Kang G. SHIN教授简介 KANG G. SHIN is the Kevin & Nancy O'Connor Professor of Computer Science in the Department of Electrical Engineering and Computer Science, the University of Michigan, Ann Arbor. His current research focuses on computing systems and networks as well as on embedded real-time and cyber-physical systems, all with emphasis on timeliness, security, and dependability. He has supervised the completion of 70 PhDs, and authored/coauthored more than 770 technical articles (more than 270 of these are in archival journals), one a textbook and more than 20 patents or invention disclosures, and received numerous best paper awards, including the Best Paper Awards from the 2011 ACM International Conference on Mobile Computing and Networking (MobiCom’11), the 2011 IEEE International Conference on Autonomic Computing, the 2010 and 2000 USENIX Annual Technical Conferences, as well as the 2003 IEEE Communications Society William R. Bennett Prize Paper Award and the 1987 Outstanding IEEE Transactions of Automatic Control Paper Award. He has also received several institutional awards, including the Research Excellence Award in 1989, Outstanding Achievement Award in 1999, Distinguished Faculty Achievement Award in 2001, and Stephen Attwood Award in 2004 from The University of Michigan (the highest honor bestowed to Michigan Engineering faculty); a Distinguished Alumni Award of the College of Engineering, Seoul National University in 2002; 2003 IEEE RTC Technical Achievement Award; and 2006 Ho-Am Prize in Engineering (the highest honor bestowed to Korean-origin engineers). He has chaired several major conferences, including 2009 ACM MobiCom, 2008 IEEE SECON, 2005 ACM/USENIX MobiSys, 2000 IEEE RTAS, and 1987 IEEE RTSS. He is the fellow of both IEEE and ACM, and served on editorial boards, including IEEE TPDS and ACM Transactions on Embedded Systems. He has also served or is serving on numerous government committees, such as the US NSF Cyber-Physical Systems Executive Committee and the Korean Government R&D Strategy Advisory Committee. He has also co-founded a couple of startups. March 13, 2012 (Friday) 14:00~15:30 E-MiLi: Energy-Minimizing Idle Listening in Wireless Networks Kang G. Shin Department of Electrical Engineering and Computer Science The University of Michigan WiFi interface is known to be a primary energy consumer in mobile devices, and idle listening (IL) is the dominant source of energy consumption in WiFi. Most existing protocols, such as the 802.11 power-saving mode (PSM), attempt to reduce the time spent in IL by sleep scheduling. However, through an extensive analysis of real-world traffic, we found more than 60% of energy is consumed in IL, even with PSM enabled. To remedy this problem, we propose E-MiLi (Energy-Minimizing idle Listening) that reduces the power consumption in IL, given that the time spent in IL has already been optimized by sleep scheduling. Observing that radio power consumption decreases proportionally to its clock-rate, E-MiLi adaptively downclocks the radio during IL, and reverts to full clock-rate when an incoming packet is detected or a packet has to be transmitted. E-MiLi incorporates sampling rate invariant detection (SRID), ensuring accurate packet detection and address filtering even when the receiver's sampling clock-rate is much lower than the signal bandwidth. Further, it employs an opportunistic downclocking mechanism to optimize the efficiency of switching clock-rate, based on a simple interface to existing MAC-layer scheduling protocols. We have implemented E-MiLi on the USRP software radio platform. Our experimental evaluation shows that E-MiLi can detect packets with close to 100% accuracy even with downclocking by a factor of 16. When integrated with 802.11, E-MiLi can reduce energy consumption by around 44% for 92% of users in real-world wireless networks. (This is joint work with Xinyu Zhang and was presented at ACM MobiCom’11) 15:50~16:20 Talk 1: Bandwidth Guarantees in Wireless Networks Abstract: Interference is the major concern for developing scheduling and routing schemes in wireless networks. Due to interference, the path bandwidth calculation in wireless networks is complicated than that in wired networks. This talk gives some discussions about developing interference-aware routing protocol in wireless networks, analyzes the affect of the new wireless transmission techniques on the path bandwidth, and proposes several open issue for provisioning QoS guarantees in future wireless networks. Presenter: Prof. Ronghui Hou Bio: Ronghui Hou obtained her B.Eng., M. Eng., and Ph.D. degrees in Communication Engineering from Northwestern Polytechnical University in 2002, 2005, and 2007, respectively. She worked as a Post-Doctoral Fellow in the Department of Electrical and Electronic Engineering of the University of Hong Kong between 2007 and 2009. Since December 2009 she has been with Xidian University, China, where she is currently associate professor at Department of Telecommunication Engineering. Her research interests include network quality of service issues, routing algorithm design, and wireless networks. 