scispace - formally typeset
Search or ask a question
Author

Soon Y. Oh

Other affiliations: University of California
Bio: Soon Y. Oh is an academic researcher from University of California, Los Angeles. The author has contributed to research in topics: Wireless ad hoc network & Linear network coding. The author has an hindex of 18, co-authored 31 publications receiving 1315 citations. Previous affiliations of Soon Y. Oh include University of California.

Papers
More filters
Journal ArticleDOI
TL;DR: This article examines how VANET evolves with two emerging paradigms: vehicular cloud computing and information-centric networking, and envisages a new vehicular networking system,Vehicular cloud networking, on top of them.
Abstract: Over the past several decades, VANET has been a core networking technology to provide safety and comfort to drivers in vehicular environments. Emerging applications and services, however, require major changes to its underlying computing and networking models, which demand new network planning for VANET. This article especially examines how VANET evolves with two emerging paradigms: vehicular cloud computing and information-centric networking. VCC brings the mobile cloud model to vehicular networks and thus changes the way of network service provisioning, whereas ICN changes the notion of data routing and dissemination. We envision a new vehicular networking system, vehicular cloud networking, on top of them. This article scrutinizes its architecture and operations, and discusses its design principles.

347 citations

Proceedings ArticleDOI
03 Dec 2010
TL;DR: The proposed Content Centric Networking for emergency wireless ad hoc environments is a novel communication architecture capable to access and retrieve content by name and achieves scalability, security, and efficient network resource management in large scale disaster recovery and battlefield networks.
Abstract: Reliable and secure content distribution in a disruptive environment is a critical challenge due to high mobile and lossy channels. Traditional IP networking and wireless protocols tend to perform poorly. In this paper, we propose Content Centric Networking (CCN) for emergency wireless ad hoc environments. CCN is a novel communication architecture capable to access and retrieve content by name. This new approach achieves scalability, security, and efficient network resource management in large scale disaster recovery and battlefield networks. Existing Internet CCN schemes cannot be directly applied to wireless mobile ad hoc networks due to different environments and specific limitations. Thus, we must extend the CCN architecture by introducing features and requirements especially designed for disruptive networks. We prove feasibility and performance gain of the new design via implementation and experimentation.

142 citations

Proceedings ArticleDOI
29 Sep 2006
TL;DR: It is shown that network coding allows very reliable and efficient data dissemination and thus is suitable for multimedia safety information dissemination and if the vehicle column has gaps, network coding jointly with "data muling" on vehicles in the opposite direction can deliver the multimedia files to disconnected components faster than other known schemes.
Abstract: Multimedia (e.g., video) information exchange in VANET, if feasible, will help enhance vehicle navigation safety. We show that network coding allows very reliable and efficient data dissemination and thus is suitable for multimedia safety information dissemination. If the vehicle column has gaps, network coding jointly with "data muling" on vehicles in the opposite direction can deliver the multimedia files to disconnected components faster than other known schemes.

121 citations

Proceedings ArticleDOI
08 Dec 2008
TL;DR: The results show that RelayCast can achieve the throughput upper bound of Theta(min(1, n/nsnd), and analyze the impact of various network parameters and routing strategies on the throughput and delay scaling properties of Relay cast.
Abstract: Mobile wireless networks with intermittent connectivity, often called delay/disruption tolerant networks (DTNs), have recently received a lot of attention because of their applicability in various applications, including multicasting. To overcome intermittent connectivity, DTN routing protocols utilize mobility-assist routing by letting the nodes carry and forward the data. In this paper, we study the scalability of DTN multicast routing. As Gupta and Kumar showed that unicast routing is not scalable, recent reports on multicast routing also showed that the use of a multicast tree results in a poor scaling behavior. However, Grossglauser and Tse showed that in delay tolerant applications, the unicast routing overhead can be relaxed using the two-hop relay routing where a source forwards packets to relay nodes and the relay nodes in turn deliver packets to the destination via ldquomobility,rdquo thus achieving a perfect scaling behavior of Theta(1). Inspired by this result, we seek to improve the throughput bound of wireless multicast in a delay tolerant setting using mobility-assist routing. To this end, we propose RelayCast, a routing scheme that extends the two-hop relay algorithm in the multicast scenario. Given that there are ns sources each of which is associated with nd random destinations, our results show that RelayCast can achieve the throughput upper bound of Theta(min(1, n/nsnd)). We also analyze the impact of various network parameters and routing strategies (such as buffer size, multi-user diversity among multicast receivers, and delay constraints) on the throughput and delay scaling properties of RelayCast. Finally, we validate our analytical results with a simulation study.

91 citations

Journal ArticleDOI
TL;DR: Simulation results show that the enhanced ODMRP (E-ODMRP) reduces overhead by up to 90% yet keeping similar packet delivery ratio compared to the original OD MRP.

73 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive review of the domain of physical layer security in multiuser wireless networks, with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security and observations on potential research directions in this area.
Abstract: This paper provides a comprehensive review of the domain of physical layer security in multiuser wireless networks. The essential premise of physical layer security is to enable the exchange of confidential messages over a wireless medium in the presence of unauthorized eavesdroppers, without relying on higher-layer encryption. This can be achieved primarily in two ways: without the need for a secret key by intelligently designing transmit coding strategies, or by exploiting the wireless communication medium to develop secret keys over public channels. The survey begins with an overview of the foundations dating back to the pioneering work of Shannon and Wyner on information-theoretic security. We then describe the evolution of secure transmission strategies from point-to-point channels to multiple-antenna systems, followed by generalizations to multiuser broadcast, multiple-access, interference, and relay networks. Secret-key generation and establishment protocols based on physical layer mechanisms are subsequently covered. Approaches for secrecy based on channel coding design are then examined, along with a description of inter-disciplinary approaches based on game theory and stochastic geometry. The associated problem of physical layer message authentication is also briefly introduced. The survey concludes with observations on potential research directions in this area.

