T2WISTOR: TTU Wireless Mobile Networking Laboratory

 

    
We design, analyze, evaluate, and simulate and/or implement protocols, algorithms, and systems in the areas of Cybersecurity, Mobile Data Management and Privacy, Embedded Networked Systems, Cyber-Physical Systems, Unmanned Aerial Vehicles, Energy Harvesting Motivated Networks, Evacuation Assisting Networks, and Wireless Networks and Mobile Computing.


Detection and Countermeasure to Selective Forwarding Attacks
  • A malicious node may randomly or strategically drop any incoming packet in order to disrupt network protocols or interfere with on-going communications on purpose. It is not trivial to identify a malicious forwarding misbehavior from temporal node failures or packet collisions. The goals of this research are to detect forwarding misbehaviors and develop a countermeasure to selective forwarding attacks to deliver sensory data securely and reliably in energy-constrained wireless networks.

Energy Harvesting Sensitive Communications in Embedded Networked Systems
  • Wireless and mobile wearable devices are increasingly popular and rapidly emerging as the next generation of ubiquitous communications in the Internet-of-Things (IoT). Due to a limited amount of battery energy, however, there has been a great deal of research efforts on the developing various energy aware techniques. The goals of this research are to understand underlying properties of vibration energy harvesting and practical obstacles, and design vibration energy harvesting aware algorithms and communication protocols embedded in the Link/Net layers.

Cooperative and Self-Tuned Mobile Data Management
  • In order to fulfill mobile users insatiable interests in accessing Internet services and information wirelessly, one of the key optimization techniques is caching frequently accessed data items in a local cache. Caching techniques can relieve the network traffic and improve information accessibility and availability. The goals of this research are to design diverse cache-based data access strategies to deal with a flexible consistency, deliver sensory data securely and reliably, and support applications with diverse consistency requirements.
  • B. Jung, S. Lim, J. Chae, and C. Pu, Validity Region Sensitive Query Processing Strategies in Mobile Ad Hoc Networks, IEEE Military Communications Conference (MILCOM) - Track 2. Networking Protocols and Performance, Nov 2016 (MILCOM 2016 Travel Grant Award) 
  • S. Lim, Y. Lee, J. Cheon, M. Min, and Wei Wang, User-Defined Consistency Sensitive Cache Invalidation Strategies for Wireless Data Access, Computer Communications, Elsevier, 2014
  • S. Lim, C. Yu, and C. R. Das, Cache Invalidation Strategies for Internet-based Vehicular Ad Hoc Networks, Computer Communications Journal, 35(3):380–391, 2012
  • S. Lim, Y. Lee, and M. Min. ConSens: Consistency-Sensitive Opportunistic Data Access in Wireless Networks, In Proc. MILCOM, pp. 804–809, 2011
  • S. Lim and S. Choi, On Improving Robustness in Partitionable Internet-based Mobile Ad Hoc Networks, Computing And Informatics – Special Issue on Intelligent Multimedia System and Data Management for Ubi-Com, 30(3):429–449, 2011
  • S. Lim, C. Yu, and C. R. Das, Cooperative Cache Invalidation Strategies for Internet-based Vehicular Ad Hoc Networks, In Proc. The 18th IntĄŻl Conf. on Computer Communications and Networks (ICCCN), pp. 1–6, 2009
  • S. Lim, S. Chae, C. Yu, and C. R. Das, On Cache Invalidation for Internet-based Vehicular Ad Hoc Networks, In Proc. 2nd IntĄŻl Workshop on Mobile Vehicular Networks (MoVeNet 2008) in conjunction with 5th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (IEEE MASS 2008), 2008
  • S. Lim,W. Lee, G. Cao, and C. R. Das, Cache Invalidation Strategies for Internet-based Mobile Ad Hoc Networks, Computer Communications Journal, 30(8):1854–1869, 2007
  • S. Lim, W. Lee, G. Cao, and C. R. Das, A Novel Caching Scheme for Improving Internet-based Mobile Ad Hoc Networks Performance, Ad Hoc Networks Journal, 4(2):225–239, 2006
  • S. Lim, W. Lee, G. Cao, and C. R. Das, Performance Comparison of Cache Invalidation Strategies for Internet-based Mobile Ad Hoc Networks, In Proc. IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS), pp. 104–113, 2004 (Acceptance rate ~ 25%, Best Paper Candidate)
  • S. Lim,W. Lee, G. Cao, and C. R. Das, A Novel Caching Scheme for Internet based Mobile Ad Hoc Networks, In Proc. 12th International Conference on Computer Communications and Networks (ICCCN), pp. 38–43, 2003