16:30~17:00 Talk 2: Full/Half Duplex Based Resource Allocations for Statistical Quality of Service Provisioning in Wireless Relay Networks Presenter: Dr. Wenchi Cheng Abstract: Integrating information theory with the principle of effective capacity, we propose the optimal resource allocation schemes for wireless full duplex and half duplex relay networks, respectively, to support the statistical quality-of-service (QoS) provisioning. In particular, we introduce a new control parameter, termed cancellation coefficient, to characterize the performance of full duplex relay transmission mode. For both amplitude-and-forward (AF) and decode-and-forward (DF) relay networks, we develop the dynamic hybrid resource allocation policies under full duplex and half duplex transmission modes to maximize the network throughput for the given delay QoS constraint measured by the QoS exponent. The numerical results obtained verify that our proposed resource allocation schemes can support diverse QoS requirements over wireless relay networks under full duplex and half duplex transmission modes. Our analysis indicates that the optimal effective capacity of perfect full duplex transmission mode is not the just twice as much as the optimal effective capacity of half duplex transmission mode. Our numerical analyses also show that the hybrid transmission mode can achieve better performance than just using full duplex or half duplex transmission mode alone. Bio: Wenchi Cheng received the B.S. in 2008 and is currently working towards to the Ph.D. degree under supervising of Prof. Hailin Zhang in Xidian University. His research interests include mobile wireless communications and networks with emphasis on full-duplex transmission, statistical QoS provisioning, energy efficient resource allocation, and cognitive radio techniques. From 2010 to 2011, he worked as a visiting scholar at Texas A&M University, College Station. He has published multiple papers in IEEE INFOCOM, IEEE GLOBECOM, IEEE ICC, etc. He received the student travel grants of MILCOM 2011 and WUWNET2011. March 16, 2012 (Monday) 08:80~10:00 Can Open WiFi Networks Be Lethal Weapons for Botnets? Kang G. Shin Department of Electrical Engineering and Computer Science The University of Michigan I will talk about the potential for highly mobile botnets to communicate and perform nefarious actions using only open WiFi networks, which is termed mobile WiFi botnets. We have designed and evaluated a proof-of-concept mobile WiFi botnet using real-world mobility traces and actual open WiFi network locations for the urban environment of San Francisco. Our extensive simulation results demonstrate that mobile WiFi botnets can support rapid command propagation, with commands typically reaching over 75% of the botnet only 2 hours after injection -- sometimes, within as little as 30 minutes after injection. Our evaluation results also indicate that even a small mobile WiFi botnet of only 536 bots can launch an effective DDoS attack against poorly protected systems. Furthermore, mobile WiFi botnet C&C and DDoS traffic is sufficiently distributed across multiple open WiFi networks -- with no single network being over-utilized at any given moment -- to make detection difficult. (This is joint work with Matt Knysz, Arun Ganesan, and Xin Hu) 10:20~10:50 Talk 1: Distributed Space-Time Coding for Full Duplex Asynchronous Cooperative Communications Presenter: Prof. Yi Liu Abstract: This talk is about the design of STC for full duplex asynchronous cooperative communications. Considering there is a loop interference channel at the relay, we present two different methods to design STC which can acheive asynchronous full diversity. We also investage the effects on performance of the loop channel information error. Finally, we present some simulation results to verify the theory. Bio: Yi Liu received the B.S. degree in communication engineering from Dalian Jiaotong University, Dalian, China, in 2002 and the M.S. and Ph.D. degrees in communication engineering from Xidian University, Xi’an, China, in 2005, and 2007, respectively. Since Jan. 2008, he has been with Xidian University, Xi’an, China. From Mar. 2011 to Feb. 2012, he worked as a visiting scholar in University of Delaware, USA. His research interests are in signal processing for wireless communications, MIMO and OFDM wireless communications, cooperative communications. 11:00~11:30 Talk 2: A Self-configuration Scheme for Power and Bandwidth Assignment in Femtocell Networks Presenter: Dr. Yinghong Ma Abstract: Femtocells, as a new wireless access technology, can offload the traffic of macrocells and help satisfy the requirements of high-data-rate indoor wireless services. However, cross-tier interference coordination becomes a challenge due to the unplanned deployment of large number of Femtocells. This talk presents a novel strategy to reduce the cross-tier interference while ensure high spectrum efficiency, which configures the power and bandwidth of Femtocells jointly based on the estimation of QoS requirements. Bio: Yinghong Ma received her Ph.D. degree of Military Communications in 2011 from Xidian University. She is now a lecturer with the School of Telecommunications Engineering, Xidian University. She completed her two-year research and training as a Visiting Student between Oct. 2008 and Oct. 2010 in the Laboratory for Computational Neuroscience at University of Pittsburgh, USA. Her current research interests include Cooperative Communications, Cognitive Radio Networks, and Heterogeneous Wireless Networks.