Prof. Jing Deng's Research
Home |
Teaching |
Research |
Publications |
CV |
Misc
DISCLAIMER:
The PDF files are presented to ensure timely dissemination of
scholarly and technical work. Copyright and all rights therein are
retained by authors or by other copyright holders. All persons
copying this information are expected to adhere to the terms and
constraints invoked by each author's copyright. In most cases,
these works may not be reposted without the explicit permission of
the copyright holder.
Selected Grants
-
Air Force Research Laboratory, STTR Phase I,
"Dynamic Assured Routing Technology (DART) for IP Based Satellite Ad
Hoc Networks," Academic PI, amount: $30,000,
April 2012 - December 2012.
-
New Faculty Research Award, UNCG,
"Secure Information Delivery in Wireless Sensor Networks," PI,
amount: $5,000, August 2009 - August 2010.
-
Air Force Research Laboratory, SBIR Phase II,
"Secure Routing for Airborne Networks," Academic PI, amount: $120,000,
January 2009 - December 2010.
-
National Science Foundation EPSCoR Pilot Fund (Pfund),
"Multi-path Key Establishment in
Wireless Sensor Networks," PI, amount: $10,000, April 2008 - March 2009
(retracted).
-
Louisiana Space Consortium Research Enhancement Awards (LaSPACE REA),
"Energy Efficiency for Wireless Sensors in Space Explorations," PI,
amount: $25,075, April 2006 - March 2007.
-
Louisiana BoRSF Research Competitiveness Subprogram (RCS), "Extending
the Lifetime of Cluster-based Wireless Sensor Networks," PI, amount:
$107,898, July 2005 - June 2008.
-
National Science Foundation EPSCoR Pilot Fund (Pfund),
"Preventing Selfishness in Mobile Ad
Hoc Networks," PI, amount: $12,000, January 2005 - December 2005.
Students
I have the honor to work with the following students in my research
lab:
Current students:
Huda Abdnoor
Graduated students:
Bhoomika Siona,
Sugunakar Bholla,
Bharghav Yerravali,
Sharmista Parvathaneni,
Xiaocheng Zou,
Rahul Maram,
Nihar Kurapati,
Alexey Bogaeoskiv,
Spoorthy Nimmagadda,
Siddhiben Naik,
Yuan Kong,
Yanfen Song,
Huan Ge,
Zhiguo Zhang,
Mohamad Abdul Aziz Qayoom,
Noor Ottallah,
Kejun Liu,
Sreekanth Pagadala,
Irfanudin Ahmed,
Yacine Chikhi,
Kashyap Balakrishnan.
Sponsor
Our research is partly supported by Microsoft Windows Phone
Global Trial Program.
Research Areas
The following are selected publications. Please
see publications for a full reverse
chronicle order list.
We focus on several research areas in security. These include key
pre-distribution, misbehavior detection, covert transmission,
and information assurance.
Our key pre-distribution research concentrates on how to distribute
randomly-chosen key rings to wireless sensors prior to sensor
deployment. The goal is to allow sensors to share common keys with a
pre-defined probability. Security connectivity and vulnerability
against node capture or compromise are two of the main concerns.
-
L. Yao, C. Lin, J. Deng, F. Deng, J. Miao, and K. Yim,
"Biometrics-based Data Link Layer Anonymous Authentication in VANETs,"
in Proc. of the 7th International Conference on Complex,
Intelligent, and Software Intensive System (IMIS'13),
Taichung, Taiwan, July 3-5, 2013. to appear.
[PDF]
[BibTeX]
-
J. Deng
and Y. S. Han,
"Cooperative Secret Delivery in Wireless Sensor Networks,"
International Journal of Ad Hoc and Ubiquitous Computing,
2013. to appear.
[PDF]
[BibTeX]
-
P. Papadimitratos and
J. Deng,
"Stealthy pre-attacks against random key pre-distribution security,"
in Proc. of the IEEE International Conference on Communications -
Communication and Information Systems Security Symposium (ICC'12
CISS), Ottawa, Canada, June 10-15, 2012, pp. 955-959.
[PDF]
[BibTeX]
-
X. Zou and J. Deng,
"Detection of Fabricated CTS Packet Attacks in Wireless LANs,"
in Proc. of 7th International ICST Conference on Heterogeneous
Networking for Quality, Reliability, Security and Robustness
(QSHINE '10),
Houston, TX, USA, November 17-19, 2010. Invited Paper.
