- Software-Defined Networks and 5G
- Energy Efficient Wireless Sensor Networks
- Caching and Content Delivery
- Advanced Malware Detection Techniques
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- IoT Networks and Protocols
- Context-Aware Activity Recognition Systems
- Wireless Body Area Networks
- Interconnection Networks and Systems
- Smart Grid Security and Resilience
- Security and Verification in Computing
- Advanced Authentication Protocols Security
- IPv6, Mobility, Handover, Networks, Security
- Security in Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- Physical Unclonable Functions (PUFs) and Hardware Security
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Network Packet Processing and Optimization
- Human-Automation Interaction and Safety
- Spam and Phishing Detection
- Real-Time Systems Scheduling
- Advanced Wireless Communication Technologies
- Distributed systems and fault tolerance
University of Massachusetts Amherst
2023-2025
University of Arizona
2020-2022
University of California, Los Angeles
2017-2019
UCLA Health
2017
LG (South Korea)
2012
Electronics and Telecommunications Research Institute
2009-2010
Ajou University
2008-2009
University of Maryland, College Park
1996
Mobility in 6LoWPAN (IPv6 over Low Power Personal Area Networks) is being utilized realizing many applications where sensor nodes, while moving, sense and transmit the gathered data to a monitoring server. By employing IEEE802.15.4 as baseline for link layer technology, implies low rate power consumption with periodic sleep wakeups without requiring them incorporate complex hardware. Also enabling nodes IPv6 ensures that can be accessed anytime anywhere from world. Several existing...
LTE Network Function Virtualization (LTE-NFV) scales user services in a low cost fashion by transforming the centralized legacy Core architecture to distributed architecture. This makes multiple instances of Functions (NFs) and virtualizes them on commodity data-center network. The functionality LTE-NFV breaks however, since NF connected via unreliable IP links delay execution critical events. failure time-critical events results users' quality service degradation temporary unavailability....
Anti-malware engines are the first line of defense against malicious software. While widely used, feature engineering-based anti-malware vulnerable to unseen (zero-day) attacks. Recently, deep learning-based static detectors have achieved success in identifying attacks without requiring engineering and dynamic analysis. However, these susceptible malware variants with slight perturbations, known as adversarial examples. Generating effective examples is useful reveal vulnerabilities such...
Public cloud offers economy of scale to adapt workload changes in an autonomic manner, maximizing the use resources. Through network function virtualization (NFV), operators can move LTE core cloud; hence removing their dependency on carrier-grade functions. Recent research efforts discuss performance, latency, and fault tolerance NFV, largely ignoring security aspects. In this paper, we discover new vulnerabilities that NFV face today with no standard solutions address them. These span at...
This paper proposes an energy aware and bandwidth efficient mobility support architecture which handles of 6LoWPAN devices, such that the communication between it its corresponding nodes remain undisrupted. As devices are resource constrained enabling in these with help conventional Host Based protocols like MIPv6 is not suitable. Moreover, may be possible many scenarios Mobile Node (MN) moves far from Gateway (GW), while communicating it. In this case MN has to increase transmission power,...
An extremely reliable source to sink communication is required for most of the contemporary WSN applications especially pertaining military, healthcare and disaster-recovery. However, due their intrinsic energy, bandwidth computational constraints, Wireless Sensor Networks (WSNs) encounter several challenges in communication. In this paper, we present a novel topology that uses hotlines between sensor gateways boost reliability end-to-end transmissions. This efficient routing alternative...
Network Function Virtualization (NFV) migrates the carrier-grade LTE Evolved Packet Core (EPC) that runs on commodity boxes to public cloud. In new virtualized environment, EPC must offer high availability its mobile users upon failures. Achieving service is challenging because failover procedure keep latency-sensitive control-plane procedures intact during Through our empirical study, we show existing recovery mechanisms cloud and standardized solutions are coarse-grained, thus unable...
Network functions virtualization (NFV) allows service providers to deliver new services their customers more quickly by adopting software-centric network implementation over commercial, off-the-shelf hardwares. This NFV-based approach cannot use dedicated mechanisms implemented custom built boxes reduce latencies and tolerate faults. We present a case study of IP multimedia subsystem (IMS), which is the most complex NFV instance, requires extremely low end-to-end latency (40 msec), demands...
Network Functions Virtualization (NFV) allows service providers to deliver new services their customers more quickly by adopting software centric network functions implementation over commercial, off-the-shelf hardwares. IP Multimedia Subsystem (IMS) which is one of the most complex NFV instances requires extremely low end-to-end latency (up 40 msec), and demands system availability as high five nines. We discover that highly modular 3GPP standardized IMS virtualized platform (1) incurs...
