Prof. Xiang-Yang Li, Department of Computer Science, Illinois
Institute of Technology.
Prospective Students (especially PHD students)
Prospective students who are interested in working in WINET group in research
areas of mutual interests are
welcome to contact Prof. Xiang-Yang Li. If you are in the MS or PhD
program and want to do the thesis projects with me,
feel free to contact me about the possible topics for the projects
and independent study.
Some potential topics include but are not limited to:
- Wireless Sensor Networks (WSN): In the past decade, WSNs have gained a lot of attention from the research and industry community. Countless research projects have been launched to study various aspects of WSNs and
produced fruitful interesting results. The uses of WSNs nowadays, however, are far restricted by many theoretical or practical obstacles. For examples, most WSNs adopt un-rechargeable batteries with limited power supply. The
wireless links among the sensor nodes appear to be unreliable and easily affected by various environmental factors. Nevertheless, there are hardly any fundamental results on the network capacity of a duty-cycled WSN with
unreliable wireless links. Further considering the possible faults of sensor nodes and the difficulties of outdoor deployment and maintenance, a real WSN system often fails to support long-term large-scale applications with
Our sensor network research concentrates on platforms and methods to bridge the gaps between physical and cyber worlds. We investigate sensor and actuator network applications in environmental and energy conservation. We would
like to study the following challenges:
What are the fundamental challenges in implementing large-scale
- Which research and technical issues must be addressed to design
and implement a large-scale sustainable WSN?
Where are the potential design spaces of future WSN research?
How to efficiently, seamlessly, and effectively integrate the
physical word, WSNs, and Internet, such that we can efficiently
monitor the environment, and then derive usable knowledge?
- The asymptotic network capacity of large-scale wireless sensor
networks under various link and network models.
The optimal tradeoffs between capacity and other measurements (such as
delay for mobile networks, energy consumption for WSN) of
large-scale ad hoc networks.
The research and industrial communities are in urge need of the
answers to the three questions.
- Mobile Computing and Social Networking (collaboration with Tsinghua, and HangZhou DianZi University): Over the past three years, we have been developing various mechanisms to enable novel applications by bringing
together multiple mobile devices. We take a people-centric approach and emphasize the key role of mobile devices in information collecting and consumption.
Online social networking (OSN) often involves grouping specific individuals or organizations together. A number of mobile social networking services appear in the market for OSN, including Twitter, BrightKite, Loopt. Some of them
offer location-based services to facilitate people's interactivity using a GPS module. Majority of systems rely on a centralized server and require communication infrastructures to provide Internet access. Further their
location-based services are not offered to low-end mobile devices without GPS modules.
To address these potential problems that could hinder OSN usage, we design and construct a multi-hop networking system named MoNet based on WiFi, and, on top of which we design and implement WiFace, a distributed
privacy-aware geosocial networking service. We design a distributed content sharing protocol which can significantly shorten the relay path, reduce the conflicts and prolong the data lifetime.A role strategy is designed to
encourage users to collaborate in the network.Furthermore, a key management scheme and authorization mechanism are developed to prevent some attacks and protect privacy.We conduct comprehensive experiments to evaluate
performances of our mobile platform MoNet and application WiFace. The results show that MoNet is more than sufficient to support social networking, and even audio and video applications.
Another research topic is to design and implement a multi-hop wireless
ad hoc networking system using Bluetooth technology.
In this work, we study a specific mobile social network that appears
in local and impromptu occasions. To serve such a social network, we
design and implement a relatively large-scale mobile ad hoc network,
using Bluetooth as a communication platform.
In BlueSky, we design a virtual network layer on top of the original
Bluetooth stack to provide necessary functionalities for
constructing a secure and large-scale multi-hop mobile social
networks. Using BlueSky, we implement one typical application, named
BlueClass, for facilitating teaching needs in a class. We
present findings from our real testbed studies based on which we
provide the design requirements of BlueSky and BlueClass. We
describe the implementation of BlueSky and BlueClass on Windows
Mobile and report comprehensive usability evaluations and
measurement of system performances. Our extensive evaluations
demonstrate that our BlueSky and BlueClass implementation has
negligible overheads, provides robust protections against attacks,
and is extremely favored by students.
- Non-Cooperative and Cooperative Computing in Distributed Systems (A Microeconomic Approach to Network Ecosystems).
We will address several system-level issues that play significant roles in designing robust and efficient network protocols with selfish participants: application layer, transport layer and medium access control layer, and
network layer. Potential topics:
- the reputation and trust-inference for
networking protocol design, and investigate free-riding detection and prevention using
DiffServ and/or monetary payment;
- study existing transport and MAC protocols
optimized for an environment with selfish users and possibly
design new ones;
- study the impact of
selfish behaviors on various routing protocols and the design of
mechanisms that can detect and prevent harmful selfish behaviors and
- Via a unified fashion, design
network protocols thwarting selfish behaviors.
