- Wireless Networks and Protocols
- Software-Defined Networks and 5G
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Cooperative Communication and Network Coding
- Network Traffic and Congestion Control
- Advanced MIMO Systems Optimization
- Indoor and Outdoor Localization Technologies
- Advanced Wireless Network Optimization
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Energy Efficient Wireless Sensor Networks
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Wireless Communication Networks Research
- IoT and Edge/Fog Computing
- Underwater Vehicles and Communication Systems
- Information and Cyber Security
- Energy Harvesting in Wireless Networks
- Caching and Content Delivery
- Iterative Learning Control Systems
- Cloud Computing and Resource Management
- Smart Grid Energy Management
- Full-Duplex Wireless Communications
- Advanced machining processes and optimization
Gwangju Institute of Science and Technology
2013-2022
Korea Institute of Science and Technology
2022
Singapore University of Technology and Design
2018
ORCID
2018
Institute of Science and Technology
2016
Nanyang Technological University
2014
Qualcomm (United Kingdom)
2010
Market Matters
2010
Korea Institute of Science & Technology Information
2008-2010
University of Illinois Urbana-Champaign
2005-2006
Reactive defense mechanisms, such as intrusion detection systems, have made significant efforts to secure a system or network for the last several decades. However, nature of reactive security mechanisms has limitations because potential attackers cannot be prevented in advance. We are facing reality with proliferation persistent, advanced, intelligent attacks while defenders often way behind taking appropriate actions thwart attackers. The concept moving target (MTD) emerged proactive...
Abstract Driven by advances in signal processing and multiuser detection (MUD) technologies, it has become possible for a wireless node to simultaneously receive multiple signals from other transmitters. In order take full advantage of MUD multi-packet reception (MPR) capable networks, is highly desirable make the compound transmitters more separable on its constellation at receiver coordinating both transmit power level carrier phase offsets this article, we propose feedback-based...
Federated learning (FL) is a machine technique that enables distributed devices to train model collaboratively without sharing their local data. FL-based systems can achieve much stronger privacy preservation since the deliver only parameters trained with data centralized server. However, there exists possibility server or attackers infer/extract sensitive private information using structure and of models. We propose employing homomorphic encryption (HE) scheme directly perform arithmetic...
With the technical advances in ubiquitous comput- ing and wireless networking, there has been an increasing need to capture context information (such as location) figure it into applications. In this paper, we establish theoreti- cal base develop a localization algorithm for building zero- configuration robust indoor tracking system support location-based network services management. The takes input on-line measurements of received signal strengths (RSSs) between 802.11 APs client its...
Wireless sensor networks have gained considerable attention in the past few years. They found application domains battlefield communication, homeland security, pollution sensing, and traffic monitoring. As such, there has been an increasing need to define develop simulation frameworks for carrying out high-fidelity WSN simulation. In this article we present a modeling, simulation, emulation framework WSNs J-Sim - open source, component-based compositional network environment developed...
The importance of spatial reuse in wireless ad-hoc networks has been long recognized as a key to improving the network capacity. One can increase level by either reducing transmit power or increasing carrier sense threshold (thereby range). On other hand, decreases increases, SINR result smaller received signal increased interference level. Consequently, data rate sustained each transmission may decrease. This leads naturally following questions:(1)How trade-off between and decreased node...
A smart grid facilitates more effective energy management of an electrical system. Because both consumption and associated building operation costs are increasing rapidly around the world, need for flexible cost-effective used by buildings in a environment is increasing. In this paper, we consider system connected to external (utility) as well distributed resources including renewable source, storage system, vehicle-to-grid station. First, modeled using Markov decision process that...
Recent advances in signal processing have demonstrated in-band full-duplex capability at WiFi ranges. In addition to simultaneous two-way exchange between two nodes, access points can potentially support uplink and downlink flows. However, the atomic three-node topology, which allows downlink, leads inter-client interference. this paper, we propose a random-access medium control protocol using distributed power manage interference wireless networks with full-duplex-capable that serve...
With an exponential increase in network traffic demands requiring quality of services, the need for routing optimization has become more prominent. Recently, advent software-defined networking (SDN) technology enables centralized management and operation, resources such as switches flexibly configurable through programmable interfaces. In this paper, we propose a deep reinforcement learning (DRL)-based on SDN. proposed method, DRL agent learns interdependency between load performance,...
Wireless sensor networks (WSNs) have gained considerable attention in the past few years. As such, there has been an increasing need for defining and developing simulation frameworks carrying out high-fidelity WSN simulation. In this paper, authors presented a modeling framework WSNs J-Sim - open-source, component-based compositional network environment that is developed entirely Java. This built upon autonomous component architecture (ACA) extensible internetworking (INET) of J-Sim,...