[PDF]
[BibTeX]
-
Y. Kong,
J. Deng, and
S. R. Tate,
"A Distributed Public Key Caching Scheme in Large Wireless Networks,"
in Proc. of IEEE Global Telecommunications Conference -
Communication & Information System Security (GLOBECOM '10),
Miami, FL, USA, December 6-10, 2010, pp. 1-5.
[PDF]
[BibTeX]
-
W. Du,
J. Deng,
Y. S. Han,
and P. K. Varshney,
"A Key Pre-distribution Scheme for Sensor Networks Using Deployment
Knowledge," IEEE Transactions on Dependable and
Secure Computing, vol. 3, no. 1, pp. 62-77,
January-March 2006.
[PDF]
[BibTeX]
-
W. Du,
J. Deng,
Y. S. Han,
P. K. Varshney,
J. Katz, and A. Khalili,
"A Pairwise Key Pre-Distribution Scheme for
Wireless Sensor Networks," ACM Transactions on
Information and System Security, vol. 8, no. 2, pp. 228-258,
May 2005.
[PDF]
[BibTeX]
- W. Du, J. Deng, Y. S. Han,
S. Chen, and P. K. Varshney,
"A Key Management Scheme for Wireless Sensor Networks Using Deployment
Knowledge," in Proc. of
the 23rd Conference of the IEEE Communications Society
(INFOCOM '04), Hong Kong, China, March 7-11, 2004,
pp. 586-597.
[PDF]
[BibTeX]
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney,
"A Pairwise
Key Pre-distribution Scheme for Wireless Sensor Networks,"
in Proc. of ACM
Conference on Computer and Communications Security (CCS '03),
Washington, DC, USA, October 27-31, 2003, pp. 42-51.
[PDF]
[BibTeX]
Since there are disconnected neighbors on the security plane
after the random key pre-distribution techniques are used, we
designed new mechanisms to efficiently deliver secret link keys
through multiple multi-hop secured paths and common bridge node. With
the use of information coding on multiple multi-hop secured paths, we
were able to achieve "just enough" redundancy combating information
leakage and alteration in transit. We also designed a technique termed
Babel, using a single common bridge node to deliver secret information
from a source to several insecure neighbors securely.
-
J. Deng and
Y. S. Han,
"Multi-path Key Establishment for Wireless Sensor
Networks Using Just Enough Redundancy Transmission,"
IEEE Transactions on Dependable and Secure Computing,
vol. 5, no. 3, pp. 177-190, July-September 2008.
[PDF]
[BibTeX]
-
J. Deng and
Y. S. Han,
"Babel: Using a Common Bridge Node to Deliver Multiple Keys in
Wireless Sensor Networks," in
Proc. of IEEE Global Telecommunications Conference - General
Symposium (GLOBECOM '07),
Washington, DC, USA, November 26-30, 2007, pp. 161-165.
[PDF]
[BibTeX]
In the area of information assurance, we proposed techniques to
mitigate the effects of routing misbehavior caused by selfish nodes or
users. Malicious attackers may also attack control messages such as
the CTS (Clear-To-Send) and ACK (Acknowledgment) packets. For
instance, when ACK packets are jammed by adversaries, the data packet
sender must re-transmit and this wastes the precious wireless
channel. We developed a technique to randomize the ACK packet
transmission within a window so that the adverse effect of ACK jamming
is mitigated. We also investigated fusion assurance in wireless sensor
networks and used a witness approach to improve data fusion assurance.
-
L. Yao, L. Kang, F. Deng, J. Deng, and G. Wu,
"Protecting Source-Location Privacy Based on Multi-Rings in Wireless
Sensor Networks," Wiley's Concurrency and Computation: Practice and
Experiecne, Special Issue on Trust and Security in Wireless Sensor
Networks, 2013. to appear.
[PDF]
[BibTeX]
-
J. Deng,
S. C.-H. Huang,
Y. S. Han, and
J. H. Deng,
"Fault-Tolerant and Reliable Computation in Cloud Computing,"
in Proc. of IEEE Globecom Workshop on Web and Pervasive Security
(WPS 2010),
Miami, FL, USA, December 10, 2010, pp. 1601-1605.