1,294 citations

Proceedings ArticleDOI
06 Mar 2014
TL;DR: The evolution from Intelligent Vehicle Grid to Autonomous, Internet-connected Vehicles, and Vehicular Cloud is discussed, the equivalent of Internet cloud for vehicles, providing all the services required by the autonomous vehicles.
Abstract: Traditionally, the vehicle has been the extension of the man's ambulatory system, docile to the driver's commands. Recent advances in communications, controls and embedded systems have changed this model, paving the way to the Intelligent Vehicle Grid. The car is now a formidable sensor platform, absorbing information from the environment (and from other cars) and feeding it to drivers and infrastructure to assist in safe navigation, pollution control and traffic management. The next step in this evolution is just around the corner: the Internet of Autonomous Vehicles. Pioneered by the Google car, the Internet of Vehicles will be a distributed transport fabric capable to make its own decisions about driving customers to their destinations. Like other important instantiations of the Internet of Things (e.g., the smart building), the Internet of Vehicles will have communications, storage, intelligence, and learning capabilities to anticipate the customers' intentions. The concept that will help transition to the Internet of Vehicles is the Vehicular Cloud, the equivalent of Internet cloud for vehicles, providing all the services required by the autonomous vehicles. In this article, we discuss the evolution from Intelligent Vehicle Grid to Autonomous, Internet-connected Vehicles, and Vehicular Cloud.

610 citations

Proceedings ArticleDOI
18 May 2009
TL;DR: This paper is the first to study multicast in DTNs from the social network perspective, and investigates the essential difference between multicast and unicast inDTNs, and forms relay selections for multicast as a unified knapsack problem by exploiting node centrality and social community structures.
Abstract: Node mobility and end-to-end disconnections in Delay Tolerant Networks (DTNs) greatly impair the effectiveness of data dissemination. Although social-based approaches can be used to address the problem, most existing solutions only focus on forwarding data to a single destination. In this paper, we are the first to study multicast in DTNs from the social network perspective. We study multicast in DTNs with single and multiple data items, investigate the essential difference between multicast and unicast in DTNs, and formulate relay selections for multicast as a unified knapsack problem by exploiting node centrality and social community structures. Extensive trace-driven simulations show that our approach has similar delivery ratio and delay to the Epidemic routing, but can significantly reduce the data forwarding cost measured by the number of relays used.

575 citations

Journal ArticleDOI
TL;DR: A comprehensive survey on recent wireless networks techniques applied to HetVNETs, which integrates cellular networks with dedicated Short Range Communication (DSRC) and major challenges and solutions that are related to both the Medium Access Control (MAC) and network layers in HetVsNETs are studied and discussed.
Abstract: With the rapid development of the Intelligent Transportation System (ITS), vehicular communication networks have been widely studied in recent years. Dedicated Short Range Communication (DSRC) can provide efficient real-time information exchange among vehicles without the need of pervasive roadside communication infrastructure. Although mobile cellular networks are capable of providing wide coverage for vehicular users, the requirements of services that require stringent real-time safety cannot always be guaranteed by cellular networks. Therefore, the Heterogeneous Vehicular NETwork (HetVNET), which integrates cellular networks with DSRC, is a potential solution for meeting the communication requirements of the ITS. Although there are a plethora of reported studies on either DSRC or cellular networks, joint research of these two areas is still at its infancy. This paper provides a comprehensive survey on recent wireless networks techniques applied to HetVNETs. Firstly, the requirements and use cases of safety and non-safety services are summarized and compared. Consequently, a HetVNET framework that utilizes a variety of wireless networking techniques is presented, followed by the descriptions of various applications for some typical scenarios. Building such HetVNETs requires a deep understanding of heterogeneity and its associated challenges. Thus, major challenges and solutions that are related to both the Medium Access Control (MAC) and network layers in HetVNETs are studied and discussed in detail. Finally, we outline open issues that help to identify new research directions in HetVNETs.

494 citations

Journal ArticleDOI
TL;DR: This paper aims to present some of the most representative threats to the smart home/smart grid environment and presents promising security countermeasures with respect to the identified specific security goals for each presented scenario.
Abstract: The electricity industry is now at the verge of a new era—an era that promises, through the evolution of the existing electrical grids to smart grids, more efficient and effective power management, better reliability, reduced production costs, and more environmentally friendly energy generation. Numerous initiatives across the globe, led by both industry and academia, reflect the mounting interest around not only the enormous benefits but also the great risks introduced by this evolution. This paper focuses on issues related to the security of the smart grid and the smart home, which we present as an integral part of the smart grid. Based on several scenarios, we aim to present some of the most representative threats to the smart home/smart grid environment. The threats detected are categorized according to specific security goals set for the smart home/smart grid environment, and their impact on the overall system security is evaluated. A review of contemporary literature is then conducted with the aim of presenting promising security countermeasures with respect to the identified specific security goals for each presented scenario. An effort to shed light on open issues and future research directions concludes this paper.

484 citations