- Software-Defined Networks and 5G
- Caching and Content Delivery
- Cooperative Communication and Network Coding
- Interconnection Networks and Systems
- Internet Traffic Analysis and Secure E-voting
- Opportunistic and Delay-Tolerant Networks
- Advanced Wireless Network Optimization
- Network Traffic and Congestion Control
- Advanced MIMO Systems Optimization
- Network Security and Intrusion Detection
- IoT and Edge/Fog Computing
- Network Packet Processing and Optimization
- Wireless Networks and Protocols
- Advanced Optical Network Technologies
- Peer-to-Peer Network Technologies
- Blockchain Technology Applications and Security
- UAV Applications and Optimization
- Cloud Data Security Solutions
- Mobile Ad Hoc Networks
- Wireless Communication Security Techniques
- Access Control and Trust
- Security and Verification in Computing
- Digital Rights Management and Security
- Advanced Wireless Communication Technologies
- Cryptography and Data Security
Huawei Technologies (China)
2019-2023
Huawei Technologies (France)
2021-2022
Huawei Technologies (United Kingdom)
2019-2020
Chinese Academy of Sciences
2012-2015
Institute of Information Engineering
2015
Institute of Acoustics
2013
Collaborative edge computing (CEC) is a novel extension for several paradigms (e.g., mobile computing, fog and cloudlet) to further enhance processing capabilities support computation-intensive latency-sensitive applications in edge-centric networks. While existing schemes keep adding new functionalities collaborative caching), they overlook an important issue of establishing trustworthiness among all CEC participants. In general, due the heterogeneity participants, simply assuming them...
Deterministic performance is a key enabler for 5G networking. In this context, we present highly scalable Large-scale Network (LDN) architecture providing end-to-end latency and bounded jitter guarantees in IP networks. At the data plane, flows are first shaped at ingress gateways using gate-control queues, achieving very fine granularity compared to existing state of art solutions. Inside network, traffic scheduled an asynchronous cyclic queuing mechanism that can be implemented real...
End-to-end (E2E) reliability provisioning is critical for network slice customization. Leveraging martingale theory, we construct an analysis framework of the with regard to E2E latency multihop system, where service processes provided by wireless nodes and networking are heterogeneous. Based on Wald constructions arrival processes, tandem descriptor defined embody features mode targeted flow. Arrival bias derived describe fluctuations respectively. Relying Doob maximum inequality...
IP addressing has become the core of Internet since was invented and its significance never changed. However, with dramatic development in recent years, conventional address is facing more problems, such as exhaustion, low packet efficiency Things, etc. The reason that designed fixed length, lacking extensibility, while demands for varies greatly different cases. To solve these we propose a new system called Flexible Address System (FAS). FAS an infinite space can provide variable-length...
With the prosperity of emerging applications, <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$6^{th}$ </tex-math></inline-formula> Generation mobile communication systems (6G) is coming at an unimaginable speed. It expected to provide more intelligent, flexible, and secure services. As essential pillar 6G networks, ultra-Reliable Low Latency Communication (uRLLC) has promoted vigorous development...
In a hybrid scenario of 5G and Industrial Internet Things (IIoT), there is lack theoretical tool to analyze probabilistic end-to-end (E2E) delay. this article, we provide comprehensive procedure, which based on stochastic network calculus (SNC) with moment-generating functions (MGFs), for calculating the E2E delay violation probability target traffic in IIoT. The particularity that composed two segments: 1) industrial wireless link challenged by complex fading channel 2) multinode wired...
Internet of Things (IoT) devices achieve the rapid development and have been widely deployed recently. Meanwhile, inherent vulnerabilities IoT systems (including firmware software) continually uncovered thus are always exposed to various attacks. The root cause issue is that design flaws implementation bugs. In particular, released (e.g., by third-party marketplaces vendors) may be maliciously repackaged with malware. Unfortunately, consumers not able effectively capture such because limited...
The Domain Name System (DNS) is one of the most fundamental infrastructures Internet. However, due to its design philosophy and implementation architecture, current DNS still suffers from centralization problem data authenticity problem. In this paper, we analyze these two problems propose a blockchain-based naming system called blockDNS solve them simultaneously. blockDNS, domain names can be applied transferred freely in decentralized way. Moreover, lightweight verification mechanism also...
