scispace - formally typeset
Search or ask a question

Showing papers in "IEEE Network in 2013"


Journal Article•DOI•
TL;DR: This article proposes to integrate cloud computing into vehicular networks such that the vehicles can share computation resources, storage resources, and bandwidth resources and study cloud resource allocation and virtual machine migration for effective resource management.
Abstract: In the era of the Internet of Things, all components in intelligent transportation systems will be connected to improve transport safety, relieve traffic congestion, reduce air pollution, and enhance the comfort of driving. The vision of all vehicles connected poses a significant challenge to the collection and storage of large amounts of traffic-related data. In this article, we propose to integrate cloud computing into vehicular networks such that the vehicles can share computation resources, storage resources, and bandwidth resources. The proposed architecture includes a vehicular cloud, a roadside cloud, and a central cloud. Then we study cloud resource allocation and virtual machine migration for effective resource management in this cloud-based vehicular network. A game-theoretical approach is presented to optimally allocate cloud resources. Virtual machine migration due to vehicle mobility is solved based on a resource reservation scheme.

369 citations


Journal Article•DOI•
TL;DR: A cloud-enabled WBAN architecture and its applications in pervasive healthcare systems is studied and the methodologies for transmitting vital sign data to the cloud are highlighted by using energy-efficient routing, cloud resource allocation, semantic interactions, and data security mechanisms.
Abstract: With the support of mobile cloud computing, wireless body area networks can be significantly enhanced for massive deployment of pervasive healthcare applications. However, several technical issues and challenges are associated with the integration of WBANs and MCC. In this article, we study a cloud-enabled WBAN architecture and its applications in pervasive healthcare systems. We highlight the methodologies for transmitting vital sign data to the cloud by using energy-efficient routing, cloud resource allocation, semantic interactions, and data security mechanisms.

259 citations


Journal Article•DOI•
TL;DR: This article conducts a systematic analysis of state-of-the-art cloud gaming platforms, and highlights the uniqueness of their framework design, and measures their real world performance with different types of games, revealing critical challenges toward the widespread deployment of cloud gaming.
Abstract: Recent advances in cloud technology have turned the idea of cloud gaming into a reality. Cloud gaming, in its simplest form, renders an interactive gaming application remotely in the cloud and streams the scenes as a video sequence back to the player over the Internet. This is an advantage for less powerful computational devices that are otherwise incapable of running high-quality games. Such industrial pioneers as Onlive and Gaikai have seen success in the market with large user bases. In this article, we conduct a systematic analysis of state-of-the-art cloud gaming platforms, and highlight the uniqueness of their framework design. We also measure their real world performance with different types of games, for both interaction latency and streaming quality, revealing critical challenges toward the widespread deployment of cloud gaming.

252 citations


Journal Article•DOI•
TL;DR: The Follow-Me Cloud concept is aimed at smooth migration of all or only a required portion of an ongoing IP service between a data center and user equipment of a 3GPP mobile network to another optimal DC with no service disruption.
Abstract: This article introduces the Follow-Me Cloud concept and proposes its framework. The proposed framework is aimed at smooth migration of all or only a required portion of an ongoing IP service between a data center and user equipment of a 3GPP mobile network to another optimal DC with no service disruption. The service migration and continuity is supported by replacing IP addressing with service identification. Indeed, an FMC service/application is identified, upon establishment, by a session/service ID, dynamically changing along with the service being delivered over the session; it consists of a unique identifier of UE within the 3GPP mobile network, an identifier of the cloud service, and dynamically changing characteristics of the cloud service. Service migration in FMC is triggered by change in the IP address of the UE due to a change of data anchor gateway in the mobile network, in turn due to UE mobility and/or for load balancing. An optimal DC is then selected based on the features of the new data anchor gateway. Smooth service migration and continuity are supported thanks to logic installed at UE and DCs that maps features of IP flows to the session/service ID.

251 citations


Journal Article•DOI•
TL;DR: This article gives an overview on several existing security attacks to the physical layer in cognitive radio networks and discusses the related countermeasures on how to defend against these attacks.
Abstract: In this article we explore the security issues on physical layer for cognitive radio networks. First we give an overview on several existing security attacks to the physical layer in cognitive radio networks. We then discuss the related countermeasures on how to defend against these attacks. We further investigate one of the most important physical layer security parameters, the secrecy capacity of a cognitive radio network, and study the outage probability of secrecy capacity of a primary user from a theoretical point of view. Furthermore, we present performance results for secrecy capacity and outage probability between a node and its neighbors. Our work summarizes the current advances of the physical layer security and brings insights on physical layer security analysis in cognitive radio networks.

