- Software-Defined Networks and 5G
- Advanced Optical Network Technologies
- Security in Wireless Sensor Networks
- Cloud Computing and Resource Management
- Energy Efficient Wireless Sensor Networks
- IoT and Edge/Fog Computing
- Network Traffic and Congestion Control
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Advanced Photonic Communication Systems
- Opportunistic and Delay-Tolerant Networks
- Caching and Content Delivery
- Smart Grid Security and Resilience
- Optical Network Technologies
- Software System Performance and Reliability
- Interconnection Networks and Systems
- Vehicular Ad Hoc Networks (VANETs)
- Wastewater Treatment and Reuse
- Blockchain Technology Applications and Security
- Water-Energy-Food Nexus Studies
- User Authentication and Security Systems
- Cryptography and Data Security
- Neural Networks and Applications
- Face and Expression Recognition
- IoT Networks and Protocols
Xi’an University of Posts and Telecommunications
2007-2022
Guodian Institute of Science and Technology
2021
Fujitsu (United States)
2008-2019
University of South Florida
2012
Hunan University
2009
University of Bradford
2008
Arizona State University
2005-2007
Recent advances in the areas of Internet Things (IoT), big data, and machine learning have contributed to rise a growing number complex applications. These applications will be data-intensive, delay-sensitive, real-time as smart devices prevail more our daily life. Ensuring quality service (QoS) for delay-sensitive is must, fog computing seen one primary enablers satisfying such tight QoS requirements, it puts compute, storage, networking resources closer user. In this paper, we first...
Network function virtualization (NFV) provides an efficient and flexible way to deploy network services in the form of service chains (SFCs) by adopting generalized equipment. However, software-based virtualized functions (VNFs) bring new challenge for operators providing availability guarantees. Traditionally, network-level protection mechanisms are considered separately from function-level VNF backup mechanisms. a SFC's cannot be guaranteed if only network- level or considered. In this...
Recent advances in the areas of Internet Things (IoT), Big Data, and Machine Learning have contributed to rise a growing number complex applications. These applications will be data-intensive, delay-sensitive, real-time as smart devices prevail more our daily life. Ensuring Quality Service (QoS) for delay-sensitive is must, fog computing seen one primary enablers satisfying such tight QoS requirements, it puts compute, storage, networking resources closer user. In this paper, we first...
Delay-tolerant networking (DTN) is an architecture to enable data communications between isolated or remote regions, where long delays and intermittent connectivity can be tolerated. An emerging class of DTN, called vehicular DTNs (VDTN), exploits transportation systems as the transport layer transfer data. In these networks, vehicles (e.g., busses, boats, trains) act mobile nodes carry messages around. Mobile exchange using devices relay nodes. Relay nodes, placed in strategic positions...
Selective forwarding attack in wireless sensor networks shows great impact on network performance and consumes limited energy resource. In previous countermeasures, it is assumed that all nodes the communication range can detect misbehaviors of attacker. However, as devices require certain signal-to-noise ratio to receive frames correctly, interference among inevitable densely deployed networks, very difficult for approaches accurately. this article, a scheme named E-watchdog proposed...
We jointly consider problems of virtual network mapping and routing wavelength assignment in WDM networks. Flexible node enabled by virtualization achieves significant optical resource savings compared to fixed mapping.
Location privacy is very important for event-triggered type of Wireless Sensor Networks (WSNs) applications such as tracking and monitoring wild animals. Most the security schemes WSNs are designed to provide protection content privacy. Contextual node identity anonymity has received much less attention. The adversary can fully explore contextual information disclose location critical components source nodes or base station. existing at network layer. As no measures taken data link layer,...
In 5G, network slicing is considered as an important enabler to support various verticals simultaneously, by providing dedicated and isolated slice services over a common infrastructure. Many have specific Service Level Agreement (SLA), which should be guaranteed mechanisms like service assurance (SA). SA required collaborate with orchestration management automate the provisioning process. this paper, we first propose hierarchical, distributive, modular architecture assure entire from end...
We propose a vertex-centric distributed resource orchestration algorithm for finding all feasible mappings of service function chain in multi-domain networks. Simulation results show superior efficiency and scalability computing large requests.
In this paper, we address the problem of data-burst grooming in optical burst-switched (OBS) networks. OBS networks, IP packets with same edge-node destination are assembled into larger called data bursts. Depending on core node's switching technology, bursts required to have a minimum length. On other hand, each packet burst has time delay constraint, maximum end-to-end delay, which determines upper limit before must reach its destination. Thus, cannot wait indefinitely until sufficient...
