- Software-Defined Networks and 5G
- Caching and Content Delivery
- Peer-to-Peer Network Technologies
- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Network Traffic and Congestion Control
- IoT and Edge/Fog Computing
- Cloud Computing and Resource Management
- Opportunistic and Delay-Tolerant Networks
- Advanced Optical Network Technologies
- Network Packet Processing and Optimization
- Complex Network Analysis Techniques
- Telecommunications and Broadcasting Technologies
- Energy Efficient Wireless Sensor Networks
- Advanced MIMO Systems Optimization
- Advanced Malware Detection Techniques
- Mobile Agent-Based Network Management
- IPv6, Mobility, Handover, Networks, Security
- Evolutionary Game Theory and Cooperation
- Wireless Networks and Protocols
- Cooperative Communication and Network Coding
- Vehicular Ad Hoc Networks (VANETs)
- Game Theory and Applications
- Privacy-Preserving Technologies in Data
- Advanced Computing and Algorithms
The University of Tokyo
2015-2024
Tokyo University of Information Sciences
2008-2021
Tokyo University of Agriculture and Technology
2020-2021
The University of Melbourne
2021
Bunkyo University
2010-2019
Kawasaki Medical School
2016
National Institute of Information and Communications Technology
2008-2014
University of Würzburg
2009-2014
Birmingham City University
2014
Ewha Womans University
2014
We argue that designing overlay services to independently probe the Internet--with goal of making informed application-specific routing decisions--is an untenable strategy. Instead, we propose a shared underlay query. posit this must adhere two high-level principles. First, it take cost (in terms network probes) into account. Second, be layered so specialized can built from set basic primitives. These principles lead design where lower layers expose large-scale, coarse-grained static...
The research and development (R&D) the standardization of 5th Generation (5G) mobile networking technologies are proceeding at a rapid pace all around world. In this paper, we introduce emerging concept network slicing that is considered one most significant technology challenges for 5G infrastructure, summarize our preliminary efforts to enable end-to-end networking, finally discuss application use cases should drive designs infrastructure slicing.
5G mobile systems are expected to meet different strict requirements beyond the traditional operator use cases. Effectively, accommodate needs of new industry segments such as healthcare and manufacturing, need elasticity, flexibility, dynamicity, scalability, manageability, agility, customization along with levels service delivery parameters according requirements. This is currently possible only by running networks on top same infrastructure, technology called network function...
One of the challenges in autonomous driving is limited sensing from a single vehicle that causes spurious warnings and dead-lock situations. We posit cloud-based control system[1] promising when number vehicles must be controlled, since we can collect information sensors across multiple for coordination. However, cloud based has inherent challenge long-haul communication susceptible to prolonged latency packet loss caused by congestion, mobile edge computing (MEC)[2] recently attracts...
One of the key objectives 5G is to evolve current mobile network architecture from "one-fit-all" design model a more customized and dynamically scaling one that enables deployment parallel systems, tailored service requirements on top shared infrastructure. Indeed, envisioned services may require different needs in terms capacity, latency, bandwidth, reliability security, which cannot be efficiently sustained by same Coming address these customization challenges, softwarization expressed...
In this paper, we posit that, in future mobile network, network softwarization will be prevalent, and it becomes important to utilize deep machine learning within classify traffic into fine grained slices, by identifying application types devices so that can apply Quality-of-Service (QoS) control, edge/multi-access computing, various function per device. This paper reports our initial attempt for from actual captured an MVNO, virtual operator design the system classifying specific slices.
Routing overlays have become a viable approach to working around slow BGP convergence and sub-optimal path selection, as well deploy novel forwarding architectures. A common sub-component of routing overlay is mesh : the route-selection algorithm considers only those virtual links inter-node in an overlay---in rather than all N 2 connecting -node overlay. Doing so reduces overhead, thereby improving scalability overlay, long process constructing doesn't itself introduce overhead.This paper...
In this paper we will investigate why and how Network Virtualization (NV) can overcome the shortfalls of current system it paves way for Future Internet. Therefore, first discuss some major deficiencies achievements today's Afterwards, identify three building blocks NV: a) use application-specific routing overlays, b) safe consolidation of resources by OS virtualization on a generic infrastructure, c) the exploitation network diversity performance enhancements new business models, such as...
In this paper, we posit that extension of SDN to support deeply and flexibly programmable, software-defined data plane significantly enhance NFV their interaction in terms (1) enhanced between applications networks, (2) optimization network functions, (3) rapid development new protocols. All these benefits are expected contribute improving the quality diversifying communication networks services. We identify three major technical challenges for enabling as ease programming, reasonable...
With the continuous development of Artificial Intelligence (AI), AI services are becoming increasingly influential in society, affecting both individual lives and enterprise production. However, field model training grapples with a conflict between desire to maximize utilization private external data, necessity limit collaborative data sharing for privacy protection. Strict regulations on sensitive give rise silos, impeding smooth flow information as well. In response these challenges,...
Network testbeds for developing, deploying, and experimenting with new network services have evolved as recent rapid progress in virtualization technology. This paper proposes a testbed that enhances PlanetLab is based on hosted virtual machine monitor (VMM) execution environment (VEE) to run on.This reports our experiences developing such prototype employing Kernel-based Virtual Machine (KVM) VMM. The examines the performance scalability of see whether or not it fulfills what we believe be...
Network virtualization has become a common research topic that many researchers consider basis for defining new generation network architectures. In this paper, we attempt to clarify the concept of with its brief history, introduce benefit future network, posit our strong belief in should adopt form meta-architecture accommodates multiple competing architectures, and identify challenges achieving architecture.
In overlay networks, the interplay between network structure and dynamics remains largely unexplored. this paper, we study dynamic coevolution individual rational strategies (cooperative or defect) structure, that is, interaction peer's local behaviors emergence of whole structure. We propose an evolutionary game theory (EGT)-based topology evolution scheme to drive a given into small-world (high global efficiency average clustering coefficient). Our contributions are following threefold:...
While distributed denial-of-service (DDoS) threats have been raising concerns for many years, a widely-acceptable solution is still absent. In this paper, we advocate novel and promising DDoS defense by using powerful cloud infrastructures as new battlefields. To explore idea, design implement cloud-based attack system called CLAD, which running on network service to protect Web servers.
In this paper, we apply the concept of software-defined data plane to defining new services for Mobile Virtual Network Operators (MVNOs). Although there are a large number MVNOs proliferating all over world and most them provide low bandwidth at price, propose business model empower with capability tailoring fine-grained subscription plans that can meet users' demands. For example, abundant be allocated some specific applications, while rest applications limited bandwidth. purpose, have...
DaaS is a service that protects server against all 3 types of Distributed Denial-of-Service (DDoS), arbitrary packet, legit user-mimicking and economic attacks. For packet DDoS defense, DaaS's framework facilitates harness intermediaries relay traffic to so their total resource exceeds those bots. unique self-verifying Proof-of-Work (sPoW) empowers sender compete with bots by solving more difficult sPoW puzzle discover obscure "ephemeral" intermediary channel has been designated single...