Jing Deng

Dr. Jing Deng is an assistant professor in the Department of Computer Science (CS) at the University of North Carolina at Greensboro (UNCG). Dr. Deng visited the Department of Electrical Engineering at Princeton University and the Department of Electrical and Computer Engineering, WINLAB at Rutgers University in Fall of 2005. He was with the Department of Computer Science at the University of New Orleans from 2004 to 2008. He served as a Research Assistant Professor in the Department of Electrical Engineering & Computer Science at Syracuse University from 2002 to 2004. He received his Ph.D. degree from School of Electrical and Computer Engineering at Cornell University, Ithaca, NY in January, 2002. Dr. Deng is an associate editor of IEEE Transactions on Vehicular Technology (TVT). Dr. Deng's research focuses include wireless network security, information assurance, mobile ad hoc networks, and wireless sensor networks.

There are 21 included publications by Jing Deng :

TitleDateViewsBrief Description
An Acknowledgment-Based Approach for the Detection of Routing Misbehavior in MANETs 2007 6240 We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and ...
Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation 2006 1609 In order to improve the throughput performance of Medium Access Control (MAC) schemes in wireless communication networks, some researchers proposed to divide a single shared channel into several sub-channels: one as control subchannel and the other...
Analyzing Split Channel Medium Access Control Schemes 2006 1230 In this work, we analyze and evaluate the maximum achievable throughput of split-channel MAC schemes that are based on the RTS/CTS (Ready-To-Send/Clear-To-Send) dialogue and that rely on pure ALOHA or on p-persistent Carrier Sensing Multip...
Broadcast Scheduling in Interference Environment 2008 1335 Broadcast is a fundamental operation in wireless networks, and nai¨ve flooding is not practical, because it cannot deal with interference. Scheduling is a good way of avoiding interference, but previous studies on broadcast scheduling algorithms all...
Can Multiple Subchannels Improve the Delay Performance of RTS/CTS-based MAC Schemes? 2009 1033 We analyze the delay performance of RTS/CTSbased (Request-To-Send/Clear-To-Send) multi-channel MAC (Medium Access Control) schemes for wireless networks. These schemes usually employ multiple data subchannels for data transmission and one control...
Dual Busy Tone Multiple Access (DBTMA)— A Multiple Access Control Scheme for Ad Hoc Networks 2002 5848 In ad hoc networks, the hidden- and the exposed-terminal problems can severely reduce the network capacity on the MAC layer. To address these problems, the ready-to-send and clear-to-send (RTS/CTS) dialogue has been proposed in the literature. Ho...
Evaluating Opportunistic Multi-Channel MAC: Is Diversity Gain Worth the Pain? 2013 1363 We evaluate the performance of an opportunistic multi-channel medium access control protocol and compare it to that of the corresponding single-channel MAC (S-MAC) and a non-opportunistic multi-channel MAC (M-MAC). We do this in three different setti...
Fast Authentication in Multi-Hop Infrastructure-based Communication 2014 1219 Multi-hop infrastructure-based communication is expected to play a vital role in supporting high data-rate multimedia access to mobile devices. The advantages are significant in highly mobile scenarios such as intra-vehicular networks. However, mobil...
INSENS: Intrusion-tolerant routing for wireless sensor networks 2006 4503 This paper describes an INtrusion-tolerant routing protocol for wireless SEnsor NetworkS (INSENS). INSENS securely and efficiently constructs tree-structured routing for wireless sensor networks (WSNs). The key objective of an INSENS network is to to...
A Key Predistribution Scheme for Sensor Networks Using Deployment Knowledge 2006 6417 To achieve security in wireless sensor networks, it is important to be able to encrypt messages sent among sensor nodes. Keys for encryption purposes must be agreed upon by communicating nodes. Due to resource constraints, achieving such key agreem...
Medium Access Control Protocols for Ad-Hoc Wireless Networks: A Survey 2006 5487 Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the access from active nodes. These pro...
Multi-hop/Direct Forwarding (MDF) for Static Wireless Sensor Networks 2009 2417 The success of Wireless Sensor Networks (WSNs) depends largely on efficient information delivery from target areas toward data sinks. The problem of data forwarding is complicated by the severe energy constraints of sensors in WSNs. In this work, we ...
Multipath Key Establishment for Wireless Sensor Networks Using Just-Enough Redundancy Transmission 2008 1497 In random key predistribution techniques for wireless sensor networks, a relatively small number of keys are randomly chosen from a large key pool and are loaded on the sensors prior to deployment. After deployment, each sensor tries finding a comm...
On Optimizing the Backoff Interval for Random Access Schemes 2003 1745 To improve the channel throughput and the fairness of random access channels, we propose a new backoff algorithm, namely, the sensing backoff algorithm (SBA). A novel feature of the SBA scheme is the sensing mechanism, in which every node modifie...
On search sets of expanding ring search in wireless networks 2008 2657 We focus on the problem of finding the best search set for expanding ring search (ERS) in wireless networks. ERS is widely used to locate randomly selected destinations or information in wireless networks such as wireless sensor networks In ERS, cont...
Online Price Dispersion Revisited: How Do Transaction Prices Differ from Listing Prices? 2015 2884 Price dispersion of a homogeneous product reflects market efficiency and has significant implications on sellers’ pricing strategies. Two different perspectives, the supply and demand perspectives, can be adopted to examine this phenomenon. The forme...
Optimal Transmission Range for Wireless Ad Hoc Networks Based on Energy Efficiency 2007 2253 The transmission range that achieves the most economical use of energy in wireless ad hoc networks is studied for uniformly distributed network nodes. By assuming the existence of forwarding neighbors and the knowledge of their locations, the ave...
A Pairwise Key Pre-Distribution Scheme for Wireless Sensor Networks 2005 2203 To achieve security in wireless sensor networks, it is important to be able to encrypt and authenticate messages sent between sensor nodes. Before doing so, keys for performing encryption and authentication must be agreed upon by the communicating pa...
Scheduling Sleeping Nodes in High Density Cluster-based Sensor Networks 2005 3014 In order to conserve battery power in very dense sensor networks, some sensor nodes may be put into the sleep state while other sensor nodes remain active for the sensing and communication tasks. In this paper, we study the node sleep scheduling prob...
Selection of a Forwarding Area for Contention-Based Geographic Forwarding in Wireless Multi-Hop Networks 2007 1195 Contention-based Geographic Forwarding (CGF) is a state-free forwarding technique. In this paper, we develop a general analytical framework to evaluate the performance of CGF with different forwarding areas in wireless multi-hop networks. In part...
Time-slotted voting mechanism for fusion data assurance in wireless sensor networks under stealthy attacks 2010 1499 In wireless sensor networks, data fusion is often performed in order to reduce the overall message transmission from the sensors toward the base station. We investigate the problem of data fusion assurance in multi-level data fusion or transmission i...