Akihiro Nakao

ORCID: 0000-0003-0012-5287
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Software-Defined Networks and 5G
  • Caching and Content Delivery
  • Peer-to-Peer Network Technologies
  • Network Security and Intrusion Detection
  • Internet Traffic Analysis and Secure E-voting
  • Network Traffic and Congestion Control
  • IoT and Edge/Fog Computing
  • Cloud Computing and Resource Management
  • Opportunistic and Delay-Tolerant Networks
  • Advanced Optical Network Technologies
  • Network Packet Processing and Optimization
  • Complex Network Analysis Techniques
  • Telecommunications and Broadcasting Technologies
  • Energy Efficient Wireless Sensor Networks
  • Advanced MIMO Systems Optimization
  • Advanced Malware Detection Techniques
  • Mobile Agent-Based Network Management
  • IPv6, Mobility, Handover, Networks, Security
  • Evolutionary Game Theory and Cooperation
  • Wireless Networks and Protocols
  • Cooperative Communication and Network Coding
  • Vehicular Ad Hoc Networks (VANETs)
  • Game Theory and Applications
  • Privacy-Preserving Technologies in Data
  • Advanced Computing and Algorithms

The University of Tokyo
2015-2024

Tokyo University of Information Sciences
2008-2021

Tokyo University of Agriculture and Technology
2020-2021

The University of Melbourne
2021

Bunkyo University
2010-2019

Kawasaki Medical School
2016

National Institute of Information and Communications Technology
2008-2014

University of Würzburg
2009-2014

Birmingham City University
2014

Ewha Womans University
2014

10.1016/j.comnet.2015.02.014 article EN Computer Networks 2015-02-24

We argue that designing overlay services to independently probe the Internet--with goal of making informed application-specific routing decisions--is an untenable strategy. Instead, we propose a shared underlay query. posit this must adhere two high-level principles. First, it take cost (in terms network probes) into account. Second, be layered so specialized can built from set basic primitives. These principles lead design where lower layers expose large-scale, coarse-grained static...

10.1145/863955.863958 article EN 2003-08-25

The research and development (R&D) the standardization of 5th Generation (5G) mobile networking technologies are proceeding at a rapid pace all around world. In this paper, we introduce emerging concept network slicing that is considered one most significant technology challenges for 5G infrastructure, summarize our preliminary efforts to enable end-to-end networking, finally discuss application use cases should drive designs infrastructure slicing.

10.2197/ipsjjip.25.153 article EN Journal of Information Processing 2017-01-01

5G mobile systems are expected to meet different strict requirements beyond the traditional operator use cases. Effectively, accommodate needs of new industry segments such as healthcare and manufacturing, need elasticity, flexibility, dynamicity, scalability, manageability, agility, customization along with levels service delivery parameters according requirements. This is currently possible only by running networks on top same infrastructure, technology called network function...

10.1109/mcom.2017.1600947 article EN IEEE Communications Magazine 2017-05-01

One of the challenges in autonomous driving is limited sensing from a single vehicle that causes spurious warnings and dead-lock situations. We posit cloud-based control system[1] promising when number vehicles must be controlled, since we can collect information sensors across multiple for coordination. However, cloud based has inherent challenge long-haul communication susceptible to prolonged latency packet loss caused by congestion, mobile edge computing (MEC)[2] recently attracts...

10.1109/sice.2016.7749210 article EN 2016-09-01

One of the key objectives 5G is to evolve current mobile network architecture from "one-fit-all" design model a more customized and dynamically scaling one that enables deployment parallel systems, tailored service requirements on top shared infrastructure. Indeed, envisioned services may require different needs in terms capacity, latency, bandwidth, reliability security, which cannot be efficiently sustained by same Coming address these customization challenges, softwarization expressed...

10.1587/transcom.2016nni0002 article EN IEICE Transactions on Communications 2017-01-01

10.1109/icce63647.2025.10930106 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2025-01-11

In this paper, we posit that, in future mobile network, network softwarization will be prevalent, and it becomes important to utilize deep machine learning within classify traffic into fine grained slices, by identifying application types devices so that can apply Quality-of-Service (QoS) control, edge/multi-access computing, various function per device. This paper reports our initial attempt for from actual captured an MVNO, virtual operator design the system classifying specific slices.