Evacuation Assiting Communications and Networks
  • Climate change is being considered as one of the top five threats to U.S. and its interests, as observed in a recent poll for national security leaders. With climate change, both the number and severity of unexpected natural disasters are increasing. Recent natural and man-made disasters such as Sandy (2012) and Fukushima nuclear power plant (2011) make efficient evacuation route planning and routing more important than ever. Conventional sign-based evacuation route and its information are limited to use in a life-threatening environment. The goals of this research are to design efficient data dissemination and route planning algorithms for improving evacuation processes in the presence of disasters.
  • M. Min and S. Lim, Segmented Arrival Graph based Evacuation Plan Assessment Algorithm Using Linear Programming, To appear, In Proc. IEEE Int'l Systems Conference (SysCon), 2017
  • N. Patel, M. Min, and S. Lim, Effective evacuation route planning algorithms by updating earliest arrival time of multiple paths, In Proc. IEEE Int'l Systems Conference (SysCon), 2016
  • M. Min, J. Lee, and S. Lim, Effective evacuation route planning algorithms by updating earliest arrival time of multiple paths, In Proc. ACM SIGSPATIAL International Workshop on Mobile Geographic Information Systems (MobiGIS) in conjunction with ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems (ACM SIGSPATIAL GIS), 2014

Scalable and Reliable Data Dissemination in Resource-Constrained Networks
  • As Internet-of-Things (IoT) and its applications are increasingly popular, where diverse multi-scale sensors and devices are seamlessly blended for ubiquitous communication infrastructure, broadcast operation still plays an essential role in scalable information dissemination to enhance information accessibility and availability. The goals of this research are to design scalable and reliable algorithms and associated communication protocols for multi-hop resource-constrained networks.
  • C. Liang, S. Lim, M. Min, and W. Wang, TCast: A Transitional Region Aware Broadcast Protocol in Variable Wireless Link Qualities, In Proc. IEEE Consumer Communications & Networking Conference (CCNC) - Wireless Networking and Mobility, 2016
  • C. Liang, S. Lim, M. Min, and W. Wang, Pseudo Geometric Broadcast Protocols in Wireless Sensor Networks: Design, Evaluation, and Analysis, Computer Communications Journal, Submitted and Under-reviewed, 2015
  • C. Liang, S. Lim, M. Min, and W. Wang, Network Coverage Sensitive Pseudo Geometric Broadcast Protocols in Wireless Sensor Networks, In Proc. IEEE Consumer Communications & Networking Conference (CCNC) – Wireless Networking and Mobility, pp. 545–550, 2015
  • C. Liang, S. Lim, M. Min, and W. Wang, Geometric Broadcast Without GPS Support in Dense Wireless Sensor Networks, In Proc. IEEE Consumer Communications & Networking Conference (CCNC) – Smart Spaces and Wireless Networks, pp. 696–701, 2014
  • S. Lim, C. Yu, and C. R. Das, Realistic Mobility Model for Wireless Networks of Scale-Free Node Connectivity, International Journal of Mobile Communications (IJMC), 8(3):351–369, 2010
  • S. Lim, C. Yu, and C. R. Das, RandomCast: An Energy Efficient Communication Scheme for Mobile Ad Hoc Networks, IEEE Trans. on Mobile Computing, 8(3):351–369, 2009
  • S. Lim, C. Yu, and C. R. Das, Randomized Overhearing to Improve Routing and Energy Performance in Mobile Ad Hoc Networks, Nova Science Publishers Inc. (ISBN 1-60021-277-8), 2006, In Performance Analysis of Mobile and Ad Hoc Networks, Chapter 6.
  • S. Lim, C. Yu, and C. R. Das, Clustered Mobility Model for Scale-Free Wireless Networks, In Proc. The 31st IEEE Conference on Local Computer Networks (LCN), pp. 231–238, 2006
  • S. Lim, C. Yu, and C. Das, Rcast: A Randomized Communication Scheme for Improving Energy Efficiency in Mobile Ad Hoc Networks, In Proc. IEEE IntĄŻl Conference on Distributed Computing Systems (ICDCS), pp. 123–132, 2005 (Acceptance rate ~ 14.3%)