The future fifth-generation (5G) mobile communications system has already become a focus around t... more The future fifth-generation (5G) mobile communications system has already become a focus around the world. A large number of late-model services and applications including high definition visual communication, internet of vehicles, multimedia interaction, mobile industry automation, and etc, will be added to 5G network platform in the future. Different application services have different security requirements. However, the current user authentication for services and applications: Extensible Authentication Protocol (EAP) suggested by the 3GPP committee, is only a unitary authentication model, which is unable to meet the diversified security requirements of differentiated services. In this paper, we present a new diversified identity management as well as a flexible and composable three-factor authentication mechanism for different applications in 5G multi-service systems. The proposed scheme can provide four identity authentication methods for different security levels by easily splitting or assembling the proposed three-factor authentication mechanism. Without a design of several different authentication protocols, our proposed scheme can improve the efficiency, service of quality and reduce the complexity of the entire 5G multi-service system. Performance analysis results show that our proposed scheme can ensure the security with ideal efficiency.
WiFi-based Long Distance (WiLD) mesh networks have been widely deployed with the intention of bri... more WiFi-based Long Distance (WiLD) mesh networks have been widely deployed with the intention of bringing extremely low-cost Internet connectivity to the rural areas worldwide. Prior studies do not discuss performance degradation in outdoor 802.11g links caused by faulty driver/card-specific proprietary algorithms and have fewer investigations on the impact of external WiFi interferences in terms of burst loss on WiLD 802.11g
ABSTRACT Authentication and key distribution (AKD) protocols become more and more important in th... more ABSTRACT Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency and the robustness of security. In this paper, we first analyze the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then, we propose an enhanced AKD protocol to overcome those vulnerabilities with the security functionality to prevent those malicious attacks. Security analysis and formal verification mainly by using AVISPA toolkit show that the proposed protocol is secure against those attacks.
Symmetrical services are multimedia applications such as voice over Internet Protocol, video conf... more Symmetrical services are multimedia applications such as voice over Internet Protocol, video conferencing and other applications that require both uplink and downlink connectivity. Both uplink and downlink must be considered simultaneously to evaluate the performances. Conventional metrics such as throughput, delay and packet loss can only measure the performances in a single direction, thus it may not be suitable to illustrate the performances from symmetrical perspectives. Using complex number and graph theory, we present a formula that can measure uplink and downlink performances simultaneously. Substituting conventional metrics in this formula presents new symmetrical metrics. Furthermore, the formula provides the advantage of converting symmetrical metrics to conventional metrics as well. This gives us the flexibility to use symmetrical or conventional metrics. At the end of this paper, we present a range of simulation experiments in orthogonal frequency division multiple access (OFDMA) based wireless network to investigate different resource allocation schemes. The results of the proposed metrics show that we can analyze and observe the performances more efficiently as compared to using conventional metrics.
Transmission power control in wireless ad hoc networks has been widely studied in the academia. I... more Transmission power control in wireless ad hoc networks has been widely studied in the academia. In this paper, we propose a new multiple access scheme for power-controlled transmission rate-adaptive ad hoc networks. The proposed scheme exploits the features of physical layer specified by IEEE 802.11a standard in the ad hoc network environment. The proposed cross-layer design explicitly provides different transmission rates for data transmission by tuning transmission power with favorable SINK. The simulation results have proved it to be an effective and efficient MAC protocol in the wireless ad hoc networks
The upcoming 5G ultra wideband mobile network is expected to provide a fundamental framework for ... more The upcoming 5G ultra wideband mobile network is expected to provide a fundamental framework for a huge number of devices, which indicates the presence of dynamical users join and leave events. Due to highly heterogeneous architecture, it is crucial to address security in 5G HetNets. In this paper, we focus on presenting a mutual physical layer handover authentication approach for software-defined networking (SDN) assisted 5G HetNets. The legitimacy of user equipment (UE) and access points (AP) are both verified based on extracted physical layer characteristics of wireless channel links with the help of base station (BS). Furthermore, a verification is employed to enhance authentication performance. The parameters of are discussed in our simulations and Figure of Merit (FoM) is applied in the simulation to evaluate the performance of proposed authentication scheme.