[PDF]
[BibTeX]
-
H.-T. Pai,
J. Deng,
and Y. S. Han,
"Time-Slotted Voting Mechanism for Fusion Data Assurance in
Wireless Sensor Networks under Stealthy Attacks,"
Elsevier Computer Communications,
vol. 33, no. 13, pp. 1524-1530, August, 2010.
[PDF]
[BibTeX]
-
Z. Zhang and J. Wu and J. Deng and
M. Qiu,
"Jamming ACK Attack to Wireless Networks and a Mitigation Approach," in
Proc. of IEEE Global Telecommunications Conference - Wireless Networking Symposium
(GLOBECOM '08),
New Orleans, LA, USA, November 30-December 4, 2008,
vol. ECP.950, pp. 1-5.
[PDF]
[BibTeX]
-
J. Deng, Z. Zhang, S. Pagadala,
and P. K. Varshney,
"Protecting MANETs from Spurious CTS Attacks with Randomized
Carrier Sensing," in
Proc. of IEEE Sarnoff Symposium '08,
Princeton, NJ, USA, April 28-30, 2008, pp. 1-5.
[PDF]
[BibTeX]
-
K. Liu, J. Deng,
P. K. Varshney,
and K. Balakrishnan,
"An Acknowledgment-based Approach for the Detection of Routing
Misbehavior in MANETs," IEEE Transactions on Mobile
Computing, vol. 6, no. 5, pp. 536-550, May 2007.
[PDF]
[BibTeX]
- W. Du, J. Deng, Y. S. Han, and P. K. Varshney,
"A Witness-Based Approach For Data Fusion Assurance In Wireless Sensor
Networks," in Proc. of IEEE Global Telecommunications
Conference (GLOBECOM '03), San Francisco, CA, USA, December 1-5,
2003, vol. 3, pp. 1435-1439.
[PDF]
[BibTeX]
We designed a covert channel communication technique to take
advantage of the splitting tree algorithm in collision resolution of
Multiple Access Control protocols. Using our technique, the covert
receivers do not need to know the identity of the covert senders,
achieving mutual anonymous covert communication.
-
Z. Wang,
J. Deng, and
R. B. Lee,
"Mutual Anonymous Communications:
A New Covert Channel Based on Splitting Tree MAC," in
the 26th Conference of the IEEE Communications Society
(INFOCOM '07), Minisymposium,
Anchorage, AK, USA, May 6-12, 2007.
[PDF]
[BibTeX]
In networking, we investigate Multiple Access Control (MAC), data
forwarding, energy preservation, back-off control, and a spectrum of
broader issues in Mobile Ad Hoc Networks (MANETs), Wireless Sensor
Networks (WSNs), and cognitive radio networks.
Our study of data delivery in large wireless networks such wireless
sensor networks focused on communication energy conservation and
balancing to extend network lifetime.
-
L. Yao, X. Zou,
J. Deng, and S. Suthaharan,
"PeB: Periodic Broadcast for Information Distribution in Large
Wireless Networks,"
in Proc. of IEEE Global Telecommunications Conference - Wireless
Networking Symposium (GLOBECOM '13),
Atlanta, GA, USA, December 9-13, 2013. to appear.
[PDF]
[BibTeX]
-
J. Deng,
S. C.-H. Huang,
and Y. S. Han,
"An On-line Relay Selection Scheme in Power Controllable Wireless
Sensor Networks,"
Hindawi International Journal of Distributed Sensor Networks,
vol. 2012, pp. 1-13, May 2012.
[PDF]
[BibTeX]
-
J. Deng,
"Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor
Networks," ACM Transactions on Sensor Networks,
vol. 5, no. 4, pp. 1-25, November 2009.
[PDF]
[BibTeX]
Our MAC study focused on how to improve the throughput performance
of MAC schemes while maintaining fair access. Besides proposing
new MAC schemes for MANETs, we are also investigating the benefits
and drawbacks of using multiple subchannels instead of a single
channel in MAC schemes in networks such as cognitive radio networks.
-
Y. Liu,
M. Liu, and
J. Deng,
"Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth
the Pain?" in IEEE Journal on
Selected Areas in Communications - Cognitive Radio Series,
November 2013. to appear.
