Mario Gerla

Mario Gerla
University of California, Los Angeles | UCLA · Department of Computer Science

About

387
Publications
58,307
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
25,186
Citations

Publications

Publications (387)
Article
Full-text available
Collaboration between multiple Unmanned Aerial Vehicles (UAVs) to set up a Flying Ad Hoc Network (FANET) is a growing trend since future applications claim for more autonomous and rapid deployable systems. The user experience on watching videos transmitted over FANETs should always be satisfactory even under influence of topology changes caused by...
Conference Paper
In-network caching is a feature shared by all proposed Information Centric Networking (ICN) architectures as it is critical to achieving a more efficient retrieval of content. However, the default "cache everything everywhere" universal caching scheme has caused the emergence of several privacy threats. Timing attacks are one such privacy breach wh...
Article
Full-text available
Vehicular Networks (VN) enable the collaboration among vehicles and infrastructure to deliver network services, where usually value-added services are provided by cloud computing. In this context, fog computing can be deployed closer to the users to meet their needs with minimum help from the Internet infrastructure. Software Defined Networking (SD...
Article
Unmanned Aerial Vehicles (UAVs) empower people to reach endangered areas under emergency situations. By collaborating with each other, multiple UAVs forming a UAV network (UAVNet) could work together to perform specific tasks in a more efficient and intelligent way than having a single UAV. UAVNets pose special characteristics of high dynamics, uns...
Conference Paper
Full-text available
Delay Tolerant Network (DTN) routing protocols have been studied by many researchers for areas that are densely populated but have no Internet access. Many researchers have studied and proposed DTN protocols that rely on social metrics such as individual encountering frequency or centrality of a node. In this paper, we propose a DTN routing protoco...
Conference Paper
In mobile social networks, the success of resource sharing depends on a high level of cooperations. The motivation of this work is to seek conditions under which cooperation prevails without additional incentive mechanisms such as credit and reputation-based schemes. We apply the Evolutionary Game Theory framework to investigate the formation of co...
Conference Paper
Many recent advances of network caching focus on i) more effectively modeling the preferences of a regional user group to different web contents, and ii) reducing the cost of content delivery by storing the most popular contents in regional caches. However, the context under which the users interact with the network system usually causes tremendous...
Article
Full-text available
Delay-tolerant networks (DTNs) are sparse mobile ad hoc networks, in which there is typically no complete path between the source and destination. Anycast is an important group communication paradigm for numerous DTN applications such as resource discovery and information exchange in emergency or crisis situations. Unlike unicast and multicast, whi...
Article
Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most challenging mobility contexts in which to achieve effective data communications, less attention has been paid to the privacy of da...
Poster
Full-text available
In this paper, we introduce a privacy mechanism that improves the privacy strength while preserving utility. That is, we perform query expansion to reduce the information leakage due to an individual's participation.
Article
Full-text available
Safely avoiding accident prone routes is vital to maintaining safe and intelligent transportation. Real-time crowd sourcing of accident causing factors (e.g., icy roads, rain slicked road patches) combined with historical accident information can be utilized by intelligent navigation systems to avoid accident prone routes. A vehicle cloud can compu...
Conference Paper
In this paper we evaluate the feasibility of the vehicular blocktree proposed by Joy whereby vehicles write and aggregate their signatures to a blockchain. We analyze the end to end cycle time to collect, write, and persist the content to the blockchain as well as the total minting time. We show via time analysis that the cycle time occurs on the o...
Conference Paper
Full-text available
Traditionally, the vehicle has been the extension of the manual ambulatory system, docile to the drivers' commands. Recent advances in communications, controls and embedded systems have changed this model, paving the way to the Intelligent Vehicle Grid. The car is now a formidable sensor platform, absorbing information from the environment, from ot...
Article
Full-text available
