- Internet Traffic Analysis and Secure E-voting
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Network Security and Intrusion Detection
- Caching and Content Delivery
- Advanced Steganography and Watermarking Techniques
- Opportunistic and Delay-Tolerant Networks
- Cloud Computing and Resource Management
- Advanced Data and IoT Technologies
- Advanced MIMO Systems Optimization
- Advanced Neural Network Applications
- Video Surveillance and Tracking Methods
- Wireless Networks and Protocols
- Modular Robots and Swarm Intelligence
- Advanced Photonic Communication Systems
- Graph Theory and Algorithms
- Age of Information Optimization
- Telecommunications and Broadcasting Technologies
- Advanced Optical Network Technologies
- Chaos-based Image/Signal Encryption
- UAV Applications and Optimization
- Advanced Malware Detection Techniques
National Yang Ming Chiao Tung University
2016-2021
ITRI International
2018
Industrial Technology Research Institute
2017
Multimedia University
2013-2016
Software defined network (SDN) is an emerging architecture which offloads the control logic of from underlying forwarding devices to a centralized controller. This intelligence software defines behavior network. However, programmability and centralization SDN introduce potential security concerns. In this paper, we first investigate threats denial service (DoS) attacks on channel. Then, evaluate impact DoS by simulating attack against Our results show that it possible exhaust controller...
Software defined networking (SDN) enables network function programmability for ease of configuration and maintenance, also allows administrators to change traffic rules on the fly. However, denial service (DoS) attacks pose security challenges centralized control plane SDN. Although transport layer (TLS) can help secure plane, it is computationally intensive, complex configure, not mandatory in OpenFlow protocol. In this paper, we present a lightweight authentication solution, called hidden...
Network steganography is an emerging research field, which exploits packet protocol headers, mechanism, payload, etc. to establish secret communication between two parties over a computer network. The detection of such hidden has not been part intrusion systems that are primarily used detect malicious activities as viruses and malwares. In this paper, we propose packet-length based steganographic techniques implement covert channel. We examine analyze the lengths normal traffic show our can...
Pushing contents, applications, and network functions closer to end users is necessary cope with the huge data volume low latency required in future 5G networks. Edge fog frameworks have emerged recently address this challenge. Whilst edge framework was more infrastructure-focused mobile operator-oriented, pervasive included any node (stationary or mobile), including terminal devices. This article analyzes opportunities challenges integrate, federate, jointly orchestrate resources into a...
Edge networking has become an important technology for providing low-latency services to end users. However, deploying edge network does not guarantee continuous service mobile Mobility can cause frequent interruptions and delays as users leave the initial serving edge. In this paper, we propose a solution provide transparent continuity in large-scale WiFi networks. The contribution of work three parts. First, ARNAB architecture achieve continuity. term means rabbit Arabic, which represents...
Energy efficiency is likely to be the litmus test for sustainability of upcoming 5G networks. Before new generation cellular networks are ready roll out, their architecture designers motivated leverage SDN technology sake its offered flexibility, scalability, and programmability achieve KPI 10 times lower energy consumption. In this paper, we present Proofs-of-Concept Management Monitoring Applications (EMMAs) in context three challenging, realistic case studies, along with a SDN/NFV-based...
The fifth generation (5G) mobile network has paved the way for innovations across vertical industries. integration of distributed intelligent edge into 5G orchestrated architecture brings benefits low-latency and automation. A successful example this is exhibited by 5G-DIVE project, which aims at proving technical merits business value proposition industries such as autonomous drone surveillance navigation. In paper, part 5G-DIVE, we present an aerial disaster relief system, called EagleEYE,...
In this paper, we present an architecture for transparent service continuity cloud-enabled WiFi networks called ARNAB: ARchitecture traNsparent viA douBle-tier migration. The term arnab means rabbit in Arabic. It is dubbed the proposed because a mobile-user with ARNAB behaves like hopping through infrastructure. To deliver continuous services, deploying edge clouds not sufficient. Users may travel far from initial serving and also perform multiple handoffs during mobility. solve this,...
Because of SDN centralization nature, denial service (DoS) attacks have become a prominent concern. In the OpenFlow (OF) protocol, transport layer security (TLS) protocol is recommended to secure control channel. Unfortunately, tasks involved in proper configuration secured TLS are very challenging. Even worse, made an optional mode communication OF. As consequence, some OF-enabled switches and controllers do not adopt TLS. this paper, we develop lightweight authentication mechanism, called...
In this work, we propose a fragmentation resilient IP identification based data embedding method. First, analyze the generation in various operating systems to validate feasibility of our proposal. Then, put forward proposal embed into field while considering from payload field. Results suggest that proposed method resembles ordinary pattern and can mitigate problem packet fragmentation.
In this paper, we provide an experimental evaluation of a commercial grade energy efficient radio-over-fiber (RoF) network for high-speed trains. While the fifth generation (5G) aims to improve capacity by thousand-fold through densification, consumption management has become very challenging. Towards vision, develop and evaluate RoF-based software defined monitoring application (EMMA) train networks. Our results show that proposed solution can not only minimize footprint, but also platform...
In moving train networks, two-hop architecture is adopted to improve users experience by reducing the interaction between on-board and base stations on route. addition, edge networking have emerged as a solution for bringing services proximity of users. However, deploying networks do not guarantee continuous service delivery When large number transit from land, they interruption due control signalling storm backhaul latency. this paper, we propose holistic management system provide mobile...