Abstract QoS service provisioning is an important issue for deploying broadband wireless access n... more Abstract QoS service provisioning is an important issue for deploying broadband wireless access networks with real-time and non real-time traffic integrated. In order to achieve high utilization while providing different QoS supports to various applications, a QoS ...
Datagram Congestion Control Protocol (DCCP) is a transport protocol fits for real-time multimedia... more Datagram Congestion Control Protocol (DCCP) is a transport protocol fits for real-time multimedia applications by processing congestion control and unreliable transmission. DCCP takes on a good performance in wired network while causes a substantial decline in wireless networks. This paper analyzes DCCP CCID-3 in wireless ad hoc networks and mainly focuses on two factors that impact the protocol performance of throughput, loss event rate and RTT. With these, the paper proposes an improved transport algorithm based on CCID-3. First, we use the ACK arrival rate to detect the loss event and assign the loss of ACK computational weight. Second, we improve the calculation of RTT by replacing the value estimated in transport layer with the theoretical computed value. We evaluate our proposal in NS-2, and the simulation results show that compared with standard CCID-3, our proposal can enhance the performance of throughput both in static chain topology and in random moving scenario.
IEEE Std 802.11i [1] has specified the security functionality of wireless local area networks (WL... more IEEE Std 802.11i [1] has specified the security functionality of wireless local area networks (WLANs). However, two types of DoS attacks have been disclosed which could block the 4-way handshake procedure [2]. Some improvements over them have been investigated. But all of them have obvious drawbacks. In this paper, we address the security issue in WLANs and analyze the operations of the 4-way handshake protocol. Based on the insight of the protocol and the existing potential vulnerabilities under the DoS attacks, we propose an enhancement solution to protect the protocol from DoS attacks. Compared with other existing works, our solution is more effective and efficient. Colored Petri Nets (CPN) has been employed to formally verify our solution.
This paper presents the design and implementation of a smart home system in the context of Intern... more This paper presents the design and implementation of a smart home system in the context of Internet of Things (IoT) with Ethereum private Blockchain, Raspberry Pi, Blynk platform, DHT11 temperature and humidity sensors. By Raspberry Pi, it collects real-time room humidity and temperature information by DHT11. The data is then uploaded to the Blynk App, which is stored on the smart contract deployed with the Ethereum private Blockchain. When the real-time humidity or temperature value exceeds a predefined threshold value, warnings are given by turning on LEDs. The system functions as a proof-of-concept prototype, showing the feasibility of applying blockchain in smart homes with IoT functionalities.
Due to the harsh surroundings, a underwater acoustic sensor network (UASN) may suffer large scale... more Due to the harsh surroundings, a underwater acoustic sensor network (UASN) may suffer large scale damage where many nodes fail simultaneously causing the network to get partitioned into multiple disjoint segments. In this work, we studied the crucial issue to reestablish the network connectivity with the least number of relay nodes which is NP-hard in general. To solve the problem efficiently, this paper proposes a novel heuristic scheme for UASNs which works based on a 3 dimensional (3D) architecture. The proposed scheme consists of two algorithms, named as Alternative Tree Construction and Fermat-point Selection (ATCFS) as a whole. Extensive simulation experiments demonstrate that the proposed scheme offers a simple yet attractive solution to the problem.