10.1587/transcom.2017cqi0002 article EN IEICE Transactions on Communications 2018-01-21

Routing overlays have become a viable approach to working around slow BGP convergence and sub-optimal path selection, as well deploy novel forwarding architectures. A common sub-component of routing overlay is mesh : the route-selection algorithm considers only those virtual links inter-node in an overlay---in rather than all N 2 connecting -node overlay. Doing so reduces overhead, thereby improving scalability overlay, long process constructing doesn't itself introduce overhead.This paper...

10.1145/1113361.1113372 article EN ACM SIGOPS Operating Systems Review 2006-01-01

In this paper we will investigate why and how Network Virtualization (NV) can overcome the shortfalls of current system it paves way for Future Internet. Therefore, first discuss some major deficiencies achievements today's Afterwards, identify three building blocks NV: a) use application-specific routing overlays, b) safe consolidation of resources by OS virtualization on a generic infrastructure, c) the exploitation network diversity performance enhancements new business models, such as...

10.14279/tuj.eceasst.17.216.218 article EN Kommunikation in Verteilten Systemen 2009-02-27

In this paper, we posit that extension of SDN to support deeply and flexibly programmable, software-defined data plane significantly enhance NFV their interaction in terms (1) enhanced between applications networks, (2) optimization network functions, (3) rapid development new protocols. All these benefits are expected contribute improving the quality diversifying communication networks services. We identify three major technical challenges for enabling as ease programming, reasonable...

10.1587/transcom.e98.b.12 article EN IEICE Transactions on Communications 2015-01-01

With the continuous development of Artificial Intelligence (AI), AI services are becoming increasingly influential in society, affecting both individual lives and enterprise production. However, field model training grapples with a conflict between desire to maximize utilization private external data, necessity limit collaborative data sharing for privacy protection. Strict regulations on sensitive give rise silos, impeding smooth flow information as well. In response these challenges,...

10.1109/access.2024.3404948 article EN cc-by-nc-nd IEEE Access 2024-01-01

Network testbeds for developing, deploying, and experimenting with new network services have evolved as recent rapid progress in virtualization technology. This paper proposes a testbed that enhances PlanetLab is based on hosted virtual machine monitor (VMM) execution environment (VEE) to run on.This reports our experiences developing such prototype employing Kernel-based Virtual Machine (KVM) VMM. The examines the performance scalability of see whether or not it fulfills what we believe be...

10.1145/1544012.1544085 article EN 2008-01-01

Network virtualization has become a common research topic that many researchers consider basis for defining new generation network architectures. In this paper, we attempt to clarify the concept of with its brief history, introduce benefit future network, posit our strong belief in should adopt form meta-architecture accommodates multiple competing architectures, and identify challenges achieving architecture.

10.1587/transcom.e93.b.454 article EN IEICE Transactions on Communications 2010-01-01

In overlay networks, the interplay between network structure and dynamics remains largely unexplored. this paper, we study dynamic coevolution individual rational strategies (cooperative or defect) structure, that is, interaction peer's local behaviors emergence of whole structure. We propose an evolutionary game theory (EGT)-based topology evolution scheme to drive a given into small-world (high global efficiency average clustering coefficient). Our contributions are following threefold:...

10.1109/tsmcb.2009.2027221 article EN IEEE Transactions on Systems Man and Cybernetics Part B (Cybernetics) 2009-09-04

While distributed denial-of-service (DDoS) threats have been raising concerns for many years, a widely-acceptable solution is still absent. In this paper, we advocate novel and promising DDoS defense by using powerful cloud infrastructures as new battlefields. To explore idea, design implement cloud-based attack system called CLAD, which running on network service to protect Web servers.

10.1109/noms.2010.5488345 article EN 2010-01-01

In this paper, we apply the concept of software-defined data plane to defining new services for Mobile Virtual Network Operators (MVNOs). Although there are a large number MVNOs proliferating all over world and most them provide low bandwidth at price, propose business model empower with capability tailoring fine-grained subscription plans that can meet users' demands. For example, abundant be allocated some specific applications, while rest applications limited bandwidth. purpose, have...

10.1587/transcom.e98.b.2111 article EN IEICE Transactions on Communications 2015-01-01

DaaS is a service that protects server against all 3 types of Distributed Denial-of-Service (DDoS), arbitrary packet, legit user-mimicking and economic attacks. For packet DDoS defense, DaaS's framework facilitates harness intermediaries relay traffic to so their total resource exceeds those bots. unique self-verifying Proof-of-Work (sPoW) empowers sender compete with bots by solving more difficult sPoW puzzle discover obscure "ephemeral" intermediary channel has been designated single...

10.1109/saint.2011.30 article EN 2011-07-01
Coming Soon ...