scispace - formally typeset
C

Chuang Lin

Researcher at Tsinghua University

Publications -  10
Citations -  120

Chuang Lin is an academic researcher from Tsinghua University. The author has contributed to research in topics: Wireless sensor network & Linear network coding. The author has an hindex of 6, co-authored 10 publications receiving 117 citations.

Papers
More filters
Proceedings ArticleDOI

The Redeployment Issue in Underwater Sensor Networks

TL;DR: This paper proposes a coverage rate definition scheme and introduces two redeployment algorithms, one based on adding new nodes while the other one is by the means of moving redundant ones, which show the importance of redeploying nodes in the underwater environment.
Journal ArticleDOI

A Distributed Fault/Intrusion-Tolerant Sensor Data Storage Scheme Based on Network Coding and Homomorphic Fingerprinting

TL;DR: This paper proposes a distributed fault/intrusion-tolerant data storage scheme based on network coding and homomorphic fingerprinting in volatile WSNs environments that can fast locate incorrect fragments and then initialize data maintenance.
Proceedings ArticleDOI

A Study of Forward Error Correction Schemes for Reliable Transport in Underwater Sensor Networks

TL;DR: ADELIN is introduced: an adaptive reliable transport protocol for underwater sensor networks and it is shown that it succeeds in a better probability and energy tradeoff for both single- and multi-hop communications.
Proceedings ArticleDOI

Security authentication of 3G-WLAN interworking

TL;DR: This paper introduces the architectures of 3G-WLAN interworking and discusses existing problems related to authentication and key agreement procedures, and presents two schemes by applying authentication based on EAP-TLS and Eap-TTLS into integrated 3G and WLAN to achieve high end-to-end security and authentication for the users.
Proceedings ArticleDOI

A Novel Cookie-Based DDoS Protection Scheme and its Performance Analysis

TL;DR: A cookie-based scheme to protect systems from DoS and DDoS attacks is extended and a novel queuing network model is adopted to analyze this scheme by estimating two essential metrics, i.e. the mean total response time and the mean queue length of MAP.