T2WISTOR:
TTU Wireless
Mobile Networking
Laboratory
We design, analyze, evaluate, simulate, and
implement protocols, algorithms, and systems in the areas of
Mobile Data
Management and Privacy, Cybersecurity, Aerial Computing, and Wireless Networks
and Mobile Computing.
NSF CNS EArly-concept Grants for Exploratory Research
(EAGER) Project
-
Education DCL: EAGER: Developing a Cyber-Aerial Computing Curriculum for
Improving Sky-of-Privacy-Things Education through a Modular-Based Integrated
Framework
Cooperative and Self-Tuned Caching and Mobile Data Querying:
- The goal of this research is to
design cache-based data access strategies to deal with a flexible
consistency, deliver sensory data securely and reliably, support
applications with diverse consistency requirements, and query mobile data
efficiently.
-
PQry: Privacy-Aware Spatial Querying
-
MQry: Querying Mobile Point-of-Interests
-
VRSense: Validity Region Aware Query Processing Strategies
-
T-Reduce: Route-Aware Mobile Trajectory Data Reduction
-
ConSense: User-defined Cache Consistency and Opportunistic Data Access
-
A Cooperative Data Access in Internet-based Vehicular Ad Hoc Networks
-
Mobile Data Management Strategies in Hybrid Wireless Networks
-
Cache Invalidation Strategies in Internet-based Mobile Ad Hoc Networks
Scalable and Reliable Data Dissemination:
- The goal of this research is to design scalable and
reliable algorithms and associated communication protocols for multi-hop
resource-constrained networks.
-
TCast: A Transition Region Aware Data Dissemination in Variable Link
Qualities
-
Performance Evaluation of GPS-Free Geometric Broadcast Strategies
-
Geometric Broadcast Without GPS Support in Dense Networks
-
RandomCast: A Randomized Communication Scheme for Energy-Efficient MANETs
-
Robustness and Clustered Mobility Model in Multi-hop Networks
Detection and Countermeasure to
Cyber Attacks:
- The goal of this research is to detect forwarding
misbehaviors and develop a countermeasure to selective forwarding attack and
its variants to deliver sensory data securely and reliably in
energy-constrained wireless networks.
-
Mitigating Suppression Attack in Multicast Protocol in Low Power and Lossy
Networks
-
Hop-by-Hop Cooperative Detection in Wireless
Sensor Networks
-
Spy vs. Spy: Camouflage-based Active Detection in
Energy Harvesting Motivated Networks
-
A Light-Weight Countermeasure to Selective
Forwarding Attacks
-
EYES: Mitigating Forwarding Misbehavior in Energy
Harvesting Motivated Networks
Data-Intensive Evacuation Assisting
and Post Disaster Relieving:
- The goal of this research is to
design efficient data dissemination/querying and route planning algorithms
for improving evacuation and expediting disaster relief operations.
-
Pocket-sized Drone based Scan-and-Locate for Expediting Earthquake Relief
-
Effective Evacuation Route Planning Algorith
ms
Segmented Arrival Graph based Evacuation Plan Assessment Algorithm
Evacuation Assisting Vehicular Ad Hoc Networks
Energy Harvesting
Aware IoT Devices:
- The goal of this research is to understand
underlying properties of vibration energy harvesting and practical
obstacles, and design vibration energy harvesting aware algorithms and
communication protocols.
-
Analysis of Vibration Motivated Energy Harvesting
-
Energy Harvesting Aware Light-Weight Forwarding
-
Medium Access Control Protocol for Self-Sustainable IoT Devices