scispace - formally typeset
Search or ask a question
Author

Ming-Yang Su

Bio: Ming-Yang Su is an academic researcher from Ming Chuan University. The author has contributed to research in topics: Hybrid positioning system & Positioning system. The author has an hindex of 2, co-authored 2 publications receiving 220 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: This study employs ns2 to validate the effect of the proposed IDS deployment, as IDS nodes can rapidly block a malicious node, without false positives, if a proper threshold is set.

192 citations

Journal ArticleDOI
TL;DR: The numerical simulations and experimental results show that not only the calibrating and positioning algorithm of the RPM algorithm can improve the accuracy of an indoor WiFi locating system and alleviate the phenomenon of aliasing in the signal space, but also the estimating and tracking method of the KF algorithm can overcome the problem of the aliasing and reduce the positioning error with smaller sampling time.

45 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper surveys the existing solutions of the black hole attack, discusses the state-of-the-art routing methods, and analyzes the categories of these solutions to provide a comparison table.
Abstract: The black hole attack is one of the well-known security threats in wireless mobile ad hoc networks. The intruders utilize the loophole to carry out their malicious behaviors because the route discovery process is necessary and inevitable. Many researchers have conducted different detection techniques to propose different types of detection schemes. In this paper, we survey the existing solutions and discuss the state-of-the-art routing methods. We not only classify these proposals into single black hole attack and collaborative black hole attack but also analyze the categories of these solutions and provide a comparison table. We expect to furnish more researchers with a detailed work in anticipation.

261 citations

Proceedings ArticleDOI
07 Jan 2012
TL;DR: A survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs are presented.
Abstract: MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration, as a result, they are vulnerable to different types of attacks in different layers of protocol stack. Each node in a MANET is capable of acting as a router. Routing is one of the aspects having various security concerns. In this paper, we will present survey of common Denial-of-Service (DoS) attacks on network layer namely Wormhole attack, Black hole attack and Gray hole attack which are serious threats for MANETs. We will also discuss some proposed solutions to detect and prevent these attacks. As MANETs are widely used in many vital applications, lots of research work has to be done to find efficient solutions against these DoS attacks that can work for different routing protocols.

222 citations

Book ChapterDOI
02 Sep 2013
TL;DR: This paper introduces an ontology design pattern for semantic trajectories and discusses the formalization of the pattern using the Web Ontology Language (OWL) and applies the pattern to two different scenarios, personal travel and wildlife monitoring.
Abstract: Trajectory data have been used in a variety of studies, including human behavior analysis, transportation management, and wildlife tracking. While each study area introduces a different perspective, they share the need to integrate positioning data with domain-specific information. Semantic annotations are necessary to improve discovery, reuse, and integration of trajectory data from different sources. Consequently, it would be beneficial if the common structure encountered in trajectory data could be annotated based on a shared vocabulary, abstracting from domain-specific aspects. Ontology design patterns are an increasingly popular approach to define such flexible and self-contained building blocks of annotations. They appear more suitable for the annotation of interdisciplinary, multi-thematic, and multi-perspective data than the use of foundational and domain ontologies alone. In this paper, we introduce such an ontology design pattern for semantic trajectories. It was developed as a community effort across multiple disciplines and in a data-driven fashion. We discuss the formalization of the pattern using the Web Ontology Language (OWL) and apply the pattern to two different scenarios, personal travel and wildlife monitoring.

116 citations

Journal ArticleDOI
TL;DR: A Modified Dynamic Source Routing Protocol (MDSR) to detect and prevent selective black hole attack and an Intrusion Detection System (IDS) where the IDS nodes are set in promiscuous mode only when required, to detect the abnormal difference in the number of data packets being forwarded by a node.

102 citations

Journal ArticleDOI
TL;DR: A structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms is provided.
Abstract: In recent years, Mobile Ad hoc NETworks MANETs have generated great interest among researchers in the development of theoretical and practical concepts, and their implementation under several computing environments. However, MANETs are highly susceptible to various security attacks due to their inherent characteristics. In order to provide adequate security against multi-level attacks, the researchers are of the opinion that detection-based schemes should be incorporated in addition to traditionally used prevention techniques because prevention-based techniques cannot prevent the attacks from compromised internal nodes. Intrusion detection system is an effective defense mechanism that detects and prevents the security attacks at various levels. This paper tries to provide a structured and comprehensive survey of most prominent intrusion detection techniques of recent past and present for MANETs in accordance with technology layout and detection algorithms. These detection techniques are broadly classified into nine categories based on their primary detection engine/s. Further, an attempt has been made to compare different intrusion detection techniques with their operational strengths and limitations. Finally, the paper concludes with a number of future research directions in the design and implementation of intrusion detection systems for MANETs. Copyright © 2016 John Wiley & Sons, Ltd.

72 citations