Papers by Neng-Chung Wang
A Q-Learning Based Power-Aware Data Dissemination Protocol for Wireless Sensor Networks
Lecture notes in electrical engineering, 2024
Electronics, Jun 28, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY
An Improvement on Hsiang and Shih's Remote User Authentication Scheme Using Smart Cards
ABSTRACT Recently, Hsiang and Shih proposed remote user authentication scheme using smart cards, ... more ABSTRACT Recently, Hsiang and Shih proposed remote user authentication scheme using smart cards, they claims that their schemes defended against parallel session attack, and password guessing attacks. In this paper, we show that Hsiang and Shih's schemes are still vulnerable to off-line password guessing attacks and undetectable on-line password guessing attacks. Notably, problems remain in situations where the user loses a smart card. To remedy these flaws, this paper proposes an improvement on Hsiang and Shih's remote user authentication schemes using smart cards.
Applied sciences, Jun 10, 2023
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Performance Evaluation of a Mobile Deice System Using Fuzzy Logic Control with Multi-Hop in a Multi-Radio Opportunistic Network
In this paper, we based on hybrid network of Dual-Radio Opportunistic Networking for Energy Effic... more In this paper, we based on hybrid network of Dual-Radio Opportunistic Networking for Energy Efficiency (DRONEE) method and propose Dual-Radio Opportunistic Networking for Energy Efficiency using fuzzy logic control with multi-hop (DRONEE-FM) to improve original method which is a mixed network method using the cluster concept of a Wireless Sensor Network (WSN). Mobile phone users are divided into clusters and the best mobile phone user signal is selected as a cluster head in each cluster where that device is used to forward data to the base station. Other cluster members pass their transmission data to the cluster head through a Wi-Fi interface and the cluster head of nodes which does not communicate with the base station channels (i.e., 3G / 4G mobile networks, etc.) will be closed. Thus, signal interference from other mobile phone users affecting cluster head mobile phone users can be reduced and the channel quality can be improved.
A Power Management Scheme with SDMA for WPANs
Lecture notes in electrical engineering, 2014
In this paper, an SDMA-based power management scheme, called enhanced min-degree searching (EMDS)... more In this paper, an SDMA-based power management scheme, called enhanced min-degree searching (EMDS), is proposed for WPANs. EMDS orders the streams among multiple devices to minimize the total wakeup times. In this scheme, every device that can transmit data at the same time is checked using the SDMA. The total wakeup times will be reduced substantially if the majority of the devices can transmit data at the same time. Simulation results show that the performance of the proposed EMDS outperforms that of the existing approaches.

Hierarchical Mobile IPv6 Mobility Management in Heterogeneous 3G/WLAN Networks
Wireless Personal Communications, Oct 18, 2013
The research and development of next generation networks results in continuously growing in heter... more The research and development of next generation networks results in continuously growing in heterogeneity of wireless systems. Those systems also offer users the increasing possibility of roaming between different networks, which undoubtedly needs seamless integration. As mobile users continue to expand their requirements for seamless roaming, a good handoff mechanism is necessary especially for cellular networks and wireless local area networks. The most critical problem faced in the handoff mechanism is that users may need immediate data transmission. However, immediate data transmission is always obstructed because handoff latency occurs. In this paper, we propose a Hierarchical Mobile IPv6 handoff scheme using active measurement-foreign mobility agent to measure the residual bandwidth of each access point (AP) for handoff decision. As a result, the proposed scheme prevents whole efficiency from being affected by the registration time and improves immediate data transmission. In addition, a dual-threshold of the received signal strength is used to avoid the ping-pong effect. Simulation results show that the proposed scheme outperforms the traditional Mobile IPv6 and enhanced multilayer Hierarchical Mobile IPv6.

