scispace - formally typeset
X

Xiaoyan Hong

Researcher at University of Alabama

Publications -  149
Citations -  6826

Xiaoyan Hong is an academic researcher from University of Alabama. The author has contributed to research in topics: Wireless ad hoc network & Optimized Link State Routing Protocol. The author has an hindex of 33, co-authored 149 publications receiving 6650 citations. Previous affiliations of Xiaoyan Hong include University of California & Rice University.

Papers
More filters
Proceedings ArticleDOI

C-ICAMA, a centralized intelligent channel assigned multiple access for multi-layer ad-hoc wireless networks with UAVs

TL;DR: Centralized intelligent channel assigned multiple access (C-ICAMA) is a MAC layer protocol proposed for ground backbone nodes to access UAV (unmanned aerial vehicle) to solve the highly asymmetric data traffic in this tactical environment.
Journal ArticleDOI

Anonymous Geo-Forwarding in MANETs through Location Cloaking

TL;DR: This paper proposes protocols that use the destination position to generate a geographic area called an anonymity zone (AZ) that makes up the anonymity set, and designs techniques to further improve node anonymity and reduce communication overhead.
Proceedings ArticleDOI

Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption

TL;DR: This paper introduces fading function, which renders attributes “dynamic” and allows users to update each attribute separately and compares the design with CP-ABE and finds the scheme performs significantly better under certain circumstance.
Journal ArticleDOI

Situation-aware trust architecture for vehicular networks

TL;DR: To deploy SAT, identity-based cryptography is utilized to integrate entity trust, data trust, security policy enforcement, and social network trust, allocating a unique identity, and a set of attributes for each entity.
Proceedings ArticleDOI

A new set of passive routing attacks in mobile ad hoc networks

TL;DR: It is demonstrated that existing ad hoc routing protocols are vulnerable to passive attacks, and it is concluded that ad hoc networks deployed in hostile environments need new countermeasures to resist such passive attacks.