- Caching and Content Delivery
- IoT and Edge/Fog Computing
- IPv6, Mobility, Handover, Networks, Security
- Software-Defined Networks and 5G
- Blockchain Technology Applications and Security
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Privacy-Preserving Technologies in Data
- Non-Invasive Vital Sign Monitoring
- Advanced Malware Detection Techniques
- IoT Networks and Protocols
- Wireless Networks and Protocols
- Peer-to-Peer Network Technologies
- Cloud Computing and Resource Management
- Internet Traffic Analysis and Secure E-voting
- Age of Information Optimization
- Smart Grid Security and Resilience
- Cooperative Communication and Network Coding
- EEG and Brain-Computer Interfaces
- Sleep and Work-Related Fatigue
- Energy Efficient Wireless Sensor Networks
- Building Energy and Comfort Optimization
- ECG Monitoring and Analysis
George Mason University
2023-2025
University of Missouri–St. Louis
2015-2022
Beijing University of Posts and Telecommunications
2021
Network Technologies (United States)
2021
Chongqing University of Posts and Telecommunications
2021
Washington University in St. Louis
2008-2021
University of Missouri
2021
Affiliated Eye Hospital of Wenzhou Medical College
2021
Wenzhou Medical University
2021
China Railway 18th Bureau Group Corporation
2010
The Internet is evolving rapidly toward the future of Things (IoT) which will potentially connect billions or even trillions edge devices could generate huge amount data at a very high speed and some applications may require low latency. traditional cloud infrastructure run into series difficulties due to centralized computation, storage, networking in small number datacenters, relative long distance between remote datacenters. To tackle this challenge, computing seem be promising...
The current Internet, which was designed over 40 years ago, is facing unprecedented challenges in many aspects, especially the commercial context. emerging demands for security, mobility, content distribution, etc. are hard to be met by incremental changes through ad-hoc patches. New clean-slate architecture designs based on new design principles expected address these challenges. In this survey article, we investigate key research topics area of future Internet architecture. Many ongoing...
The emerging Internet of Things (IoT) is facing significant scalability and security challenges. On one hand, IoT devices are "weak" need external assistance. Edge computing provides a promising direction addressing the deficiency centralized cloud in scaling massive number devices. other also relatively "vulnerable" malicious hackers due to resource constraints. blockchain smart contracts technologies bring series new features for edge computing. In this paper, address challenges, we design...
Smart energy in buildings is an important research area of Internet Things (IoT). Buildings as parts the smart grids, their efficiency vital for environment and global sustainability. Using a LEED-gold-certificated green office building, we built unique IoT experimental testbed our building intelligence research. We first monitor collect one-year-long usage data then systematically evaluate analyze them. The results show that due to centralized static controls, actual running may not be...
Intelligent buildings and microgrids are important parts of the future smart grid. The adoption development process intelligent has been slow. There multiple technical non-technical reasons. However, two recent trends have accelerated research application technologies related to this area. First, skyrocketing energy price global need for reducing fossil oil consumption environmental sustainability combined with fact that a significant source consumption, making efficient will huge impacts on...
The paradigm shift to the Internet of Things (IoT) and emergence edge computing concept have brought huge potentials for various future IoT application scenes such as smart home, transportation, health, grids, energy. It also brings a series new Cybersecurity challenges. We envision that many research innovation opportunities will emerge in conjunction "Cybersecurity + AI". In this article, we discuss major challenges related vision.
Naming and addressing are important issues for next generation Internet (NGI). In this paper, we discuss a new mobility multihoming supporting identifier locator split architecture (MILSA). There three main contributions of our solution. First, separate trust relationships (realms) from connectivity (zones). A hierarchical system the realms Realm Zone Bridging Server (RZBS) infrastructure that performs bridging function is introduced. Second, signaling data plane functions to improve...
During the past decade, concepts and applications of Internet Things (IoT) are pervasively propagated to academia industries. The widely distributed IoT devices contribute building an effective smart urban surveillance system, which manages regular operations handles emergencies. real time monitoring uploads massive amounts data backbone network requires prompt feedbacks. recent rapid development "Edge Computing" (also called "Fog or Mobile Edge Computing in different literature) aims at...
Many challenges to the Internet including global routing scalability have drawn significant attention from both industry and academia, generated several new ideas for next generation. MILSA (Mobility Multihoming supporting Identifier Locator Split Architecture) related enhancements are designed address naming, addressing, challenges, provide mobility multihoming support, easy transition current Internet. In this paper, we synthesize our research into a multiple-tier realm-based framework...