International Journal of Communication Systems, Jul 17, 2013
IEEE 802.15.3 is devised for short-distance wireless connectivity within a wireless personal area... more IEEE 802.15.3 is devised for short-distance wireless connectivity within a wireless personal area network (WPAN). In WPANs, a power management (PM) mechanism is used for power saving. The PM enables devices to sleep for one or more superframes in order to conserve power. Space division multiple access (SDMA) is a new technology to optimize performance of current and future mobile communication systems. In this paper, we propose an SDMA-based PM scheme, called enhanced min-degree searching (EMDS) for WPANs. EMDS orders the streams among multiple devices to minimize the total wake-up times. In this scheme, every device that can transmit data at the same time is checked using the SDMA. The total wake-up times will be reduced substantially if the majority of the devices can transmit data at the same time. Simulation results show that the performance of the proposed EMDS outperforms that of the existing approaches.

Using a PTD to Strengthen Remote Authentication from an Untrusted Computer
Journal of Internet Technology, Sep 1, 2012
Unsecured public terminals are problematic for use with Internet services that require security, ... more Unsecured public terminals are problematic for use with Internet services that require security, especially those used by financial institutions. Malicious software and phishing attacks on unsecured computers can extract user credentials or other personal sensitive information and can be used for unauthorized access of user accounts. Although many systems utilize sophisticated one-time passwords or challenge-response techniques to counter these attacks, most proposed schemes are vulnerable to session hijacking. To address this problem, we propose a novel authentication protocol for remote authentication using personal trusted device (PTD) with fingerprint biometrics to protect shared secrets between users and servers. Moreover, our approach allows users to input sensitive information from a personal, trusted device to prevent malicious software attacks; and we facilitate a transaction phase to prevent session hijacking. We also use hashing functions to implement a robust authentication with a low computational cost.
Improving Pairwise Key Predistribution in Wireless Sensor Networks
Smart innovation, systems and technologies, 2013
In this paper, an efficient grid-based pairwise key predistribution scheme for wireless sensor ne... more In this paper, an efficient grid-based pairwise key predistribution scheme for wireless sensor networks (WSNs) is proposed. In the proposed scheme, multiple polynomials for each row, each column, and each diagonal in the grid are constructed. Then, each sensor node in each row, column, and diagonal in the grid establishes a pairwise key with the other node using the predistributed symmetric polynomial. Performance evaluation shows that the proposed scheme outperformed Sadi’s scheme.
A time slot assignment scheme for multi-path QoS multicast routing in mobile ad hoc networks
ABSTRACT
A Dual-Tree-Based On-Demand Multicast Routing Protocol for Mobile Ad Hoc Networks
A Coverage Algorithm to Improve the Performance of PEGASIS in Wireless Sensor Networks
ABSTRACT

Cycle-Based Data Aggregation for Grid-Based Wireless Sensor Networks
In this paper, we propose a Cycle-Based Data Aggregation Scheme (CBDAS) for grid-based wireless s... more In this paper, we propose a Cycle-Based Data Aggregation Scheme (CBDAS) for grid-based wireless sensor networks (WSNs). The whole sensor filed is partitioned into a 2D logical grid of cells. Each cell has a head responsible for aggregating its own data with the data sensed by the others in the same cell and then transmitting out. In order to efficiently and rapidly transmit the data to the base station (BS), we link each cell head to form a cyclic chain. Each cell head on the cyclic chain takes turn becoming cycle leader responsible for transmitting data to the BS. For each round, when the cycle leader receives the request from the BS, it sends each direction a token travelling along the cyclic chain. Once a cell head receives the second token from the other direction, it drops the token and disconnects the cyclic chain, making itself as one end and the sender of the second token as the other end. Subsequently, both end nodes respectively transmit their own aggregated data to cycle leader in the opposite direction. As a result, the transmissions are reduced so that it greatly extends the lifetime of the whole WSN. Simulation results show that the proposed CBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.

