X
Xiaoyan Hong
Researcher at University of Alabama
Publications - 149
Citations - 6826
Xiaoyan Hong is an academic researcher from University of Alabama. The author has contributed to research in topics: Wireless ad hoc network & Optimized Link State Routing Protocol. The author has an hindex of 33, co-authored 149 publications receiving 6650 citations. Previous affiliations of Xiaoyan Hong include University of California & Rice University.
Papers
More filters
Proceedings ArticleDOI
C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs
TL;DR: Centralized intelligent channel assigned multiple access (C-ICAMA) is a MAC layer protocol proposed for ground backbone nodes to access UAV (unmanned aerial vehicle) to solve the highly asymmetric data traffic in this tactical environment.
Journal ArticleDOI
Anonymous Geo-Forwarding in MANETs through Location Cloaking
TL;DR: This paper proposes protocols that use the destination position to generate a geographic area called an anonymity zone (AZ) that makes up the anonymity set, and designs techniques to further improve node anonymity and reduce communication overhead.
Proceedings ArticleDOI
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption
TL;DR: This paper introduces fading function, which renders attributes “dynamic” and allows users to update each attribute separately and compares the design with CP-ABE and finds the scheme performs significantly better under certain circumstance.
Journal ArticleDOI
Situation-aware trust architecture for vehicular networks
TL;DR: To deploy SAT, identity-based cryptography is utilized to integrate entity trust, data trust, security policy enforcement, and social network trust, allocating a unique identity, and a set of attributes for each entity.
Proceedings ArticleDOI
A new set of passive routing attacks in mobile ad hoc networks
TL;DR: It is demonstrated that existing ad hoc routing protocols are vulnerable to passive attacks, and it is concluded that ad hoc networks deployed in hostile environments need new countermeasures to resist such passive attacks.