- Evaluate the impact of heuristics and protocols
by simulation and testbed experiments.
We need to make a great effort to explore different tradeoffs such as the
communication and computation overhead and their tradeoffs,
implementation cost and performance gain, etc.
We anticipate that effective and efficient software tools will
be developed for dealing with these problems based on solid ideas.
Zero Pre-Configuration Secure and Dependable Communication in Tactical
Mobile Ad-hoc Networks (collaboration with Kui Ren fro ECE, IIT).
Wireless mobile ad-hoc networks have been widely applied in military
tactical environments to allow mobile nodes, e.g., soldiers,
tanks, battle ships, aircrafts or sensors, equipped with wireless
communication devices, to exchange
mission-critical information in an on-demand manner without relying on
network infrastructure. In such applications, it is of paramount
importance to ensure communication security due to the criticality of
the information being exchanged and
the fact that network environments can be extremely adversarial. In this
research we focus on secret and
dependable wireless communications in tactical mobile ad-hoc networks
(T-MANET) and especially the following:
- Mechanisms for Zero Pre-Configuration Secret Wireless
- Mechanisms for Zero Pre-Configuration Dependable Wireless Communication
- Other topics: We are also interested in cyber-Physical Systems, wireless networks, practical algorithms' implementation, information processing, data mining, computer graphics, and scientific computing (3D meshing for
various purposes, modeling and so on).
Before you contact me, you should read the following information (based on information collected and/or
written by Professor Guoliang Xue from ASU):
- PhD thesis research represents a substantial work. You may want to read
Useful Things to Know About Ph.D. Thesis Research
by H.T. Kung at Harvard.
- Choosing a PhD thesis advisor is a very important decision for a graduate student. Here are some suggested readings:
- How to Choose a Thesis Advisor by Michael C. Loui at UIUC.
- How to Succeed in Graduate School from ACM Crossroads student magazine.
- How to Be a Good Graduate Student from the Caltech Grad Handbook.
Before you contact me, please check out mine research interests
and read through the following. This will save both your time and
- If you are working with another faculty member in our department, please do
not contact me.
- Research is enjoyable most of the times. Some times, however, it may not be as smooth as you thought. Please make sure you have the dedication and determination to carry out research.
- On average (1997--present), I work about 50-60 hours a week. You have to be prepared for this. Hard working is a necessary condition for success, but not sufficient though, :-).
- My research centers around better algorithms for various
optimization problems in computer networks (most recently, in
cyber-physical systems, wireless ad hoc networks, sensor networks,
and peer-to-peer networks). In order to thrive in my group, you need
to have a strong ability in algorithm design and analysis,
and a broad knowledge in networks, especially wireless networks.
- You will also need to be able to carry out implementations
effectively. Proficiency in (not just knowing) C or C++ is a
must. If you do not know any one of the following programming
you have to be prepared to learn at least one of the following
simulation tools before you start the PhD program:
For students working in WSN or CPS area, you need to be proficient in
TinyOS and/or hardware design.
- TinyOS programming and sensor network system design. (basically required)
- NS-2: the general network simulator (basically required)
- MATLAB: scientific computing and graphics (basically
- CPLEX: for solving LP and ILP
- LEDA: library for efficient data structures and
- OPNET: for wireless networks and WDM networks
What is the advisor's effort?
I help my graduate students select important research topics and
train them in research projects so that PhD students can perform
independent research and publish papers of the highest quality
(e.g. major ACM/IEEE Transactions or Journals). MS students can perform
guided research and publish a paper in a reputable conference or
Is it worth all the effort?
In doing so, you will increase your market value (hopefully it is
always the case, :-)).
How to read technical papers in computer science?
When you read articles or reports, keep the following in mind
- What is the main contribution of the paper?
- Is this important, why?
- Is this a theoretical contribution to some fundamental problems in CS, or a protocol-like contribution, or both?
- What was the main insight in getting the result?
- What is not clear to you?
- What did the authors not do, and you regard important?
- What are the most important assumptions, are they limiting?
- What are the possible applications suggested in the paper?
- How does this relate to other things we have seen?
- What extensions does this suggest?
- Can you suggest some project idea based around the ideas in this paper?
If you read through this point and still want to work with me,
please email me at
xli AT cs DOT iit DOT edu with your resume (ASCII, PDF or POSTSCRIPT) and sample papers (if you do have publications). Please acknowledge that you have read this page at the beginning of your email. Otherwise, I may not spend the time to read your resume. You can also contact my current or graduated students about the research topics and styles.
Copyright © 2010,
Wireless Networking Research Lab, Department of Computer
Science, Illinois Institute of Technology