Digital Repository

Browsing by Author "Fu, H."

Browsing by Author "Fu, H."

Sort by: Order: Results:

  • Wang, Q.; Leng, S.; Fu, H.; Zang, Y.; Weerasinghe, K.G.H.D. (INFOCOM IEEE Conference on Computer Communications Workshops, 2010)
    This paper proposes a multi-channel MAC scheme for Vehicular Ad Hoc Networks (VANETs), which dynamically adjusts the intervals of Control Channel (CCH) and Service Channels (SCHs). Markov modeling is conducted to optimize ...
  • Dustin, M.; Shankarappa, J.; Petrowski, M.; Weerasinghe, K.G.H.D.; Fu, H. (IEEE EIT?07, 2007)
    A multitude of wireless sensor networks exist today in various fields, each having a specific objective in mind. Based on the objectives for each network, the security concerns can be different, dependent on such factors ...
  • Weerasinghe, K.G.H.D.; Fu, H.; Leng, S. (Information Assurance and Security (IAS), 2010 Sixth International Conference, 2011)
    Communications through road side units in Vehicular Ad hoc Networks (VANETs) can be used to track the location of vehicles, which makes serious threat on users' privacy. In this paper, we propose and evaluate a novel ...
  • Jin, K.; Weerasinghe, K.G.H.D.; Fu, H. (Proceedings of 43rd Annual Simulation Symposium (ANSS), 2010)
    Ns-2 is being widely utilized to evaluate the wired and wireless networks on many research activities. The ns-2.33 distribution version includes an extension of IEEE 802.11 module which improves the core functions of 802.11 ...
  • Weerasinghe, K.G.H.D.; Fu, H. (GLOBECOM Workshops (GC Wkshps), 2010 IEEE, 2010)
    Security mechanisms such as authentication, message integrity, and non-repudiation are extremely important features for both vehicle-to-vehicle and vehicle-to-infrastructure communications in vehicular ad hoc networks. ...
  • Weerasinghe, K.G.H.D.; Fu, H. (International Journal of Software Engineering and Its Applications, 2008)
    A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route requests without having active route to ...
  • Weerasinghe, K.G.H.D.; Tackett, R.; Fu, H. (Security and Communication Networks, 2011)
    In the near future, vehicle-to-vehicle and vehicle-to-roadside infrastructure communications will enable numerous applications, such as collision avoidance, traffic management, location-based services, and infotainment for ...

Search Digital Repository

Browse

My Account