170 citations


Journal Article•DOI•
TL;DR: A network architecture that is resilient even through devastating disasters by effectively exploiting specially designed movable and deployable resource units, which are referred to as MDRUs are proposed.
Abstract: During the great east Japan earthquake on March 11, 2011, a lot of ICT resources - telecom switching offices, optical fiber links, and so forth - were completely or partially damaged due to the tremor and the resultant tsunami. As a consequence, the demand for ICT services explosively increased, mainly because the people of the affected areas were trying desperately to communicate with the outside world that led to a phenomenal rise in the network traffic. In the Nippon Telegraph and Telephone (NTT) East Corporation alone, 385 telephone offices stopped operating immediately following the earthquake because of power outages and disruption of facilities. Approximately 1.5 million users were cut off from using fixed-line telephone service. The demand for fixed-line and mobile telephone services jumped up to 10-50 times the usual. This gave rise to serious traffic congestion, and the emergency ICT networks and services could not deal with this issue sufficiently. This article proposes a network architecture that is resilient even through devastating disasters by effectively exploiting specially designed movable and deployable resource units, which we refer to as MDRUs. An MDRU having the ability to accommodate communication and information processing functions can be rapidly transported or moved to the disaster zone, and can be deployed within a reasonably short time to establish the network at the disaster site and launch ICT services. The concept and configuration of the network architecture based on the MDRU and its features are described in this article. Some preliminary simulation results are also reported to evaluate the performance of our adopted MDRU-based disaster resilient network.

139 citations


Journal Article•DOI•
TL;DR: This article presents a survey on enabling DCN technologies for future cloud infrastructures through which the huge amount of resources in data centers can be efficiently managed.
Abstract: The increasing adoption of cloud services is demanding the deployment of more data centers. Data centers typically house a huge amount of storage and computing resources, in turn dictating better networking technologies to connect the large number of computing and storage nodes. Data center networking (DCN) is an emerging field to study networking challenges in data centers. In this article, we present a survey on enabling DCN technologies for future cloud infrastructures through which the huge amount of resources in data centers can be efficiently managed. Specifically, we start with a detailed investigation of the architecture, technologies, and design principles for future DCN. Following that, we highlight some of the design challenges and open issues that should be addressed for future DCN to improve its energy efficiency and increase its throughput while lowering its cost.

101 citations


Journal Article•DOI•
TL;DR: A new protocol is proposed, Integrated Authentication and Confidentiality (IAC), to provide efficient secure AMI communications in smart grid, which has better performance in terms of end-to-end delay and packet loss than a basic security scheme.
Abstract: In this article, we present a security protocol for advanced metering infrastructure in smart grid. We consider various security vulnerabilities of deploying AMI, and explore the issues related to confidentiality for user privacy and behavior as well as message authentication for meter reading and control messages. After surveying the existing security solutions in this area, we propose a new protocol, Integrated Authentication and Confidentiality (IAC), to provide efficient secure AMI communications in smart grid. With the help of IAC, an AMI system can provide trust services, data privacy, and integrity by mutual authentications whenever a new smart meter initiates and joins the smart grid AMI network. Data integrity and confidentiality are fulfilled through message authentication and encryption services, using the corresponding keys established in mutual authentications. Simulation and analytical results show that the proposed IAC protocol has better performance in terms of end-to-end delay and packet loss than a basic security scheme. Additionally, it can also facilitate efficient secure data collection and control message delivery between smart meters and a local collector for AMI communications in a smart grid.