Edge computing is emerging to empower the future of Internet Things (IoT) applications. However, due heterogeneity applications, it a significant challenge for edge cloud effectively allocate multidimensional limited resources (CPU, memory, storage, bandwidth, etc.) with constraints applications' Quality Service (QoS) requirements. In this paper, we address resource allocation problem in Edge-IoT systems through developing novel framework named <italic...
Network intrusion detection plays an important role in the Internet of Things systems for protecting devices from security breaches. Facing challenges rapidly increasing amount diverse network traffic, recent research has employed end-to-end deep learning-based detectors automatic feature extraction and high accuracy. However, learning been proved vulnerable to adversarial attacks that may cause misclassification by imposing imperceptible perturbation on input samples. Though such...
Conventional centralized cloud computing is a success for benefits such as on-demand, elasticity, and high colocation of data computation. However, the paradigm shift towards "Internet things" (IoT) will pose some unavoidable challenges: (1) massive volume impossible datacenters to handle; (2) latency between edge "things" datacenters; (3) monopoly, inhibition innovations, non-portable applications due proprietary application delivery in cloud. The emergence gives hope address these...
Mobile devices supporting the "Internet of Things" (IoT), often have limited capabilities in computation, battery energy, and storage space, especially to support resource-intensive applications involving virtual reality (VR), augmented (AR), multimedia delivery artificial intelligence (AI), which could require broad bandwidth, low response latency large computational power. Edge cloud or edge computing is an emerging topic technology that can tackle deficiency currently centralized-only...
Understanding the sleep quality and architecture is essential to human being's health, which usually represented using multiple stages. A standard stage determination requires Electroencephalography (EEG) signals during expensive labor-intensive Polysomnography (PSG) test. To overcome this inconvenience, cardiorespiratory are proposed for same purpose because of easy comfortable acquisition by simplified devices. In paper, we leverage our low-cost wearable multi-sensor system acquire from...
MILSA (Mobility and Multihoming supporting Identifier Locator Split Architecture) has been proposed to address the naming addressing challenges for NGI (next generation Internet), we present several design enhancements which include a hybrid architectural that combines "core-edge separation approach" "split approach", security-enabled logically oriented hierarchical identifier system, three-level resolution new code based locator structure, cooperative mechanisms among three planes in model...
The current security method of Internet-of-Vehicles (IoV) systems is rare, which makes it vulnerable to various attacks. malicious and unauthorized nodes can easily invade the IoV destroy integrity, availability, confidentiality information resources shared among vehicles. Indeed, access control mechanism remedy this. However, as a static method, cannot timely response these To solve this problem, we propose an intelligent edge-chain-enabled framework with vehicle roadside units (RSUs) in...
Edge computing and artificial intelligence can potentially empower Unmanned Aerial Vehicle (UAV) systems with automated decision-making resource support for monitoring in future science tasks such as emergency response, search rescue, inspections, wildfires. However, it is challenging to achieve autonomous robust systems, given the dynamic environmental situations limited capabilities unbalanced load of UAVs. For instance, activity levels at different locations might vary, which leads an...
Internet of Things (IoT) is experiencing an explosion in the data traffic due to increase number heterogeneous applications. The existing cloud computing models will not be capable support IoT applications that are delay-sensitive and using high bandwidth. Edge-IoT systems represented by shared edge clouds a wide range Edge provide resources closer devices tackle delay sensitivity bandwidth issues. However, allocation these with guaranteed application's utility context multiple applications,...
The selfishness and randomness of users in the mobile crowd sensing network could cause them unwilling to participate activities lead lower completion rates tasks. In order deal with these problems, this paper proposes a novel incentive mechanism based on new auction model for sensing, which consists two consecutive stages. first stage, Incentive Method Reverse Auction Location-aware (IMRAL) is proposed maximize user utility. By introducing task-centric method determine winning bids, it can...
Future wireless networks (FWNs) are expected to be a convergence of different kinds technologies, such as cellular local area (WLANs), metropolitan networks, sensor and traditional wired networks. The internet protocol (IP) will potentially adopted the common networking for diverse technologies including next generation using system architecture evolution (SAE). However, IP has several known challenges, mobility, multihoming, routing scalability, location privacy, path preference selection,...
60 GHz millimeter-wave networks have emerged as a potential candidate for designing the next generation of multi-gigabit WLANs. Since links suffer from frequent outages due to blockages caused by human mobility, deploying WLANs that can provide robust coverage in presence is challenging problem. In this paper, we study blockage-aware and deployment We first show reflection profile an indoor environment be sensed using few measurements. A novel metric (angular spread coverage) which captures...