Peer selection is a multi-criteria decision making problem. In order to improve the accuracy of peer in mobile peer-to-peer (P2P) networks, this paper proposes an integrated approach Analytic Hierarchy Process (AHP) and Grey Relation Analysis (GRA) consider various correlative parameters selecting optimum peer. The proposed scheme comprises two parts. first part employs AHP determine weights criteria. second applies GRA rank alternatives select best simulation results show that algorithm...
The explosive growth of online videos brings a great pressure on LTE mobile networks caused by huge data traffics. Deploying caches at the evolved packet core (EPC) and radio access network (RAN) in can efficiently relieve this way reducing duplicate content transmissions. In paper, we propose collaborative caching algorithms for with deployed EPC RAN to reduce bandwidth cost Internet improve end-user experience. We decompose problem into placement subproblem request routing subproblem....
Cooperation among mobile terminals (MTs) in heterogeneous wireless networks is currently widely investigated. MTs has a lot of advantages such as increasing network throughput, decreasing file download time, saving energy and so on. Since different cooperate have influence on quality service user's experience, MT selection becomes key issue cooperation. To improve the we propose novel mechanism for which call NMC (Network Cooperation) this paper. In mechanism, its access are integrated...
In the inter-domain routing infrastructure, a route leak is defined as violation of policy agreed between two Autonomous Systems (AS). Route leaks have resulted in large-scale outages on Internet, taking down several services. Although seem simple problem, solution complex because: (i) ASes consider -partially- private, (ii) lack formal and standard language to express (iii) BGP lacks adequate cryptographic-based security. this paper, we present an experimental analysis distributed...
The explosive growth of online videos brings a great pressure on LTE mobile networks caused by huge data traffics. Deploying caches at the evolved packet core (EPC) and radio access network (RAN) in can efficiently relieve this way reducing duplicate content transmissions. In paper, we propose collaborative caching algorithms for with deployed EPC RAN to reduce bandwidth cost Internet improve end-user experience. We decompose problem into placement subproblem request routing subproblem....
Peer selection is one of the key issues in wireless peer-to-peer (P2P) networks and most traditional methods algorithms those have been proposed are only based on homogeneous network. However, future will be highly heterogeneous. Different kinds such as GSM, UMTS, WLAN, exist together same area different features abilities. Thus peer heterogeneous become more realistic. To solve this problem, we first propose a novel mechanism which its access network treated whole entity, call virtual then...
With 5G networking, deterministic guarantees are emerging as a key enabler. In this context, we present scalable Damper-based architecture for Large-scale Deterministic IP Networks (D-LDN) that meets required bounds on end-to-end delay and jitter. This work extends the original LDN [1] architecture, where flows shaped at ingress gateways scheduled transmission each link using an asynchronous cyclic opening of gate-controlled queues. To further relax need clock synchronization between...
With the rapid development of wireless networks and mobile terminals (MTs), cooperation among MTs in heterogeneous is currently widely investigated. Cooperation has a lot advantages such as increasing network throughput, decreasing file download time, saving energy. Traffic distribution, which means how to distribute traffic cooperating MTs, key issue cooperation. To improve quality service user's experience, we propose two distribution approaches: time-based approach AHP-based (analytic...
This paper presents a study of the optimal Admission Control in Damper-based Networks (ACDN) problem. The use dampers large-scale networks is becoming increasingly beneficial for wide range applications as it provides reliable means achieving deterministic delay guarantees without need synchronization between routers. In this context, admission control solutions are required to fully utilize capacity. problem being studied variant Unsplittable Multi-Commodity Flow (UMCF) problem, with...
With 5G networking, deterministic guarantees are emerging as a key enabler. In this context, we present scalable Damper-based architecture for Large-scale Deterministic IP Networks (D-LDN) that meets required bounds on end-to-end delay and jitter. This work extends the original LDN architecture, where flows shaped at ingress gateways scheduled transmission each link using an asynchronous cyclic opening of gate-controlled queues. To further relax need clock synchronization between devices,...