An Efficient Grid-based Data Aggregation Scheme for Wireless Sensor Networks
Journal of Internet Technology, Dec 1, 2018
Energy efficiency is a very important issue in wireless sensor networks (WSNs). Sensor nodes are ... more Energy efficiency is a very important issue in wireless sensor networks (WSNs). Sensor nodes are battery-powered, thus the energy of them is limited. Data transmission is energy-intensive for sensor nodes, particularly over long distance. In this paper, an efficient Grid-Based Data Aggregation Scheme (GBDAS) for WSNs is proposed. In GBDAS, the grid structure is constructed by dividing the sensor network into a grid of cells, so that most of sensor nodes merely transmit the sensed data within the local cell. Only a small part of them need disseminate data towards the BS, greatly decreasing the energy load of sensor nodes. Besides, the position of each dissemination node is selected in rotation so that the energy depletion of sensor nodes is equally distributed. Consequently, the lifetime of network is extended.
Applied sciences, Sep 30, 2022
This article is an open access article distributed under the terms and conditions of the Creative... more This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY

Energy Efficient Geocasting Based on Q-Learning for Wireless Sensor Networks
In this paper, we propose two energy efficient geocasting protocols based on Q-learning for wirel... more In this paper, we propose two energy efficient geocasting protocols based on Q-learning for wireless sensor networks (WSNs), called FERMA-QL and FER-MA-QL-E. We utilize the theorem of Fermat point to find Fermat points in geocasting, the node which is the closest to the Fermat points is selected as the relay nodes. Then, we establish the shared path among gateways, relay nodes and base station by Q-learning for data transmission. In FERMA-QL, the reward is given by the reciprocal of the distance between the received node and the destination node In FERMA-QL-E, the reward is given by the remaining energy of the received node divided by the distance between itself and the destination node. Sensors utilize the shared path to forward their data to achieve goal of reduce energy consumption. Simulation result shows that the proposed FERMA-QL and FERMA-QL-E can efficiently extend the life-time of the WSN.
International Conference on Systems, Jul 22, 2008
The adaptive antenna array (AAA) frameworks that are more flexible to enhance the system capacity... more The adaptive antenna array (AAA) frameworks that are more flexible to enhance the system capacity will be the mainstream for wireless networks. However, AAA frameworks generate a number of overlapped areas, i.e., more than one sensor can provide service to the areas. The allocation of overlapped areas to sensors will affect the system capacity. Therefore, this study will present a minimal standard deviation overlapped area allocation strategy for AAA wireless networks. This strategy considers the traffic loads among sensors to allocate the overlapped areas to sensors. The allocation is based on the standard deviation of the traffic loads of all sensors is minimal. Simulation results demonstrate our strategy provide more system capacity than other strategies.
An IP Header Extension Scheme for Route Optimization in Mobile IP Networks
Journal of Internet Technology, 2012
英文摘要 IETF has proposed route optimization extensions in Mobile IP to solve the triangle routing p... more 英文摘要 IETF has proposed route optimization extensions in Mobile IP to solve the triangle routing problem. However, the scheme is almost infeasible, because the scheme needs to implement a binding cache for all mobile hosts and correspondent nodes to solve the ...

A Cycle-Based Approach for Data Aggregation in Grid-Based Wireless Sensor Networks
International Journal of Science and Engineering, Dec 1, 2014
In this paper, we propose a Cycle-Based Data Aggregation Scheme (CBDAS) for grid-based wireless s... more In this paper, we propose a Cycle-Based Data Aggregation Scheme (CBDAS) for grid-based wireless sensor networks (WSNs). The whole sensor filed is partitioned into a 2D logical grid of cells. Each cell has a head responsible for aggregating its own data with the data sensed by the others in the same cell and then transmitting out. In order to efficiently and rapidly transmit the data to the base station (BS), we link each cell head to form a cyclic chain. Each cell head on the cyclic chain takes turn becoming cycle leader responsible for transmitting data to the BS. As a result, the transmissions are reduced so that it greatly extends the lifetime of the whole WSN. Simulation results show that the proposed CBDAS extends the lifetime of sensor nodes so as to prolong the lifetime of the whole network.
Uploads
Papers by Neng-Chung Wang