97 citations


Journal Article•DOI•
TL;DR: This work considers technology-based security defenses grounded in information security tools and fault-tolerant control in conjunction with institutional structures to facilitate more effective defenses, especially against correlated failures.
Abstract: We present a generic yet practical framework for assessing security risks to cyber-physical systems (CPSs). Our framework can be used to benchmark security risks when information is less than perfect, and interdependencies of physical and computational components may result in correlated failures. Such environments are prone to externalities, and can cause huge societal losses. We focus on the risks that arise from interdependent reliability failures (faults) and security failures (attacks). We advocate that a sound assessment of these risks requires explicit modeling of the effects of both technology-based defenses and institutions necessary for supporting them. Thus, we consider technology-based security defenses grounded in information security tools and fault-tolerant control in conjunction with institutional structures. Our game-theoretic approach to estimating security risks facilitates more effective defenses, especially against correlated failures.

97 citations


Journal Article•DOI•
TL;DR: This article provides a comprehensive study to lay out existing mobile cloud computing service models and key achievements, and presents a new user-centric mobile cloud Computing service model to advance existingMobile cloud computing research.
Abstract: Mobile devices are rapidly becoming the major service participants nowadays. However, traditional client-server based mobile service models are not able to meet the increasing demands from mobile users in terms of services diversity, user experience, security and privacy, and so on. Cloud computing enables mobile devices to offload complex operations of mobile applications, which are infeasible on mobile devices alone. In this article, we provide a comprehensive study to lay out existing mobile cloud computing service models and key achievements, and present a new user-centric mobile cloud computing service model to advance existing mobile cloud computing research.

97 citations


Journal Article•DOI•
TL;DR: In this article, an elastic optical network (EON) approach is proposed for provisioning cloud computing traffic, which allows for both scalable bandwidth provisioning and flexible resource allocation, and the deployment cost, energy consumption, and bandwidth usage for both EON and classical WSON transport networks are compared in pan-European and U.S. backbone networks for 2012-2020 using Cisco traffic predictions.
Abstract: This article provides motivation for the elastic optical network (EON) approach, an efficient and cost-effective solution for provisioning of cloud computing traffic. As opposed to wavelength switched optical networks (WSONs), the capabilities of which are limited by the use of rigid frequency grids, EON architectures allow for both scalable bandwidth provisioning and flexible resource allocation. The deployment cost, energy consumption, and bandwidth usage for both EON and classical WSON transport networks are compared in pan-European and U.S. backbone networks for 2012-2020 using Cisco traffic predictions. Results show that the EON concept significantly outperforms WSON in all examined criteria, and the gap between the two architectures increases in subsequent years. Moreover, potential advantages of anycast routing in transport networks with data center traffic are demonstrated.

Journal Article•DOI•
TL;DR: This article identifies a new selfish attack type in cognitive radio ad-hoc networks and proposes an easy and efficient selfish cognitive radio attack detection technique, called COOPON, with multichannel resources by cooperative neighboring cognitive radio nodes.
Abstract: Cognitive radio is an opportunistic communication technology designed to help unlicensed users utilize the maximum available licensed bandwidth. Cognitive radio has recently attracted a lot of research interest. However, little research has been done regarding security in cognitive radio, while much more research has been done on spectrum sensing and allocation problems. A selfish cognitive radio node can occupy all or part of the resources of multiple channels, prohibiting other cognitive radio nodes from accessing these resources. Selfish cognitive radio attacks are a serious security problem because they significantly degrade the performance of a cognitive radio network. In this article we identify a new selfish attack type in cognitive radio ad-hoc networks and propose an easy and efficient selfish cognitive radio attack detection technique, called COOPON, with multichannel resources by cooperative neighboring cognitive radio nodes.

Journal Article•DOI•
TL;DR: The LIGHTNESS DCN solution is presented, deeply elaborating on the envisioned DCN data plane technologies, as well as on the unified SDN-enabled control plane architectural solution that will empower OPS and OCS transmission technologies with superior flexibility, manageability, and customizability.
Abstract: Applications running inside data centers are enabled through the cooperation of thousands of servers arranged in racks and interconnected together through the data center network. Current DCN architectures based on electronic devices are neither scalable to face the massive growth of DCs, nor flexible enough to efficiently and cost-effectively support highly dynamic application traffic profiles. The FP7 European Project LIGHTNESS foresees extending the capabilities of today's electrical DCNs throPugh the introduction of optical packet switching and optical circuit switching paradigms, realizing together an advanced and highly scalable DCN architecture for ultra-high-bandwidth and low-latency server-to-server interconnection. This article reviews the current DC and high-performance computing (HPC) outlooks, followed by an analysis of the main requirements for future DCs and HPC platforms. As the key contribution of the article, the LIGHTNESS DCN solution is presented, deeply elaborating on the envisioned DCN data plane technologies, as well as on the unified SDN-enabled control plane architectural solution that will empower OPS and OCS transmission technologies with superior flexibility, manageability, and customizability.