An effective scheduling scheme is critical for enhancing the capability of WiMAX mesh networks. I... more An effective scheduling scheme is critical for enhancing the capability of WiMAX mesh networks. In this paper, we propose an efficient cross-layer concurrent transmission scheduling algorithm to offer superior performance in a WiMAX mesh network. Through elaborating the scheduling strategy, available potential multiple links can be activated to enhance concurrent transmission. Furthermore, to increase the bandwidth efficiency, link transmission rates
The future fifth-generation (5G) mobile communications system has already become a focus around t... more The future fifth-generation (5G) mobile communications system has already become a focus around the world. A large number of late-model services and applications including high definition visual communication, internet of vehicles, multimedia interaction, mobile industry automation, and etc, will be added to 5G network platform in the future. Different application services have different security requirements. However, the current user authentication for services and applications: Extensible Authentication Protocol (EAP) suggested by the 3GPP committee, is only a unitary authentication model, which is unable to meet the diversified security requirements of differentiated services. In this paper, we present a new diversified identity management as well as a flexible and composable three-factor authentication mechanism for different applications in 5G multi-service systems. The proposed scheme can provide four identity authentication methods for different security levels by easily splitting or assembling the proposed three-factor authentication mechanism. Without a design of several different authentication protocols, our proposed scheme can improve the efficiency, service of quality and reduce the complexity of the entire 5G multi-service system. Performance analysis results show that our proposed scheme can ensure the security with ideal efficiency.
WiFi-based Long Distance (WiLD) mesh networks have been widely deployed with the intention of bri... more WiFi-based Long Distance (WiLD) mesh networks have been widely deployed with the intention of bringing extremely low-cost Internet connectivity to the rural areas worldwide. Prior studies do not discuss performance degradation in outdoor 802.11g links caused by faulty driver/card-specific proprietary algorithms and have fewer investigations on the impact of external WiFi interferences in terms of burst loss on WiLD 802.11g
ABSTRACT Authentication and key distribution (AKD) protocols become more and more important in th... more ABSTRACT Authentication and key distribution (AKD) protocols become more and more important in the design of wireless networks. The design criteria of the AKD protocols include the scalability, the communication efficiency, the computational efficiency and the robustness of security. In this paper, we first analyze the vulnerabilities of an AKD protocol for wireless networks under three types of attacks. Then, we propose an enhanced AKD protocol to overcome those vulnerabilities with the security functionality to prevent those malicious attacks. Security analysis and formal verification mainly by using AVISPA toolkit show that the proposed protocol is secure against those attacks.
Symmetrical services are multimedia applications such as voice over Internet Protocol, video conf... more Symmetrical services are multimedia applications such as voice over Internet Protocol, video conferencing and other applications that require both uplink and downlink connectivity. Both uplink and downlink must be considered simultaneously to evaluate the performances. Conventional metrics such as throughput, delay and packet loss can only measure the performances in a single direction, thus it may not be suitable to illustrate the performances from symmetrical perspectives. Using complex number and graph theory, we present a formula that can measure uplink and downlink performances simultaneously. Substituting conventional metrics in this formula presents new symmetrical metrics. Furthermore, the formula provides the advantage of converting symmetrical metrics to conventional metrics as well. This gives us the flexibility to use symmetrical or conventional metrics. At the end of this paper, we present a range of simulation experiments in orthogonal frequency division multiple access (OFDMA) based wireless network to investigate different resource allocation schemes. The results of the proposed metrics show that we can analyze and observe the performances more efficiently as compared to using conventional metrics.
Transmission power control in wireless ad hoc networks has been widely studied in the academia. I... more Transmission power control in wireless ad hoc networks has been widely studied in the academia. In this paper, we propose a new multiple access scheme for power-controlled transmission rate-adaptive ad hoc networks. The proposed scheme exploits the features of physical layer specified by IEEE 802.11a standard in the ad hoc network environment. The proposed cross-layer design explicitly provides different transmission rates for data transmission by tuning transmission power with favorable SINK. The simulation results have proved it to be an effective and efficient MAC protocol in the wireless ad hoc networks
The upcoming 5G ultra wideband mobile network is expected to provide a fundamental framework for ... more The upcoming 5G ultra wideband mobile network is expected to provide a fundamental framework for a huge number of devices, which indicates the presence of dynamical users join and leave events. Due to highly heterogeneous architecture, it is crucial to address security in 5G HetNets. In this paper, we focus on presenting a mutual physical layer handover authentication approach for software-defined networking (SDN) assisted 5G HetNets. The legitimacy of user equipment (UE) and access points (AP) are both verified based on extracted physical layer characteristics of wireless channel links with the help of base station (BS). Furthermore, a verification is employed to enhance authentication performance. The parameters of are discussed in our simulations and Figure of Merit (FoM) is applied in the simulation to evaluate the performance of proposed authentication scheme.