[PDF]
[BibTeX]
-
Y. Liu,
M. Liu, and
J. Deng,
"Is Diversity Gain Worth the Pain: a Delay Comparison Between
Opportunistic Multi-Channel MAC and Single-Channel MAC,"
in Proc. of the 31st Conference of the IEEE Communications Society
(INFOCOM '12), Minisymposium,
Orlando, FL, USA, March 25-30, 2012, pp. 2921-2925.
[PDF]
[BibTeX]
-
J. Deng, Y. S. Han,
and S. R. Kulkarni,
"Can Multiple Subchannels Improve the Delay Performance of
RTS/CTS-based MAC Schemes?"
IEEE Transactions on Wireless Communications,
vol. 8, no. 4, pp. 1591-1596, April 2009.
[PDF]
[BibTeX]
-
Y. S. Han,
J. Deng,
and Z. J. Haas,
"Analyzing Multi-Channel Medium Access Control Schemes
with ALOHA Reservation,"
IEEE Transactions on Wireless Communications, vol. 5, no. 8,
pp. 2143-2152, August 2006.
[PDF]
[BibTeX]
-
J. Deng,
Y. S. Han,
and Z. J. Haas,
"Analyzing Split Channel Medium Access Control Schemes,"
IEEE Transactions on Wireless Communications, vol. 5, no. 5,
pp. 967-971, May 2006.
[PDF]
[BibTeX]
Energy conservation in wireless communication is a huge
challenge. This is mainly because wireless devices are
highly resource (energy) constrained. We investigated a broad range
of problems in energy conservation in wireless networks, using
techniques such as radio transmission range optimization and node sleeping.
-
S. Suthaharan, A. Chawade, R. Jana, and J. Deng,
"Energy Efficient DNA-Based Scheduling Scheme for Wireless Sensor
Networks," in Proc. of the International Conference on Wireless
Algorithms, Systems and Applications (WASA'09),
Boston, MA, USA, August 16-18, 2009. B. Liu, B. Azer, and
D.-Z. Du, Eds., vol. 5682 of Lecture Notes in Computer Science
(LNCS), pp. 459-468, Springer-Verlag.
[PDF]
[BibTeX]
-
J. Deng,
Y. S. Han,
P.-N. Chen,
and P. K. Varshney,
"Optimal Transmission Range for Wireless Ad Hoc Networks Based on
Energy Efficiency," IEEE Transactions on Communications,
vol. 55, no. 9, pp. 1772-1782, September 2007.
[PDF]
[BibTeX]
- J. Deng,
Y. S. Han,
W. B. Heinzelman, and
P. K. Varshney,
"Scheduling Sleeping Nodes in High Density Cluster-based Sensor
Networks," ACM/Kluwer Mobile Networks and Applications
(MONET) Special Issue on "Energy Constraints and Lifetime Performance in
Wireless Sensor Networks," vol. 10, no. 6, pp. 825-835,
December 2005.
[PDF]
[BibTeX]
- J. Deng,
Y. S. Han,
W. B. Heinzelman, and
P. K. Varshney,
"Balanced-energy Sleep Scheduling Scheme for High Density Cluster-based
Sensor Networks,"
Elsevier Computer Communications Journal, Special
Issue on ASWN '04, vol. 28, no. 14, pp. 1631-1642, September
2005.
[PDF]
[BibTeX]
Geographic routing and data forwarding can identify optimum route
toward the final destination with help from geographic information
from the source, the routers, and the destination. We investigated
forwarding area optimization,
-
D. Chen, J. Deng,
and P. K. Varshney,
"Selection of a Forwarding Area for Contention-Based Geographic
Forwarding in Wireless Multi-hop Networks," IEEE Transactions
on Vehicular Technology, vol. 56, no. 5, pp. 3111-3122, September 2007.
[PDF]
[BibTeX]
We published several papers on MAC scheme survey, design, and
backoff control optimization. We have also designed a fairness index,
based on the transmission sequence's variation from the fair access
sequences, to evaluate the access pattern to the channel from all
contending nodes.
-
D.-F. Tseng, Y. S. Han, W. Ho Mow, and J. Deng, "Efficient
Decoding over Power-line Channels," in Proc. of the 5th
International Workshop on Signal Design and its Applications in
Communications (IWSDA '11), Guilin, P. R. China, October 10-14,
2011, pp. 138-141.