Journal Article•DOI•
TL;DR: This article identifies the key issues in developing new applications that effectively leverage cloud resources for computation-intensive modules, or migrating such modules in existing applications to the mobile cloud, and illustrates the unique challenges, benefit, and implementation of computation offloading in mobile cloud computing.
Abstract: The emergence of cloud computing has been dramatically changing the landscape of services for modern computer applications. Offloading computation to the cloud effectively expands the usability of mobile terminals beyond their physical limits, and also greatly extends their battery charging intervals through potential energy savings. In this article, we present an overview of computation offloading in mobile cloud computing. We identify the key issues in developing new applications that effectively leverage cloud resources for computation-intensive modules, or migrating such modules in existing applications to the mobile cloud. We then analyze two representative applications in detail from both the macro and micro perspectives, cloud-assisted distributed interactive mobile applications and cloud-assisted motion estimation for mobile video compression, to illustrate the unique challenges, benefit, and implementation of computation offloading in mobile cloud computing. We finally summarize the lessons learned and present potential future avenues.

Journal Article•DOI•
TL;DR: It is observed that despite the challenges posed, power-laws have been effectively leveraged by researchers to improve the design and performance of Internet-based systems.
Abstract: Power-laws are ubiquitous in the Internet and its applications. This tutorial presents a review of power-laws with emphasis on observations from Internet measurements. First, we introduce power-laws and describe two commonly observed power-law distributions, the Pareto and Zipf distributions. Two frequently occurring terms associated with these distributions, specifically heavy tails and long tails, are also discussed. Second, the preferential attachment model, which is a widely used model for generating power-law graph structures, is reviewed. Subsequently, we present several examples of Internet workload properties that exhibit power-law behavior. Finally, we explore several implications of power-laws in computer networks. Using examples from past and present, we review how researchers have studied and exploited power-law properties. We observe that despite the challenges posed, power-laws have been effectively leveraged by researchers to improve the design and performance of Internet-based systems.

Journal Article•DOI•
TL;DR: This article model the jamming and anti-jamming process as a Markov decision process, and proposes an algorithm to solve the Q-function, which can achieve better performance than existing approaches to defend against theJamming attack.
Abstract: Cognitive radio networks are a promising solution to the spectrum scarcity issue. However, cognitive radio networks are vulnerable to various kinds of security attacks, among which the jamming attack has attracted great attention as it can significantly degrade spectrum utilization. In this article we model the jamming and anti-jamming process as a Markov decision process. With this approach, secondary users are able to avoid the jamming attack launched by external attackers and therefore maximize the payoff function. We first use a policy iteration method to solve the problem. However, this approach is computationally intensive. To decrease the computation complexity, Q-function is used as an alternate method. Furthermore, we propose an algorithm to solve the Q-function. The simulation results indicate that our approach can achieve better performance than existing approaches to defend against the jamming attack.

Journal Article•DOI•
TL;DR: A unified elastic computing platform that supports application offloading for mobile devices, reducing energy consumption on smartphones is proposed and can enhance the scalability of smartphones, fueling a new wave of innovative mobile applications.
Abstract: Application offloading has been a popular approach to alleviate a tussle between resource-constrained smartphones and resource-hungry mobile applications. In this article, for leveraging cloud computing, we propose a unified elastic computing platform that supports application offloading for mobile devices, reducing energy consumption on smartphones. The proposed computing fabric consists of an infrastructure-based cloud and an ad hoc virtual cloud formed by a cluster of smartphones. We present both an offloading policy and a mechanism under which applications are delegated to the cloud for execution. For the former, we establish a unified optimization framework to decide where each task of the application should be executed - on the standalone smartphone, in the ad hoc virtual cloud, or in the infrastructure-based cloud. For the latter, we provide implementation strategies for application offloading. The proposed elastic computing platform can enhance the scalability of smartphones, fueling a new wave of innovative mobile applications, for example, anti-virus and gaming on smartphones.

