Skip to main content

Showing 1–12 of 12 results for author: Chong, P H J

.
  1. arXiv:2109.02907  [pdf

    cs.NI

    A P2P Network Topology for Optimizing Partition Tolerance to Reach the CAP Guarantee Bound in Consortium Blockchains

    Authors: Han Wang, Hui Li, Zixian Wang, Baofu Han, Minglong Zhang, Peter Han Joo Chong, Xiaoli Chu, Yang Liu, Soung-Yue Liew, Lunchakorn Wuttisittikulkij

    Abstract: Decentralized cryptocurrency systems, known as blockchains, have shown promise as infrastructure for mutually distrustful parties to agree on transactions safely. However, Bitcoin-derived blockchains and their variants suffer from the limitations of the CAP Trilemma, which is difficult to be solved through optimizing consensus protocols. Moreover, the P2P network of blockchains have problems in ef… ▽ More

    Submitted 7 September, 2021; originally announced September 2021.

    Comments: 13 pages, 11 figures

  2. arXiv:2012.12123  [pdf

    cs.NI cs.LG

    Machine Learning Algorithm for NLOS Millimeter Wave in 5G V2X Communication

    Authors: Deepika Mohan, G. G. Md. Nawaz Ali, Peter Han Joo Chong

    Abstract: The 5G vehicle-to-everything (V2X) communication for autonomous and semi-autonomous driving utilizes the wireless technology for communication and the Millimeter Wave bands are widely implemented in this kind of vehicular network application. The main purpose of this paper is to broadcast the messages from the mmWave Base Station to vehicles at LOS (Line-of-sight) and NLOS (Non-LOS). Relay using M… ▽ More

    Submitted 16 December, 2020; originally announced December 2020.

    Comments: 14 pages, 9 figures, conference 7th International conference on Computer Networks and Communications (CCNET 2020), AIRCC Publishing Corporation

    Report number: Volume 10, number 17 MSC Class: 68M11 ACM Class: I.6; I.2.2; J.7

  3. arXiv:2007.00054  [pdf, other

    cs.IR cs.SI

    Twitter and Census Data Analytics to Explore Socioeconomic Factors for Post-COVID-19 Reopening Sentiment

    Authors: Md. Mokhlesur Rahman, G. G. Md. Nawaz Ali, Xue Jun Li, Kamal Chandra Paul, Peter H. J. Chong

    Abstract: Investigating and classifying sentiments of social media users towards an item, situation, and system are very popular among the researchers. However, they rarely discuss the underlying socioeconomic factor associations for such sentiments. This study attempts to explore the factors associated with positive and negative sentiments of the people about reopening the economy, in the United States (US… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  4. arXiv:1712.09864  [pdf

    cs.CR

    TEDS: A Trusted Entropy and Dempster Shafer Mechanism for Routing in Wireless Mesh Networks

    Authors: Hengchuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong

    Abstract: Wireless Mesh Networks (WMNs) have emerged as a key technology for the next generation of wireless networking due to its self-forming, self-organizing and self-healing properties. However, due to the multi-hop nature of communications in WMN, we cannot assume that all nodes in the network are cooperative. Nodes may drop all of the data packets they received to mount a Denial of Service (DoS) attac… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: MOBILITY 2014 The Fourth International Conference on Mobile Services, Resources, and Users, Jul 2014, Paris, France

  5. A non-biased trust model for wireless mesh networks

    Authors: Heng Chuan Tan, Maode Ma, Houda Labiod, Peter Han Joo Chong, Jun Zhang

    Abstract: Trust models that rely on recommendation trusts are vulnerable to badmouthing and ballot-stuffing attacks. To cope with these attacks, existing trust models use different trust aggregation techniques to process the recommendation trusts and combine them with the direct trust values to form a combined trust value. However, these trust models are biased as recommendation trusts that deviate too much… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: International Journal of Communication Systems, Wiley, 2016, 30 (9)

  6. A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks

    Authors: Hengchuan Tan, Maode Ma, Houda Labiod, Aymen Boudguiga, Jun Zhang, Peter Han Joo Chong

    Abstract: Public key infrastructure (PKI) is the most widely used security mechanism for securing communications over the network. However, there are known performance issues, making it unsuitable for use in vehicular networks. In this paper, we propose a secure and authenticated key management protocol (SA-KMP) to overcome the shortcomings of the PKI. The SA-KMP scheme distributes repository containing the… ▽ More

    Submitted 28 December, 2017; originally announced December 2017.