[PDF]
[BibTeX]
-
J. Deng,
M. Qiu,
and G. Wu,
"Fault Tolerant Data Collection in Heterogeneous Intelligent
Monitoring Networks,"
in Proc. of the 5th IEEE International Conference
on Networking, Architecture, and Storage (NAS '10),
Macau, P. R. China, July 15-17, 2010, pp. 13-18.
[PDF]
[BibTeX]
-
J. Deng,
Y. S. Han,
and B. Liang,
"Fairness Index Based on Variational Distance,"
in Proc. of IEEE Global Telecommunications Conference - Wireless
Networking Symposium (GLOBECOM '09),
Hawaii, USA, November 30-December 4, 2009, pp. 3338-3343.
[PDF]
[BibTeX]
- J. Deng, P. K. Varshney, and Z. J. Haas,
"A New Backoff Algorithm for the IEEE 802.11 Distributed Coordination
Function," in
Proc. of Communication Networks and Distributed Systems Modeling and
Simulation (CNDS '04), San Diego, CA, USA, January 18-21, 2004.
[PDF]
[BibTeX]
- Z. J. Haas and
J. Deng,
"On Optimizing the Backoff Interval for Random Access Schemes,"
IEEE Transactions on Communications, vol. 51, no. 12,
pp. 2081-2090, December 2003.
[PDF]
[BibTeX]
- Z. J. Haas and
J. Deng,
"Dual Busy Tone Multiple Access
(DBTMA) - A Multiple Access Control Scheme for Ad Hoc
Networks," IEEE Transactions on
Communications, vol. 50, no. 6, pp. 975-985, June 2002.
[PDF]
[BibTeX]
-
S. Kumar,
V. S. Raghavan, and J. Deng,
"Medium Access Control Protocols for Ad-Hoc Wireless Networks: A
Survey," Elsevier Ad Hoc Networks,
vol. 4, no. 3, pp. 326-358, May 2006.
[PDF]
[BibTeX]
It is essential to perform efficient message broadcast and to
search for a known service in large
wireless networks. We investigated different broadcast techniques
and search schemes.
-
S. C.-H. Huang,
P.-J. Wan,
J. Deng, and
Y. S. Han,
"Broadcast Scheduling in Interference Environment,"
IEEE Transactions on Mobile Computing,
vol. 7, no. 11, pp. 1338-1348, November 2008.
[PDF]
[BibTeX]
-
J. Deng and S. Zuyev,
"On Search Sets of Expanding Ring Search in Wireless Networks,"
Elsevier Ad Hoc Networks,
vol. 6, no. 7, pp. 1168-1181, September 2008.
[PDF]
[BibTeX]
-
X. Wang, J. Deng, and
T. Berger,
"GB: Distributed Reachability-Tunable Broadcast Algorithms
for Wireless Sensor Networks,"
in Proc. of the 2nd IEEE International Conference
on Mobile Ad-Hoc and Sensor Systems (MASS '05),
Washington, DC, USA, November 7-10, 2005, pp. 733-742.
[PDF]
[BibTeX]
In social networks, we focus on taking advantage of the big data for
decision making, identifying shortest paths between two users in the
large graph, etc.
-
L. Fu and
J. Deng,
"Graph Calculus: Scalable Shortest Path Analytics for Large Social
Graphs through Core Net,"
in Proc. of IEEE/WIC/ACM International
Conference on Web Intelligence (WI '13),
Atlanta, GA, USA, November 17-20, 2013. to appear.
[PDF]
[BibTeX]
-
K. Zhao, X. Zhao, and J. Deng, "Parallel Importation: An
Empirical Investigation of Online Unauthorized Distribution
Channels," in Proc. of the 10th Workshop on e-Business (WEB 2011),
Shanghai, P. R. China, December 4, 2011.
Lecture Notes in Business Information Processing, vol. 108,
no. II, part 4, pp. 216-224, Springer-Verlag.
[PDF]
[BibTeX]
-
K. Zhao, X. Zhao, and J. Deng, "An Empirical Investigation of
Online Gray Market," in Proc. of the 21st Workshop on Information
Technologies and Systems (WITS 2011), Shanghai, P. R. China,
December 3-4, 2011.
[PDF]
[BibTeX]