Below, we briefly introduce the related topics and write down the result about our researches.
Vehicular Networks and Smart City Research
STMAC: Spatio-Temporal Coordination MAC Protocol in Urban Environments.
STMAC utilize a spatio-temporal feature and a road layout feature in urban areas for better wireless channel access. As shown in (a), the spatial disjoint of communication areas enabled by directional antennas provides the feature of spatial reuse, whereas the overlap of the communication areas shown in (b) indicates a temporal feature by which the communications should be separated for collision avoidance.
SCMAC: Safety-Service-Oriented Cluster based MAC Protocol in Highway Environments.
SCMAC is a MAC protocol that provides collision-free packet delivery with minimum bounded end-to-end delay. As shown in the following figure, SCMAC protocol has three layers, and each vehicle is either a cluster member, or a cluster head, or a master cluster head.
SAINT: Self-adaptive Interactive Navigation Tool for Cloud-based Vehicular Traffic Optimization.
As shown in (a) of the follow figure, the local traffic optimization causes traffic congestion in light-traffic road segments because it allows all of the vehicles to behave in a greedy way only for their own navigation, (b) shows SAINT supports global navigation optimization, considering the mobility of all the vehicles in a target road network.
Software Defined Networks / Network Functions Virtualization
Software Defined Networks (SDN) is conducted along with Network Functions Virtualization (NFV) research, which is network functional virtualization, to reduce infrastructure construction cost and operation cost for network service. SDN which separated by data and control planes uses a control server (i.e., SDN controller) to manage network devices flexibly and efficiently. This is an approach to control / manage the operation of network traffic transfer via software based controller using openAPI (e.g., openflow). Internet of Things (IoT) Lab implements SDN-based security service using Interface to Network Security Functions (I2NSF). We also contribute to the international standardization. Through this research, we will implement a SDN-based security service, provide it to the field, and standardize it.
Interface to Network Security Functions (I2NSF) Framework
A Network Security Function (NSF) is a function used to ensure integrity, confidentiality, or availability of network communications, to detect unwanted network activity, or to block or at least mitigate the effects of unwanted activity. NSFs are provided and consumed in increasingly diverse environments. Users could consume network security services enforced by NSFs hosted by one or more providers, which may be their own enterprise, service providers, or a combination of both. Similarly, service providers may offer their customers network security services that are enforced by multiple security products, functions from different vendors, or open source technologies. NSFs may be provided by physical and/or virtualized infrastructure. Without standard interfaces to control and monitor the behavior of NSFs, it has become virtually impossible for providers of security services to automate service offerings that utilize different security functions from multiple vendors.
The goal of I2NSF is to define a set of software interfaces and data models for controlling and monitoring aspects of physical and virtual NSFs, enabling clients to specify rulesets. If the working group finds it necessary to work on an information model before the data models, to help provide guidance and derive the data models, it may do so. The working group will decide later whether the information model needs to be published as an RFC. Other aspects of NSFs, such as device or network provisioning and configuration, are out of scope. As there are many different security vendors or open source technologies supporting different features and functions on their devices, I2NSF will focus on flow-based NSFs that provide treatment to packets/flows, such as Intrusion Protection/Detection System (IPS/IDS), web filtering, flow filtering, deep packet inspection, or pattern matching and remediation.
- Susan Hares, Diego Lopez, Myo Zarny, Christian Jacquenet, Rakesh Kumar, and Jaehoon Paul Jeong, "I2NSF Problem Statement and Use cases", draft-ietf-i2nsf-problem-and-use-cases, May 2017.
- Susan Hares, Robert Moskowitz, Liang Xia (Frank), Jaehoon Paul Jeong, and Jinyong Tim Kim, "I2NSF Capability YANG Data Model", draft-hares-i2nsf-capability-data-model, March 2017.
- Sangwon Hyun, Jaehoon Paul Jeong, SangUk Woo, YunSuk Yeo, and Jung-Soo Park, "NSF-triggered Traffic Steering in I2NSF Framework", draft-hyun-i2nsf-nsf-triggered-steering, March 2017.
- Sangwon Hyun, Jaehoon Paul Jeong, SangUk Woo, YunSuk Yeo, and Jung-Soo Park, "Registration Interface Information Model", draft-hyun-i2nsf-registration-interface-im, March 2017.
- Sangwon Hyun, Jaehoon Paul Jeong, YunSuk Yeo, SangUk Woo, and Susan Hares, "Registration Interface YANG Data Model", draft-hyun-i2nsf-registration-interface-dm, March 2017.
- Jaehoon Paul Jeong, Mahdi Daghmehchi Firoozjaei, Tae-Jin Ahn, Rakesh Kumar, and Susan Hares, "Consumer-Facing Interface YANG Data Model", draft-jeong-i2nsf-consumer-facing-interface-dm, March 2017
- Jinyoung Kim, Jaehoon Paul Jeong, Jung-Soo Park, Susan Hares, and Liang Xia, "I2NSF Network Security Functions Facing Interface YANG Data Model", draft-kim-i2nsf-nsf-facing-interface-data-model, March 2017.
Internet of Things / Wireless Sensor Networks
The Internet of things (IoT) is the network of physical devices, vehicles, building systems, and various embedded
devices with electronics, software, sensors, and actuators that enable these objects to collect and exchange data. Recently, the IoT has become one of the hottest research fields.
By a large number of devices, it is inefficient to manually configure their domain names in the Domain Name System (DNS), which allows DNS servers to translate between domain names and Internet Protocol (IP) addresses.
We proposed the scheme of DNS autoconfiguration for IoT devices in IPv4 or IPv6 environment.
DNS Name Autoconfiguration for IoT devices
- Keuntae Lee, Seokhwa Kim, and Jaehoon (Paul) Jeong, "DNSNAv4: DNS Name Autoconfiguration for Internet-of-Things Devices in IPv4 Networks", 31th International Conference on Advanced Information Networking and Applications Workshops - Device Centric Cloud (DC2), Best Paper Award, Taipei, Taiwan, March 27-29, 2017.
- Keuntae Lee and Jaehoon (Paul) Jeong, "DNS Naming Service Technology for Internet of Things Devices", KICS Information and Communications Magazine, Survey Paper, Vol. 33, No. 12, December 2016.
- Keuntae Lee and Jaehoon (Paul) Jeong, "DNS Naming Scheme for IoT Devices in IPv4 Networks", KICS 2016-Fall, November 2016.
- Keuntae Lee, Hyungsuk Kang, Jaehoon (Paul) Jeong, Hyoungshick Kim, and Jung-Soo Park, "Secure DNS Name Autoconfiguration for IPv6 Internet-of-Things Devices", International Conference on ICT Convergence (ICTC 2016), Jeju, Korea, October 19-21, 2016.
In the future, so many people will be interested in this issue that is how to localize in indoor. Therefore, this subject is very interesting and important to us. We are studying a human sensing algorithm. Unfortunately, it is not easy to filter the transition area because it can exhibit the "power reduction" function. To solve this problem, we adopt our method to filter out the subcarriers in the transition portion, depending on whether the power reduction is large enough. After adept thresholds, we applied our method to localization. Through theoretical analysis comparing our proposed method, our approach can localize and service (e.g., open space, indoor environment) in smart building environment.
- Working with SAMSUNG Electronics company