Journal Article•DOI•
TL;DR: Results from a U.S. cloud network infrastructure show that, using simple migration techniques, up to 30 percent nonrenewable energy can be replaced by renewable energy, while consuming only a small amount of extra resources and energy to perform demand relocation.
Abstract: Cloud computing is the new paradigm of operation in information technology. While cloud computing infrastructures have benefits, their energy consumption is becoming a growing concern. Data centers, which are used to provide the infrastructure and resource pool for cloud computing, consume a large amount of energy. Future energy consumption predictions of these data centers are even bigger concerns. To reduce this energy consumption, and hence the carbon footprint and greenhouse gas emission of cloud computing, and information technology in general, energy-efficient methods of operation have to be investigated and adopted. In addition, renewable energy usage in place of non-renewable can also reduce carbon emission. However, due to its intermittency and volatility, renewable energy cannot be used to its full potential. In this study, we introduce the renewable-energy- aware cloud service and virtual machine migration to relocate energy demand using dynamic and flexible cloud resource allocation techniques, and help overcome the challenges of renewable energy. Results from a U.S.-wide cloud network infrastructure show that, using simple migration techniques, up to 30 percent nonrenewable energy can be replaced by renewable energy, while consuming only a small amount of extra resources and energy to perform demand relocation.

Journal Article•DOI•
TL;DR: A CRN based on IEEE wireless regional area network (WRAN) and some of the security threats against it is described and a proposed intrusion detection system (IDS) is presented, which adopts an anomaly detection approach and it profiles the CRN system parameters through a learning phase.
Abstract: While cognitive radio networks (CRNs) present a promising solution to solve the scarcity of the radio spectrum, they are still susceptible to security threats. Until now, only a few researchers considered the use of intrusion detection systems (IDSs) to combat these threats against CRNs. In this article we describe a CRN based on IEEE wireless regional area network (WRAN) and describe some of the security threats against it. For the secondary users in the CRN to quickly detect whether they are being attacked, a simple yet effective IDS is then presented. Our proposal uses non-parametric cumulative sum (cusum) as the change point detection algorithm to discover the abnormal behavior due to attacks. Our proposed IDS adopts an anomaly detection approach and it profiles the CRN system parameters through a learning phase. So, our proposal is also able to detect new types of attacks. As an example, we present the case of detection of a jamming attack, which was not known to the IDS beforehand. The proposed IDS is evaluated through computer based simulations, and the simulation results clearly indicate the effectiveness of our proposal.

Journal Article•DOI•
TL;DR: The performance of pulse amplitude modulation, carrierless amplitude/phase modulation, and direct detection orthogonal frequency- division multiplexing for short reach optical communication systems is discussed and their possible use for future high-capacity short reach Optical Communication Systems is explored.
Abstract: The use of advanced modulation formats helps to reduce the number of components required for short reach optical communication modules at 100 Gb/s and beyond. Unlike long haul optical communication systems where externally modulated high order modulation formats with coherent detection receivers are used, direct modulated lasers with direct detection are likely to be employed for short reach system implementation. Here we discuss the performance of pulse amplitude modulation, carrierless amplitude/phase modulation, and direct detection orthogonal frequency- division multiplexing for short reach optical communication systems. Their possible use for future high-capacity short reach optical communication systems is explored.

Journal Article•DOI•
Yunhao Liu1, Xufei Mao1, Yuan He1, Kebin Liu1, Wei Gong1, Jiliang Wang1 •
TL;DR: Some early lessons learned from this project are shared, the potential benefits and risks of current solutions are illustrated, and the possible extensions of CitySee applications are discussed.
Abstract: CitySee, an environment monitoring system with 1196 sensor nodes and 4 mesh nodes in an urban area, is mainly motivated by the needs of precise carbon emission measurement and real-time surveillance for CO2 management in cities. Being one of the largest working wireless sensor networks, CitySee faces several challenges such as hardware design, software development, platforms, network protocols, and, most important, satisfactory services to users. We share some early lessons learned from this project, illustrate the potential benefits and risks of current solutions, and discuss the possible extensions of CitySee applications.

