Furong Wang

Huazhong University of Science and Technology, Wu-han-shih, Hubei, China

Are you Furong Wang?

Claim your profile

Publications (52)3.06 Total impact

  • [show abstract] [hide abstract]
    ABSTRACT: Due to self-organized network without any basic infrastructure and central equipments, it is scalable and fault-tolerant, and we believe that it must be a main direction of next generation communication network and Internet. However, because of the lack of central authority, building trust among all nodes contained in a self-organized network would become more difficult. In this paper, we propose a universal reputation system and make it reliable, lie-tolerant and DoS immunity through multidimensional reputation model, adapted discounting algorithm, recommendation game, secure reputation protocol and fault-tolerant framework. Furthermore, we demonstrate its robustness and high efficiency through example and simulation.
    Journal of Network and Computer Applications - JNCA. 05/2012;
  • [show abstract] [hide abstract]
    ABSTRACT: Realistic mobility dynamics and underlying PHY/MAC layer implementation affect real deployment of routing protocols in vehicular ad hoc network (VANET). Currently, dedicated short range communication devices are using wireless access in vehicular environment (WAVE) mode of operation, but now IEEE is standardizing 802.11p WAVE. This work presents an in-depth simulation-based analysis of two reactive routing protocols, i.e., dynamic source routing (DSR) and ad hoc on-demand distance vector (AODV) with modified IEEE 802.11a PHY/MAC layers (comparable to 802.11p) in modified VANET mobility models (freeway, stop sign, and traffic sign) in terms of load, throughput, delay, number of hops, and retransmission attempts. Results obtained using OPNET simulator show that in urban/highway mobility scenarios, AODV’s performance with forthcoming 802.11p at high bit rate would be better than DSR in terms of high throughput, less delay, and retransmission attempts. Moreover, this comprehensive evaluation will assist to address challenges associated with future deployment of routing protocols integrated upon devices with upcoming IEEE 802.11p, concerning specific macro-/micro-mobility scenarios.
    annals of telecommunications - annales des télécommunications 01/2011; 66:643-656. · 0.57 Impact Factor
  • [show abstract] [hide abstract]
    ABSTRACT: Automatically detecting instant message receivers by applying semantic relevance can help improve the usability of current IM systems and make multiple, simultaneous IM conversations more convenient.
    Intelligent Systems, IEEE 01/2011; 26:24-31. · 1.93 Impact Factor
  • Source
    EURASIP J. Wireless Comm. and Networking. 01/2010; 2010.
  • Zhe Guo, Furong Wang
    [show abstract] [hide abstract]
    ABSTRACT: TD-SCDMA is the 3G mobile communication air interface specification released by International Telecommunication Union (ITU). As a TDD system, synchronization in TD-SCDMA is a key influence factor of Quality of Service (QoS). Considering that mobile communication systems work in the environment of serious interference, multipath propagation and Doppler effect, it is difficult to establish synchronization. In this paper, we propose a novel synchronization technique based on Kalman filter which can smooth most of the channel interference. The experimental results indicate that this technique can short the time taken during synchronization and improve QoS obviously.
    01/2010;
  • [show abstract] [hide abstract]
    ABSTRACT: It is proved that combination networks can achieve unbounded network coding gain measured by the ratio of network throughput with network coding to that without network coding in peer-to-peer file sharing system. On the other side, network coding allows the polluted packet generated by a malicious node to corrupt the packets transmission of the entire network. One polluted packet will prevent the other nodes from correct decoding. To settle the problem, we introduce a polluted packets detection method based on multiple vectors orthogonal to the universal set of vectors for the transmitted network coding packets. The main idea of this method is to calculate numbers of orthogonal vectors and send them to different relay nodes and receiver nodes which use them to judge whether the newly received packets are in the subspace based on the source packets. This is a distributed algorithm, without the requirement of an extra secure channel. Through the analysis and simulation in n-layer combination networks case, the computational complexity of the detection algorithm is O(n), n is the packet length, and the detection rate can be greater than 90%.
    01/2010;
  • Thazin Ei, Furong Wang
    [show abstract] [hide abstract]
    ABSTRACT: In this paper, we propose a trajectory-aware handoff algorithm based on position, velocity, signaling delay, and receive signal strength (RSS) of mobile terminal (MT). In order to provide seamless service in modern heterogeneous networks, handoff of the MT should be initiated with correct timing. In our algorithm, velocity of MT is divided into two parts as radial velocity and tangential velocity. For more precise handoff initiation, tangential velocity of MT is neglected, and only radial velocity of MT is considered in handoff decision making. Moreover, before handoff decision, least square line method is applied to RSS of MT to avoid unnecessary back-and-forth handoffs (ping-pong handoffs) between different services. A simulation is provided to compare the proposed algorithm with other various handoff methods, and the results prove this algorithm to have outperformed others.