This paper introduces a novel congestion detection scheme for high-bandwidth TCP flows over optical burst switching (OBS) networks, called statistical additive increase multiplicative decrease (SAIMD). SAIMD maintains and analyzes number of previous round-trip time (RTTs) at the senders in order to identify confidence with which packet loss event is due network congestion. The derived by positioning short-term RTT spectrum long-term historical RTTs. corresponding then taken developed policy...
We present the SPN OS, a Network-as-a-Service orchestration platform for NFV/SDN integrated service provisioning across multiple datacenters over packet/optical networks. Our prototype showcases template-driven function chaining and high-level network programming-based optical networking.
Considering the availability of datacenter's network elements, we propose a coordinated protection mechanism that adopts both backup path and SFC replicas distributed among datacenters to support high while reducing total cost.
The open wireless channel makes the data prone to being eavesdropped. Current security schemes are designed protect through cryptography. But an adversary can still recover secrets by eavesdropping frames and performing off-line brute-force attacks. Capturing valid is fundamental for such It generally accepted that each frame at link layer include cyclic redundancy check (CRC) checksum sequence integrity check. However, also helps capture correct drop corrupted ones, which future In this...
Abstract With the development of new technologies for smart grid construction, is gradually developing. Smart construction an important field next generation information technology, and its value significance have been widely recognized. not only provides opportunities, but also brings great challenges. Security privacy become serious problems in grid. Based on this, this paper discusses system structure block chain, puts forward security diagnosis scheme according to existing theoretical...
Network slicing is a concept to provide dedicated and isolated telco services tailored specific needs of different verticals over common infrastructure. Offering service assurance (SA) in network implies full awareness quick response all frequent changes topology, resources, function operation, requests, slice performance. It requires precise coordination between components facilitate efficient access, processing, analysis the information necessary take right actions an architecture that...
We consider virtual optical network (VON) provisioning over a flexible-grid multi-domain with the objective of minimizing total cost, including cost transponders, regenerators, and spectrum. propose three-step heuristic algorithm that addresses issues domain selection, topology aggregation, routing, modulation format, spectrum assignment (RMSA) when mapping links onto physical links. selection technique attempts to minimize number inter- then suggest aggregation (TA) exchange intra...
We present Object-oriented Network Virtualization (OONV), a new virtual networking paradigm. OONV provides Virtual abstraction for network resources that is commensurate with VM-oriented computing resources. With OONV, Software-defined Networking (SDN) evolves into Software-programmed (SPN).
This paper introduces a novel congestion control scheme for TCP over OBS networks, called Statistical Additive Increase Multiplicative Decrease (SAIMD), which aims to improve the throughput performance high-bandwidth flows in networks. We show through analytic model and extensive simulations that proposed can effectively solve false detection problem significantly outperform conventional counterparts without losing fairness.
With the emergence of 5G and Internet Things technologies, there is an increasing trend network services integrating edge centralized cloud computing for guaranteeing low latency, real-time processing, better security/privacy. In this demo, we present intelligent IoT solution with virtual functions (VNFs) running on uCPE. We demonstrate system architecture VNFs uCPE show that, in addition to typical VNFs, can be included increase opportunities new revenues while using same...
Ad hoc networks have been a fundamental building block for Machine-to-Machine (M2M) communications that can be often disconnected, intermittent, and limited. The consequent limitations addressed researched. In this paper, we proposed the Multicast Cardinality Smart Selection (MCSS) scheme wireless ad networks, based on modified stochastic branching process, to support data exchange in fast switching topology. A network of smart devices such as drones or vehicles with different velocity is...
It has been shown that burst retranmsission scheme and deflection can effectively reduce the loss probability, thereby improving performance of loss-based TCP implementations. However, both schemes introduce additional delays for bursts are retransmitted or deflected. The could result in delay-based falsely detecting network congestion, which may negatively impact implementations, such as Vegas. In this paper we investigate Vegas behavior over OBS networks. Furthermore, analyze throughput a...
We propose a novel communication model based on modified stochastic branching process to support data exchange between smart "things" connected via ad hoc networks. Ad networks are believed be good fit for dynamic network infrastructure which can disconnected, intermittent, and limited (DIL). Our approach aims balance reachability, node usage, average factor in message transmission by controlling the local transmssion ratio concurrent topology. first introduce delivery prove its reachability...