Journal Article•DOI•
TL;DR: This work introduces a novel anti-jamming solution for CRNs based on a distributed, probabilistic protocol that enjoys several features: it avoids control channels for the coordination of the secondary users; does not need any information related to the node neighborhood; and it does not leverage any knowledge or statistics about the channel usage.
Abstract: Cognitive Radio Networks (CRNs) are recognized as the enabling technology for improving future bandwidth utilization. CRNs have intrinsic security threats due to their opportunistic exploitation of the bandwidth. In particular, jamming is one of the most challenging security threats for CRNs. In this work we provide several contributions about jamming in CRNs: we classify the various jamming strategies, provide a review of recent anti-jamming countermeasures, and introduce a novel anti-jamming solution for CRNs. Our solution is based on a distributed, probabilistic protocol that, while on the one hand could introduce some (limited) delay in message propagation, on the other hand enjoys several features: it avoids control channels for the coordination of the secondary users; does not need any information related to the node neighborhood; and it does not leverage any knowledge or statistics about the channel usage. Given the novelty of the proposal and its potential to thwart jamming in CRNs, we believe it could pave the way for further research in the field.

Journal Article•DOI•
TL;DR: This article focuses on the transport layer in data centers, and presents a comprehensive survey of existing problems and their current solutions, to help readers quickly understand the causes of each problem and learn about current research progress.
Abstract: Traditional fair bandwidth sharing by leveraging AIMD-based congestion control mechanisms faces great challenges in data center networks. Much work has been done to solve one of the various challenges. However, no single transport layer protocol can solve all of them. In this article, we focus on the transport layer in data centers, and present a comprehensive survey of existing problems and their current solutions. We hope that this article can help readers quickly understand the causes of each problem and learn about current research progress, so as to help them make new contributions in this field.

Journal Article•DOI•
TL;DR: This article presents a tutorial on methods (at the network layer), encountered in recent literature, for small and large scale routing protocols, and geocasting (broadcasting, data dissemination, and warning delivery) protocols.
Abstract: Intermittent connectivity, abrupt changes in network topology and low reception rate are the most important properties that distinguish VANET (vehicular ad hoc networks) from other types of ad hoc networks. To optimize reliability and time criticality metrics in data communication protocols for VANET, novel ideas are needed. In this article, we present a tutorial on methods (at the network layer), encountered in recent literature, for small and large scale routing protocols, and geocasting (broadcasting, data dissemination, and warning delivery) protocols.

Journal Article•DOI•
TL;DR: This article provides a set of definitions of privacy requirements for both data producers and consumers and proposes an efficient solution designed for mobile phone users, which incurs very low overhead.
Abstract: Participatory sensing is an emerging computing paradigm that enables the distributed collection of data by self-selected participants. It allows the increasing number of mobile phone users to share local knowledge acquired by their sensor-equipped devices (e.g., to monitor temperature, pollution level, or consumer pricing information). While research initiatives and prototypes proliferate, their real-world impact is often bounded to comprehensive user participation. If users have no incentive, or feel that their privacy might be endangered, it is likely that they will not participate. In this article, we focus on privacy protection in participatory sensing and introduce a suitable privacy-enhanced infrastructure. First, we provide a set of definitions of privacy requirements for both data producers (i.e., users providing sensed information) and consumers (i.e., applications accessing the data). Then we propose an efficient solution designed for mobile phone users, which incurs very low overhead. Finally, we discuss a number of open problems and possible research directions.

Journal Article•DOI•
TL;DR: This article identifies the system requirements and challenges toward achieving privacy-assured searchable outsourced cloud data services, especially, how to design usable and practically efficient search schemes for encrypted cloud storage, and presents a general methodology for this using searchable encryption techniques.
Abstract: Cloud computing is envisioned as the next generation architecture of IT enterprises, providing convenient remote access to massively scalable data storage and application services. While this outsourced storage and computing paradigm can potentially bring great economical savings for data owners and users, its benefits may not be fully realized due to wide concerns of data owners that their private data may be involuntarily exposed or handled by cloud providers. Although end-to-end encryption techniques have been proposed as promising solutions for secure cloud data storage, a primary challenge toward building a full-fledged cloud data service remains: how to effectively support flexible data utilization services such as search over the data in a privacy-preserving manner. In this article, we identify the system requirements and challenges toward achieving privacy-assured searchable outsourced cloud data services, especially, how to design usable and practically efficient search schemes for encrypted cloud storage. We present a general methodology for this using searchable encryption techniques, which allows encrypted data to be searched by users without leaking information about the data itself and users? queries. In particular, we discuss three desirable functionalities of usable search operations: supporting result ranking, similarity search, and search over structured data. For each of them, we describe approaches to design efficient privacy-assured searchable encryption schemes, which are based on several recent symmetric-key encryption primitives. We analyze their advantages and limitations, and outline the future challenges that need to be solved to make such secure searchable cloud data service a reality.

