Michigan State University
Meet the Teams
How can we help?
Tech Transfer & Commercialization
Startups & Entrepreneurship
Browse this Section...
Search Results - tongtong+li
Regenerating Code uses Rate-matching to Improve Retrieval from Hostile Networks
Executive SummaryA combination of two new regenerating algorithms increases the ability to recover information in a hostile network. This layered approach yields a more efficient and reliable way of detecting and correcting malicious nodes.Description of TechnologyIn a hostile network, conventional regeneration codes struggle to restore corrupt nodes...
Secure Access Gateway Design for Smart Grid and Smart Home
Executive SummarySecure and efficient communication between human beings and managed devices is key to the success of Smart Grid and Smart Home technology. Security has to be ensured from the aspects of access control, privacy protection, communication integrity, and intrusion detection. Unfortunately, the security provided by existing systems is far...
Telecommunications and Internet
Defense Against Primary User Emulation Attacks In Cognitive Radio Networks
Executive SummaryCognitive radio (CR) networks take advantage of unused bandwidth through which secondary unlicensed users may share the spectrum with the licensed primary users to better utilize the spectrum at any given time. Primary user emulation attacks (PUEAs) are malicious attacks in which a malicious user mimics the signal of a primary user...
Back To Top