Abstract QoS service provisioning is an important issue for deploying broadband wireless access n... more Abstract QoS service provisioning is an important issue for deploying broadband wireless access networks with real-time and non real-time traffic integrated. In order to achieve high utilization while providing different QoS supports to various applications, a QoS ...
Datagram Congestion Control Protocol (DCCP) is a transport protocol fits for real-time multimedia... more Datagram Congestion Control Protocol (DCCP) is a transport protocol fits for real-time multimedia applications by processing congestion control and unreliable transmission. DCCP takes on a good performance in wired network while causes a substantial decline in wireless networks. This paper analyzes DCCP CCID-3 in wireless ad hoc networks and mainly focuses on two factors that impact the protocol performance of throughput, loss event rate and RTT. With these, the paper proposes an improved transport algorithm based on CCID-3. First, we use the ACK arrival rate to detect the loss event and assign the loss of ACK computational weight. Second, we improve the calculation of RTT by replacing the value estimated in transport layer with the theoretical computed value. We evaluate our proposal in NS-2, and the simulation results show that compared with standard CCID-3, our proposal can enhance the performance of throughput both in static chain topology and in random moving scenario.
IEEE Std 802.11i [1] has specified the security functionality of wireless local area networks (WL... more IEEE Std 802.11i [1] has specified the security functionality of wireless local area networks (WLANs). However, two types of DoS attacks have been disclosed which could block the 4-way handshake procedure [2]. Some improvements over them have been investigated. But all of them have obvious drawbacks. In this paper, we address the security issue in WLANs and analyze the operations of the 4-way handshake protocol. Based on the insight of the protocol and the existing potential vulnerabilities under the DoS attacks, we propose an enhancement solution to protect the protocol from DoS attacks. Compared with other existing works, our solution is more effective and efficient. Colored Petri Nets (CPN) has been employed to formally verify our solution.
This paper presents the design and implementation of a smart home system in the context of Intern... more This paper presents the design and implementation of a smart home system in the context of Internet of Things (IoT) with Ethereum private Blockchain, Raspberry Pi, Blynk platform, DHT11 temperature and humidity sensors. By Raspberry Pi, it collects real-time room humidity and temperature information by DHT11. The data is then uploaded to the Blynk App, which is stored on the smart contract deployed with the Ethereum private Blockchain. When the real-time humidity or temperature value exceeds a predefined threshold value, warnings are given by turning on LEDs. The system functions as a proof-of-concept prototype, showing the feasibility of applying blockchain in smart homes with IoT functionalities.
Due to the harsh surroundings, a underwater acoustic sensor network (UASN) may suffer large scale... more Due to the harsh surroundings, a underwater acoustic sensor network (UASN) may suffer large scale damage where many nodes fail simultaneously causing the network to get partitioned into multiple disjoint segments. In this work, we studied the crucial issue to reestablish the network connectivity with the least number of relay nodes which is NP-hard in general. To solve the problem efficiently, this paper proposes a novel heuristic scheme for UASNs which works based on a 3 dimensional (3D) architecture. The proposed scheme consists of two algorithms, named as Alternative Tree Construction and Fermat-point Selection (ATCFS) as a whole. Extensive simulation experiments demonstrate that the proposed scheme offers a simple yet attractive solution to the problem.
An effective scheduling scheme is critical for enhancing the capability of WiMAX mesh networks. I... more An effective scheduling scheme is critical for enhancing the capability of WiMAX mesh networks. In this paper, we propose an efficient cross-layer concurrent transmission scheduling algorithm to offer superior performance in a WiMAX mesh network. Through elaborating the scheduling strategy, available potential multiple links can be activated to enhance concurrent transmission. Furthermore, to increase the bandwidth efficiency, link transmission rates
Uploads
Papers by Maode Ma