Journal Article•DOI•
TL;DR: This article presents the PHY-layer approaches to defense against security threats in CR networks, and analyzes the validities and benefits of proposed approaches, which can be valid not only for the attacks in the PHy-layer but also for those in the upper layer.
Abstract: In this article we focus on the security in cognitive radio, which is one of the needs for new technologies requiring spectrum bands The PHY-layer in CR is more complex than a conventional wireless communication system because of spectrum sensing and the dynamic spectrum access mechanism Therefore, it becomes vulnerable to be invaded We present the PHY-layer approaches to defense against security threats in CR networks We analyze the validities and benefits of proposed approaches, which can be valid not only for the attacks in the PHY-layer but also for those in the upper layer

Journal Article•DOI•
TL;DR: A qualitative analysis is provided to compare the three DMM approaches that are currently being considered by the IETF: PMIPv 6-based, MIPv6- based, and routing-based DMMs, and discuss which DMM approach is more suitable for efficient mobile video delivery.
Abstract: The recent proliferation of multimedia mobile devices and a variety of mobile applications are generating an enormous amount of data traffic over mobile networks. The key driver of the mobile traffic growth is mobile video. Currently, mobile networks are evolving to the 4G system, which has a flatter architecture and provides all-IP-based mobile broadband service. In all-IP mobile networks, IP mobility management is a key function that allows mobile nodes to continue their communications even when their point of attachment to the IP network changes. Existing mobile networks employ a centralized mobility management scheme where all intelligence is concentrated in one end-point system, rather than being distributed through the internet. However, this cannot satisfactorily support mobile videos, which demand a large volume of data and often require QoS such as session continuity and low delay. This motivates distributed mobility management (DMM) solutions that can efficiently handle mobile video traffic. In this article, we survey different approaches for DMM in standards development organizations such as IETF and 3GPP, and also in research organizations. We focus on three different DMM approaches that are currently being considered by the IETF: PMIPv6-based, MIPv6-based, and routing-based DMMs. We provide a qualitative analysis to compare the three DMM approaches and discuss which DMM approaches are more suitable for efficient mobile video delivery.

Journal Article•DOI•
TL;DR: This article proposes a lightweight and efficient security solution for SASs that provides multilevel multi-factor authentication and attribute-based authorization by deploying public key certificates, and zero-knowledge protocol-based server-aided verification and access control mechanisms using attribute certificates.
Abstract: Supervisory control and data acquisition systems are used extensively to control and monitor critical infrastructure including power, gas, oil, and water. To integrate intelligent electronic devices in smart grid infrastructure, the utilities are deploying substation automation systems (SASs) and extensive communication networks, but there is growing concern about SCADA security including substation security. Although there are several solutions utilized to prevent security threats in SCADA networks, existing SCADA networks still have severe shortcomings. In this article, we propose a lightweight and efficient security solution for SASs that provides multilevel multi-factor authentication and attribute-based authorization by deploying public key certificates, and zero-knowledge protocol-based server-aided verification and access control mechanisms using attribute certificates. It can be seen that the proposed approach is efficient and robust.

Journal Article•DOI•
TL;DR: It is argued that identifier/location separation can also help prevent distributed denial-of-service (DDoS) attacks and numerical results are presented to demonstrate that, even if many zombies attack a victim, identifier/locator separation helps detect DDoS attacks.
Abstract: Identifier/locator separation is a promising solution to the current Internet scaling problems. In this article, we argue that identifier/location separation can also help prevent distributed denial-of-service (DDoS) attacks. We discuss an identifier-to-locator mapping approach and explain how the approach makes it difficult for attackers to control botnets. We also present numerical results based on data from a real DDoS attack to demonstrate that, even if many zombies attack a victim, identifier/locator separation helps detect DDoS attacks.