The search functionality is under construction.

Author Search Result

[Author] Guojun WANG(9hit)

1-9hit
  • FOREWORD Open Access

    Guojun WANG  Laurence T.YANG  Kouichi SAKURAI  

     
    FOREWORD

      Vol:
    E93-D No:3
      Page(s):
    409-410
  • FOREWORD Open Access

    Guojun WANG  

     
    FOREWORD

      Vol:
    E99-D No:8
      Page(s):
    1964-1965
  • Multipath Routing with Reliable Nodes in Large-Scale Mobile Ad-Hoc Networks

    Yun GE  Guojun WANG  Qing ZHANG  Minyi GUO  

     
    PAPER-Networks

      Vol:
    E92-D No:9
      Page(s):
    1675-1682

    We propose a Multiple Zones-based (M-Zone) routing protocol to discover node-disjoint multiplath routing efficiently and effectively in large-scale MANETs. Compared with single path routing, multipath routing can improve robustness, load balancing and throughput of a network. However, it is very difficult to achieve node-disjoint multipath routing in large-scale MANETs. To ensure finding node-disjoint multiple paths, the M-Zone protocol divides the region between a source and a destination into multiple zones based on geographical location and each path is mapped to a distinct zone. Performance analysis shows that M-Zone has good stability, and the control complexity and storage complexity of M-Zone are lower than those of the well-known AODVM protocol. Simulation studies show that the average end-to-end delay of M-Zone is lower than that of AODVM and the routing overhead of M-Zone is less than that of AODVM.

  • FOREWORD Open Access

    Guojun WANG  

     
    FOREWORD

      Vol:
    E103-D No:2
      Page(s):
    186-187
  • FOREWORD Open Access

    Guojun WANG  Yizhi REN  

     
    FOREWORD

      Vol:
    E105-D No:2
      Page(s):
    193-194
  • FOREWORD Open Access

    Guojun Wang  

     
    FOREWORD

      Vol:
    E100-D No:10
      Page(s):
    2265-2266
  • A Clustering K-Anonymity Scheme for Location Privacy Preservation

    Lin YAO  Guowei WU  Jia WANG  Feng XIA  Chi LIN  Guojun WANG  

     
    PAPER-Privacy

      Vol:
    E95-D No:1
      Page(s):
    134-142

    The continuous advances in sensing and positioning technologies have resulted in a dramatic increase in popularity of Location-Based Services (LBS). Nevertheless, the LBS can lead to user privacy breach due to sharing location information with potentially malicious services. A high degree of location privacy preservation for LBS is extremely required. In this paper, a clustering K-anonymity scheme for location privacy preservation (namely CK) is proposed. The CK scheme does not rely on a trusted third party to anonymize the location information of users. In CK scheme, the whole area that all the users reside is divided into clusters recursively in order to get cloaked area. The exact location information of the user is replaced by the cloaked spatial temporal boundary (STB) including K users. The user can adjust the resolution of location information with spatial or temporal constraints to meet his personalized privacy requirement. The experimental results show that CK can provide stringent privacy guarantees, strong robustness and high QoS (Quality of Service).

  • FOREWORD Open Access

    Guojun WANG  

     
    FOREWORD

      Vol:
    E95-D No:1
      Page(s):
    1-1
  • Trusted Routing Based on Dynamic Trust Mechanism in Mobile Ad-Hoc Networks

    Sancheng PENG  Weijia JIA  Guojun WANG  Jie WU  Minyi GUO  

     
    PAPER

      Vol:
    E93-D No:3
      Page(s):
    510-517

    Due to the distributed nature, mobile ad-hoc networks (MANETs) are vulnerable to various attacks, resulting in distrusted communications. To achieve trusted communications, it is important to build trusted routes in routing algorithms in a self-organizing and decentralized fashion. This paper proposes a trusted routing to locate and to preserve trusted routes in MANETs. Instead of using a hard security mechanism, we employ a new dynamic trust mechanism based on multiple constraints and collaborative filtering. The dynamic trust mechanism can effectively evaluate the trust and obtain the precise trust value among nodes, and can also be integrated into existing routing protocols for MANETs, such as ad hoc on-demand distance vector routing (AODV) and dynamic source routing (DSR). As an example, we present a trusted routing protocol, based on dynamic trust mechanism, by extending DSR, in which a node makes a routing decision based on the trust values on its neighboring nodes, and finally, establish a trusted route through the trust values of the nodes along the route in MANETs. The effectiveness of our approach is validated through extensive simulations.