With the rapid evolvement of information science, data-oriented research has solicited a new philosophy for the future mobile network and security design, since it can not only encourage new designs achieving more efficient and reliable networks, but also pose new challenges towards security designs. In this dissertation, we propose four novel data-oriented designs or frameworks to prompt or calibrate the performance with respect to efficiency, reliability, and security. In the wireless domain, packet corruption and packet collision are two major threats that jeopardize the performance of a mobile network. To cope with the packet corruption, we propose the STAteful inter-Packet signaL procEssing (STAPLE) framework, which is an inter-packet ...
The goal of this thesis is to architect robust protocols that overcome disruptions and enable applic...
This architecture is collusion proof, requires relatively high computational capacity in the source ...
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-...
With the rapid evolvement of information science, data-oriented research has solicited a new philoso...
In the past few decades, networked systems have revolutionized, among other things, the way we commu...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
dissertationCross layer system design represents a paradigm shift that breaks the traditional layer-...
There are trade-offs between security, reliability and performance. In this dissertation, we conside...
A fundamental goal of mobile network service providers is to guarantee the networking services' reli...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
Survivability is usually defined as the capability of a network to deliver data successfully in a ti...
Cybersecurity has become an increasingly important concern for both military and civilian infrastruc...
The demand for bandwidth is elevating in today’s networks. However, security threats and attacks are...
Wireless networking is ubiquitous in IoT applications, edge computing, cellular and tactical network...
Today’s smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc commu...
The goal of this thesis is to architect robust protocols that overcome disruptions and enable applic...
This architecture is collusion proof, requires relatively high computational capacity in the source ...
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-...
With the rapid evolvement of information science, data-oriented research has solicited a new philoso...
In the past few decades, networked systems have revolutionized, among other things, the way we commu...
This dissertation studies how information-theoretically secure mechanisms for confidentiality and da...
dissertationCross layer system design represents a paradigm shift that breaks the traditional layer-...
There are trade-offs between security, reliability and performance. In this dissertation, we conside...
A fundamental goal of mobile network service providers is to guarantee the networking services' reli...
Wireless network access protocols are used in numerous safety critical applications. Network availab...
Survivability is usually defined as the capability of a network to deliver data successfully in a ti...
Cybersecurity has become an increasingly important concern for both military and civilian infrastruc...
The demand for bandwidth is elevating in today’s networks. However, security threats and attacks are...
Wireless networking is ubiquitous in IoT applications, edge computing, cellular and tactical network...
Today’s smartphones, tablets, and notebooks are equipped with Wi-Fi Direct (the de facto adhoc commu...
The goal of this thesis is to architect robust protocols that overcome disruptions and enable applic...
This architecture is collusion proof, requires relatively high computational capacity in the source ...
In wireless mobile ad hoc networks, packet delivery is achieved through two closely related network-...