    Journal ref: IEEE Transactions on Vehicular Technology, Institute of Electrical and Electronics Engineers, 2016, 65 (12), pp.9570 - 9584

  7. arXiv:1712.00946  [pdf, other

    cs.IT

    V2X Content Distribution Based on Batched Network Coding with Distributed Scheduling

    Authors: Yumeng Gao, Xiaoli Xu, Yong Liang Guan, Peter Han Joo Chong

    Abstract: Content distribution is an application in intelligent transportation system to assist vehicles in acquiring information such as digital maps and entertainment materials. In this paper, we consider content distribution from a single roadside infrastructure unit to a group of vehicles passing by it. To combat the short connection time and the lossy channel quality, the downloaded contents need to be… ▽ More

    Submitted 3 October, 2018; v1 submitted 4 December, 2017; originally announced December 2017.

    Comments: 12 pages and 9 figures

  8. arXiv:1704.02806  [pdf, other

    cs.IT

    Serving Distance and Coverage in a Closed Access PHP-Based Heterogeneous Cellular Network

    Authors: Zeinab Yazdanshenasan, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: Heterogeneous cellular networks (HCNs) usually exhibit spatial separation amongst base stations (BSs) of different types (termed tiers in this paper). For instance, operators will usually not deploy a picocell in close proximity to a macrocell, thus inducing separation amongst the locations of pico and macrocells. This separation has recently been captured by modeling the small cell locations by a… ▽ More

    Submitted 10 April, 2017; originally announced April 2017.

    Comments: Proc., Biennial Symposium on Communications (BSC), 2016

  9. Poisson Hole Process: Theory and Applications to Wireless Networks

    Authors: Zeinab Yazdanshenasan, Harpreet S. Dhillon, Mehrnaz Afshang, Peter Han Joo Chong

    Abstract: Interference field in wireless networks is often modeled by a homogeneous Poisson Point Process (PPP). While it is realistic in modeling the inherent node irregularity and provides meaningful first-order results, it falls short in modeling the effect of interference management techniques, which typically introduce some form of spatial interaction among active transmitters. In some applications, su… ▽ More

    Submitted 7 January, 2016; v1 submitted 6 January, 2016; originally announced January 2016.

    Comments: 15 pages. Submitted to IEEE Transactions on Wireless Communications

  10. Fundamentals of Cluster-Centric Content Placement in Cache-Enabled Device-to-Device Networks

    Authors: Mehrnaz Afshang, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: This paper develops a comprehensive analytical framework with foundations in stochastic geometry to characterize the performance of cluster-centric content placement in a cache-enabled device-to-device (D2D) network. Different from device-centric content placement, cluster-centric placement focuses on placing content in each cluster such that the collective performance of all the devices in each c… ▽ More

    Submitted 9 February, 2016; v1 submitted 15 September, 2015; originally announced September 2015.

    Comments: 16 pages, 10 figures. Submitted to IEEE Transactions on Communications

  11. Modeling and Performance Analysis of Clustered Device-to-Device Networks

    Authors: Mehrnaz Afshang, Harpreet S. Dhillon, Peter Han Joo Chong

    Abstract: Device-to-device (D2D) communication enables direct communication between proximate devices thereby improving the overall spectrum utilization and offloading traffic from cellular networks. This paper develops a new spatial model for D2D networks in which the device locations are modeled as a Poisson cluster process. Using this model, we study the performance of a typical D2D receiver in terms of… ▽ More

    Submitted 11 August, 2015; v1 submitted 11 August, 2015; originally announced August 2015.

    Comments: 34 double-spaced pages, 10 figures. Submitted to IEEE Transactions on Wireless Communications

  12. arXiv:1504.04464  [pdf, other

    cs.IT cs.NI

    Two-Phase Cooperative Broadcasting Based on Batched Network Code

    Authors: Xiaoli Xu, Praveen Kumar M. Gandhi, Yong Liang Guan, Peter Han Joo Chong

    Abstract: In this paper, we consider the wireless broadcasting scenario with a source node sending some common information to a group of closely located users, where each link is subject to certain packet erasures. To ensure reliable information reception by all users, the conventional approach generally requires repeated transmission by the source until all the users are able to decode the information, whi… ▽ More

    Submitted 17 April, 2015; originally announced April 2015.