In this paper, we consider the issue of localization in anisotropic sensor networks. Anisotropic networks are differentiated from isotropic that they possess properties vary according to direction measurement. characteristics result various factors such as geographic shape region (non-convex region), different node densities, irregular radio patterns, and terrain conditions. order characterize features, devise a linear mapping method transforms proximity measurements between nodes into...
In this paper, we consider the problem of how to represent locations Internet hosts in a Cartesian coordinate system facilitate estimate network distance between two arbitrary hosts. We envision an infrastructure that consists beacon nodes and provides service estimating without direct delay measurement. show principal component analysis (PCA) technique can effectively extract topological information from measurements Based on PCA, devise transformation method projects data space into new...
In the last decade, vehicular ad hoc networks (VANETs) have been widely studied as an effective method for providing wireless communication connectivity in transportation systems. particular, cloud systems (VCSs) received abundant interest ability to offer a variety of vehicle information services. We consider data dissemination problem reliable delivery services from center vehicles through roadside access points (APs) with local storage. Due intermittent and limited storage size APs,...
Moving target defense (MTD) has emerged as a proactive mechanism aiming to thwart potential attacker. The key underlying idea of MTD is increase uncertainty and confusion for attackers by changing the attack surface (i.e., system or network configurations) that can invalidate intelligence collected interrupt execution; ultimately leading failure. Recently, significant advance software-defined networking (SDN) technology enabled several complex operations be highly flexible robust;...
To meet the explosive growth of mobile traffic, 5G network is designed to be flexible and support multi-access edge computing (MEC), thereby improving end-to-end quality service (QoS). In particular, slicing, which allows a physical infrastructure split into multiple logical networks, keeps balance resource allocation among different types with on-demand requests. However, achieving effective across difficult due dynamic characteristics slicing requests such as uncertain real-time demand...
Network address shuffling is one of moving target defense (MTD) techniques that can invalidate the information attackers have collected based on current network IP configuration.We propose a software-defined networking-based MTD technique called Flexible Random Virtual Multiplexing, namely FRVM, which aims to defend against reconnaissance and scanning attacks.FRVM enables host machine multiple, random, time-varying virtual addresses, are multiplexed real host.Multiplexing or de-multiplexing...
With regard to cyber security, pervasive traffic visibility is one of the most essential functionalities for complex network systems. A traditional system has limited access core and edge switches on network; other hand, SDN technology can provide flexible programmable management operations. In this article, we consider practical problem concerning how achieve scalable measurement using functionalities. Less intrusive monitoring be achieved by a packet sampling technique that...
Network slicing to create multiple virtual networks, called network slice, is a promising technology enable networking resource sharing among tenants for the 5th generation (5G) networks. By offering slice tenants, supports parallel services meet service level agreement (SLA). In legacy every tenant pays fixed and roughly estimated monthly or annual fee shared resources according contract signed with provider. However, such allocation mechanism may result in low utilization violation of user...
This paper aims at precision position control of the X-Y table a computerized numeric (CNC) machining center velocity reversal. The characteristics presliding friction are analyzed, and simple effective method is proposed to compensate on basis these characteristics. A large tracking error occurs reversal due sudden transition between regime sliding regime. investigates time reduce error, derives relationship acceleration zero velocity. also proposes estimating using this relationship,...
In this paper, we consider the problem of how to represent locations Internet hosts in a Cartesian coordinate system facilitate estimation network distances among arbitrary hosts. We envision an infrastructure that consists beacon nodes and provides service estimating distance between pairs without direct delay measurement. show principal component analysis (PCA) technique can effectively extract topological information from measurements Based on PCA, devise transformation method projects...
Bitcoin is a cryptocurrency based on blockchain technology that enables peer-to-peer transactions without central authority. known for resolving double-spending problems. When two or more miners generate block includes transaction information at nearly the same time, an accidental fork occurs. In this case, longest chain of blocks selected to avoid problem. However, if there attacker node whose hash power greater than half total power, can perform attack, i.e., 51% majority attack. We...
A disturbance attenuation method in a control system, called the model-based attenuator (MBDA), is proposed, and its properties are studied. The MBDA makes plant performs similarly to nominal plant, as much possible, using compensator. Then, controller designed based on plant. It shown that extremely robust with respect large variations of load inertia. implemented position system computer numerical (CNC) machining center, where velocity composed servo-pack (PI controller), servo motor,...