    annals of telecommunications - annales des télécommunications 01/2010; 65:411-417. · 0.57 Impact Factor
  • Zhe Guo, Furong Wang
    [show abstract] [hide abstract]
    ABSTRACT: As the number of telecommunication user close to saturation, operators turn their focus from how to increase the subscriber to how to maintain the existing ones, which need more in-depth analysis of user character. In this paper we modeling user communication behavior based on the incoming/outgoing call holding time and then use fuzz c-means clustering algorithm to classify every level in user pyramidal model. For each level we get 3 classifications. We analyze the proportion and communication trend of each classification to help operators know their subscribers better. The method and conclusion of this paper can be used as the base of precision marketing for telecommunications industry.
    Future Generation Information Technology - Second International Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings; 01/2010
  • Zhe Guo, Zheng Yan, Furong Wang
    [show abstract] [hide abstract]
    ABSTRACT: Individual mobility is a popular research topic in mobile communications. One interesting question is: is the movement of human-beings independent although they may not want to follow with each other? This paper explores the phenomenon of group movement by analyzing the traffic variance among cellular base stations. We find that the entropy of group movement is less than the sum of individual's and the trajectory of group movement is somehow steady. Applying this conclusion, we proposed a methodology to predict a user's location based on group movement. Our verification based on real mobile user data shows that this method has sound accuracy.
    IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing. 01/2010;
  • [show abstract] [hide abstract]
    ABSTRACT: Bandwidth allocation and frequent handoffs are serious problems in heterogeneous networks. A Variable Bandwidth Scheme (VBS) using effective multicast traffic share improve the quality of services (QoS) in heterogeneous networks. Compared with the Time-based Channel Predictive Control (TCPC) schemes, the VBS reduces call dropping probability (CDP) and call blocking probability (CBP). And the weight call loss probability (CLP) is the function of CDP and CBP. The variable bandwidth allocation scheme using effective multicast traffic share improves performance in resource control and wireless channel utilization. These are the characteristic of standardization QoS. Simulation results demonstrate the effectiveness of the scheme.
    11/2009: pages 136-150;
  • Chen Huang, Furong Wang, Bin Dai, Bo Zhang
    [show abstract] [hide abstract]
    ABSTRACT: Wireless ad hoc network (MANET) has been adopted in many applications. It usually has limited bandwidth and computational capacity, so it may prefer fewer transmissions in the network. It is vital for one node to minimize the transmission delay. Traditional optimization algorithm tended to achieve the best performance only for some nodes in the network while neglecting others. In this work, we investigate a simple and effective routing protocol for service time allocation in wireless Ad hoc network We obtain an accurate parameter that can reflect the service time received by one node. Our aim is to provide low computational data distribution service for all the nodes in wireless Ad hoc network.
    Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on; 10/2009
  • Kewei Li, Furong Wang, Xu Xie, Hao Wang
    [show abstract] [hide abstract]
    ABSTRACT: In this paper, we propose the distributed algorithm for joint optimal cross-layer design in multi-radio multi-channel multi-hop networks. The main objective of this work is to joint optimize injected rate and resource allocation in MRMC networks. In this regard, we formulate the optimal design problem as a mathematic programming where the channel load and input traffic are jointly optimized under the interference limited model. To solve this programming effectively, we decompose the problem to some sub-problems, which are conducted in parallel at each node. The algorithms can be viewed as jointly optimization on the link layer and the transport layer so that end-to-end objectives are met. We provide simulations show that the proposed distributed algorithm is highly efficient for MRMC networks.
    Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on; 10/2009
  • Hao Wang, Furong Wang, Zhiwu Ke, Zhe Guo
    [show abstract] [hide abstract]
    ABSTRACT: In order to ensure the quality of broadband service in cellular networks, bandwidth resources are required more and more. But the wireless bandwidth resources in a cell are limited and fixed. A QoS-adaptive bandwidth allocation scheme based on measurement report real-time analysis is presented in the paper. It makes use of the measurement report frames and normalized QoS level to maximize the weight sum of QoS. The effectiveness of the scheme is proved by simulation results.
    Wireless Communications, Networking and Mobile Computing, 2009. WiCom '09. 5th International Conference on; 10/2009
  • Kewei Li, Qingwei Liu, Furong Wang, Xu Xie
    [show abstract] [hide abstract]
    ABSTRACT: We focus on designing a distributed algorithm for joint optimal congestion control and channel assignment in multi-radio multi-channel Cyber-Physical networks. The design problem is formulated as a network utility maximization subject to some constraints, which is a mixed-integer non-linear programming (MINLP). We propose a near-optimal distributed algorithm to solve this MINLP by the Lagrange dual decomposition and prove the convergence of this algorithm. Simulations show that the results obtained by the proposed distributed algorithm are very close to the optimal results obtained by the centralized branch and bound method.
    Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC '09. Symposia and Workshops on; 08/2009
  • [show abstract] [hide abstract]
    ABSTRACT: Security has become a primary concern for providing communication in mobile ad hoc networks(MANET). Compared with a fixed network, a MANET is more vulnerable to attacks such as passive eavesdropping, data tampering and so on, so it is necessary to encrypt transmitted data to ensure its confidentiality. However, in a resource-constrained MANET, the mobile devices have limited capabilities in computation, storage and power, a single source node can not afford the whole encryption task. In this paper, we propose a relay encryption scheme based on threshold secret sharing algorithm, to enhance the data confidentiality, reliability and integrality in MANET. The basic idea is to distribute the whole encryption task to all nodes along the route, every node completes part of the encryption task instead of the single source node encrypting the whole data. In the relay encryption scheme, we divide the whole data into N shares by (T,N) threshold secret sharing algorithm. On the routing path, every node chooses several unencrypted shares and encrypts them separately. With the appropriate value of (T,N) and allocation principle for the number of shares encrypted on each node along the route, the relay encryption scheme can effectively alleviate the burden of the source node and reduce the transmission delay, meanwhile it provides a high level of security, and also improves the reliability of MANET.
    Ubiquitous, Autonomic and Trusted Computing, 2009. UIC-ATC '09. Symposia and Workshops on; 08/2009
  • [show abstract] [hide abstract]
    ABSTRACT: Directional antennas in Ad hoc networks offer more benefits than the traditional antennas with omni-directional mode. With directional antennas, it can increase the spatial reuse of the wireless channel. A higher gain of directional antennas makes terminals a further transmission range and fewer hops to the destination. This paper presents the design, implementation and simulation results of a multi-channel Medium Access Control (MAC) protocols for dense Vehicular Ad hoc Networks using directional antennas with local beam tables. Numeric results show that our protocol performs better than the existing multi-channel protocols in vehicular environment.
    Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE; 05/2009
  • [show abstract] [hide abstract]
    ABSTRACT: Recently, cooperative communication is shown to be a promising approach to achieve spatial diversity. The performance improvement by cooperative communication heavily depends on selecting suitable relay node. Therefore, designing effective relay assignment algorithm becomes critical in wireless cooperative networks. Although many studies focus on relay assignment problem, none of them concerns the interference problem, produced by relay nodes. In this paper, we investigate how the interference impacts the relay assignment problem. In addition, we give a relay assignment algorithm with interference mitigation for cooperative communication.
    Wireless Communications and Networking Conference, 2009. WCNC 2009. IEEE; 05/2009
  • Hao Wang, Furong Wang, Xu Xie, Kewei Li
    [show abstract] [hide abstract]
    ABSTRACT: A new Variable Bandwidth Scheme (VBS) for channel resources predictive control and call admission control in cellular networks is presented in the paper. VBS mainly aims to the QoS enhancement of cellular networks. Compared with the Time-based Channel Predictive Control (TCPC) schemes, VBS has a good performance in Call Dropping Probability (CDP) and Call Blocking Probability (CBP). Moreover, considering the resource control and wireless channel utilization, VBS outperforms the other schemes. An analytical model has been developed. Simulation results demonstrate the effectiveness of the proposed scheme.
    Advanced Science and Technology, International e-Conference on. 03/2009;
  • Xu Xie, Furong Wang, Hao Wang, Kewei Li
    [show abstract] [hide abstract]
    ABSTRACT: Directional antennas can increase the spatial reuse of the wireless channels and reach a higher antenna gain. This paper presents the design, implementation and simulation results of a multi-channel medium access control protocols for high density vehicular ad hoc networks using directional antennas with local beam tables. Simulation shows that our protocol has a higher throughput than the existing multi-channel protocols.
    Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference on; 01/2009
  • [show abstract] [hide abstract]
    ABSTRACT: Saving energy is one of the key problems of applying wireless sensor network. Clustering and sleeping scheme have good influence on prolonging of lifetime of network and enhancing of energy efficiency. This paper proposes a dynamic sleeping algorithm basing on analytic hierarchy process (AHP), under the condition of heterogeneous industrial sensor clustered-networks. The simulation result indicates that dynamic sleeping algorithm basing on AHP is feasible. It has notable benefit on prolonging of lifetime of network and enhancing of energy efficiency.
    Future Generation Communication and Networking, 2008. FGCN '08. Second International Conference on; 01/2009