access. However, the current design may suffer from long data access latency even under good radio conditions. The fundamental problem is that, data-plane packet delivery cannot start or resume until all control-plane procedures are completed, and these control procedures run sequentially by design. We show both are more than necessary under popular use cases. We design DPCM, which reduces data access latency through parallel processing approaches and exploiting device-side state replica. We implement DPCM and validate its effectiveness with extensive evaluations.


GetMobile: Mobile Computing and Communications | 2018

THE TICK PROGRAMMABLE LOW-LATENCY SDR SYSTEM

Haoyang Wu; Tao Wang; Zengwen Yuan; Chunyi Peng; Zhiwei Li; Zhaowei Tan; Boyan Ding; Yuanjie Li; Jun Liu; Songwu Lu

Software-defined radio (SDR) allows users to build flexible and configurable wireless communication systems. A number of SDR platforms are already available for use [3, 4, 5]. However, given the latest technology push (e.g., 5G, wireless edge computing) and user demand pull (e.g., low-latency VR/AR, realtime control on drones), todays requirements on SDR are different. Ideally, SDR systems should offer sufficient programmability and ensure high performance for both physical (PHY) and medium access control (MAC) layers. Unfortunately, it is hard to achieve both in the existing SDR systems.


international workshop on mobile computing systems and applications | 2016

VoLTE*: A Lightweight Voice Solution to 4G LTE Networks

Guan-Hua Tu; Chi-Yu Li; Chunyi Peng; Zengwen Yuan; Yuanjie Li; Xiaohu Zhao; Songwu Lu

VoLTE is the designated voice solution to the LTE network. Its early deployment is ongoing worldwide. In this work, we report an assessment on VoLTE.We show that VoLTE offers no categorically better quality than popular VoIP applications in all tested scenarios except some congested scenarios. Given the high cost on infrastructure upgrade, we argue that VoLTE, in its current form, might not warrant the deployment effort. We sketch VOLTE*, a lightweight voice solution from which all parties of users, LTE carriers, and VoIP service providers may benefit.


communications and mobile computing | 2016

DiscoverFriends: secure social network communication in mobile ad hoc networks

Joshua Joy; Eric T. Chung; Zengwen Yuan; Jiayao Li; Leqi Zou; Mario Gerla

This paper presents a secure communication application called DiscoverFriends. Its purpose is to communicate to a group of online friends while bypassing their respective social networking servers under a mobile ad hoc network environment. DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized public-key management scheme to securely identify friends and provide authentication. Firstly, Bloom filters provide a space-efficient means of security for friend discovery. Secondly, a combination of asymmetric and symmetric encryptions algorithms utilizes both benefits to provide increased security at lower computational cost. Thirdly, a self-organized public-key management scheme helps authenticate users using a trust graph in an infrastructureless setting. With the use of Wi-Fi Direct technology, an initiator is able to establish an ad hoc network where friends can connect to within the application. DiscoverFriends was analyzed under two threat models: replay attacks and eavesdropping by a common friend. Finally, the paper evaluates the application based on storage usage and processing.


acm/ieee international conference on mobile computing and networking | 2016

In-device, runtime cellular network information extraction and analysis: demo

Yuanjie Li; Haotian Deng; Yuanbo Xiangli; Zengwen Yuan; Chunyi Peng; Songwu Lu

We present the demonstration of MobileInsight, a software tool that collects, analyzes and exploits runtime information from operational cellular network. MobileInsight runs on commercial off-the-shelf phones without extra hardware or additional support from cellular network operators. It exposes cellular protocol messages from the 3G/4G chipset, and performs in-device protocol analysis. We demonstrate the in-device runtime cellular message collection, analysis of the protocol states, visualization of runtime wireless channel and mobility dynamics, and how mobile applications benefit from MobileInsight.


international conference on computer communications | 2015

VSMC MIMO: A spectral efficient scheme for cooperative relay in cognitive radio networks

Chao Kong; Zengwen Yuan; Xushen Han; Feng Yang; Xinbing Wang; Tao Wang; Songwu Lu

Multiple-Input Multiple-Output (MIMO) technology has become an efficient way to improve the capacity and reliability of wireless networks. Traditional MIMO schemes are designed mainly for the scenario of contiguous spectrum ranges. However, in cognitive radio networks, the available spectrum is discontiguous, making traditional MIMO schemes inefficient for spectrum usage. This motivates the design of new MIMO schemes that apply to networks with discontiguous spectrum ranges. In this paper, we propose a scheme called VSMC MIMO, which enables MIMO nodes to transmit variable numbers of streams in multiple discontinuous spectrum ranges. This scheme can largely improve the spectrum utilization and meanwhile maintain the same spatial multiplexing and diversity gains as traditional MIMO schemes. To implement this spectral-efficient scheme on cooperative MIMO relays in cognitive radio networks, we propose a joint relay selection and spectrum allocation algorithm and a corresponding MAC protocol for the system. We also build a testbed by the Universal Software Radio Peripherals (USRPs) to evaluate the performances of the proposed scheme in practical networks. The experimental results show that VSMC MIMO can efficiently utilize the discontiguous spectrum and greatly improve the throughput of cognitive radio networks.


acm/ieee international conference on mobile computing and networking | 2018

Resolving Policy Conflicts in Multi-Carrier Cellular Access

Zengwen Yuan; Qianru Li; Yuanjie Li; Songwu Lu; Chunyi Peng; George Varghese

Multi-carrier cellular access dynamically selects a preferred wireless carrier by leveraging the availability and diversity of multiple carrier networks at a location. It offers an alternative to the dominant single-carrier paradigm, and shows early signs of success through the operational Project Fi by Google. In this paper, we study the important, yet largely unexplored, problem of inter-carrier switching for multi-carrier access. We show that policy conflicts can arise between inter- and intra-carrier switching, resulting in oscillations among carriers in the worst case akin to BGP looping. We derive the conditions under which such oscillations occur for three categories of popular policy, and validate them with Project Fi whenever possible. We provide practical guidelines to ensure loop-freedom and assess them via trace-driven emulations.

Collaboration


Dive into the Zengwen Yuan's collaboration.

Top Co-Authors

Avatar

Yuanjie Li

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Songwu Lu

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jiayao Li

University of California

View shared research outputs
Top Co-Authors

Avatar

Guan-Hua Tu

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhaowei Tan

University of California

View shared research outputs
Top Co-Authors

Avatar

Chi-Yu Li

University of California

View shared research outputs
Top Co-Authors

Avatar

Qianru Li

University of California

View shared research outputs
Researchain Logo
Decentralizing Knowledge