Service discovery in Ubiquitous Sensor Networks has been targeted mostly for services available within certain proximity, but the service availability only close vicinity is no longer feasible pervasive and ubiquitous era. In order to address ubiquity discovery, we have proposed a framework that makes use of Electronic Number Mapping (ENUM) protocol. Our network architecture consists sensor nodes associated with few relatively powerful called master nodes. Only IPv6 enabled Low power...
IMS (IP Multimedia Subsystem) is an emerging architectural framework that delivers a number of multimedia services -- ranging from voice/video over LTE, interactive gaming and many more in operational LTE network. Network operators are embracing cloud-based to meet increasing traffic demand. They can easily cost-efficiently implement applications while ensuring superior end-user experiences through always-on real-time engagement. In this paper, we reveal cannot provide session-level...
The explosion of mobile applications and phenomenal adoption connectivity by end users make all-IP based 4G LTE as an ideal choice for providing Internet access on the go. core network which handles device control-plane data-plane traffic becomes susceptible to resource constraints. To ease these constraints, Network Function Virtualization (NFV) provides high scalability flexibility enabling dynamic allocation resources. NFV achieves this decomposing Functions (NF) into multiple instances....
Target tracking is one of the key applications Wireless Sensor Networks (WSNs) that forms basis for numerous other applications. The overall procedures target involve detection, localization, and tracking. Because WSNs' resource constraints (especially energy), it highly desired should be done by involving as less number sensor nodes possible. Due to uncertain behavior resulting mobility patterns, this goal becomes harder achieve without predicting future locations target. presence a...
Web Portals function as a single point of access to information on the World Wide (WWW). The web portal always contacts portal's gateway for flow that causes network traffic over Internet. Moreover, it provides real time/dynamic stored information, but not time information. This inherent functionality portals limits their role resource constrained digital devices in Ubiquitous era (U-era). paper presents framework U-era. We have introduced concept Local Regions proposed framework, so local...
Target tracking is one of the key applications Wireless Sensor Networks (WSNs) that forms basis for numerous other applications. Real situations in tracking, such as an unexpected change mobile event's direction, failure event detection, or transmission error message may result into erroneous information. Thus, order to prevent and handle errors effectively, it required algorithm must incorporate avoidance correction phase. In this paper we present Dead Reckoning (DR) based target protocol....
Modern applications are end-to-end encrypted to prevent data from being read or secretly modified. 5G tech nology provides ubiquitous access these without compromising the application-specific performance and latency goals. In this paper, we empirically demonstrate that radio communication becomes side channel precisely infer user's in real-time. The key idea lies observing physical MAC layer interactions over time reveal application's behavior. receives application requests network assign...
research-article Open Access Share on On Key Reinstallation Attacks over 4G LTE Control-Plane: Feasibility and Negative Impact Authors: Muhammad Taqi Raza The University of Arizona, United States America AmericaView Profile , Yunqi Guo UCLA UCLAView Songwu Lu Fatima Anwar UMASS Amherst AmherstView Authors Info & Claims ACSAC '21: Annual Computer Security Applications ConferenceDecember 2021 Pages 877–886https://doi.org/10.1145/3485832.3485833Published:06 December 2021Publication History...
Web Portal functions as a single point of access to information on the World Wide (WWW). The portal always contacts portalpsilas gateway for flow that causes network traffic over Internet. Moreover it provides real time/dynamic stored information, but not time information. This inherit functionality limits its role resource constrained digital devices in ubiquitous era (U-era). paper presents framework web U-era. We have introduced concept locals proposed framework, so local queries could be...
Network function virtualization (NFV) of IP Multimedia Subsystem (IMS) pose promise to service increasing multimedia traffic demand. In this paper, we show that virtualized IMS (vIMS) is unable provide session-level resilience under faults and becomes the bottleneck high availability. We propose a design fault-tolerance for vIMS operations. control-plane, our system decomposes single operation into different atomic actions, partition these actions critical non-critical actions. Only are then...
Mobile Internet is becoming the norm. With more personalized mobile devices in hand, many services choose to offer alternative, usually convenient, approaches authenticating and delivering content between users service providers. One main option use SMS (i.e., short messaging service). Such carrier-grade text has been widely used assist versatile services, including social networking, banking, name a few. Though can be spoofed via certain providers which cooperated with carriers, such...