Autonomic Communications aims to provide Quality-of-Service (QoS) in networks using self-management mechanisms. It inherits many characteristics from Autonomic Computing, in particular, when communication systems are running as specialized applications in Software-Defined Networking (SDN) and Network Function Virtualization (NFV) enabled cloud envi...
Article
In this paper, we present the XYZ Privacy mecha- nism. XYZ Privacy maintains constant error from the ground truth while each data owner submits multiple contradictory responses, achieves scalable non-attributable (privatized) writes, and it protects the aggregate answer against malicious data owners attempts to corrupt (e.g., pollution attacks). We...
Technical Report
Full-text available
Future autonomous vehicles will generate, collect, aggregate and consume significant volumes of data as key gateway devices in emerging Internet of Things scenarios. While vehicles are widely accepted as one of the most challenging mobility contexts in which to achieve effective data communications, less attention has been paid to the privacy of da...
Article
Full-text available
Within the emerging fog network, mobile devices along with local sensors and actuators dynamically form an ad hoc network. As mobile ad hoc networks frequently merge and split in such mobile fog network scenarios, the node addresses must be changed too. This implies that a session may be broken if one of the peers is assigned a new IP address. To o...
Article
Full-text available
Traditionally, the vehicle has been the extension of the manual ambulatory system, docile to the drivers' commands. Recent advances in communications, controls and embedded systems have changed this model, paving the way to the Intelligent Vehicle Grid. The car is now a formidable sensor platform, absorbing information from the environment, from ot...
Technical Report
Full-text available
In this paper we present the Sampling Privacy mechanism for privately releasing personal data. Sampling Privacy is a sampling based privacy mechanism that satisfies differential privacy.
Conference Paper
Given that the exact answer to a question is fixed, we ask is it possible to strengthen the privacy by increasing the crowd size that participates even though they do not contribute to the exact answer? In this paper, we introduce the notion of scalable privacy whereby data owners not at a particular location privatize their response such that they...
Conference Paper
Full-text available
In this paper we introduce the concept of CrowdZen Privacy. CrowdZen Privacy privately publishes the activity levels of places of interest (e.g., dining halls, libraries, gyms) and leverages the randomness of the crowd and variance of the estimation to satisfy differential privacy while preserving accuracy. We define the CrowdZen privacy mechanism...
Conference Paper
Highly dynamic vehicular networks use long-range radio technologies such as DSRC, WiMAX, and Cellular networks to maintain connectivity. Multipath TCP offers the possibility to combine these radio technologies to improve network performance, allow robust handoffs, and maintain vehicle connectivity at all times. The proliferation of mobile devices w...
Article
Highly dynamic vehicular networks use long-range radio technologies such as DSRC, WiMAX, and Cellular networks to maintain connectivity. Multipath TCP offers the possibility to combine these radio technologies to improve network performance, allow robust handoffs, and maintain vehicle connectivity at all times. The proliferation of mobile devices w...
Article
Reliable safety message dissemination is a fundamental primitive for constructing intersection safety systems. Normally, the dissemination is based on vehicular communications, of which the de-facto standard is Dedicated Short Range Communications (DSRC). However, due to high frequency operations, a DSRC signal is seriously attenuated when being pr...
Article
We consider the problem of routing in a mobile ad-hoc network (MANET) for which the planned mobilities of the nodes are partially known a priori and the nodes travel in groups. This situation arises commonly in military and emergency response scenarios. Optimal routes are computed using the most reliable path principle in which the negative logarit...
Article
Full-text available
Autonomous and self-driving vehicles are appearing on the public highways. These vehicles commonly use wireless communication techniques for both vehicle-to-vehicle and vehicle-to-infrastructure communications. Manufacturers, regulators and the public are understandably concerned about large-scale systems failure or malicious attack via these wirel...
Article
Full-text available
In 2003 Dinur and Nissim showed an impossibility result for privacy that if the amount of noise is $o(\sqrt{n})$, then privacy is impossible to achieve (where the output space is binary "Yes" or "No"). $\Omega({\sqrt{n}})$ noise must be added to have at least weak notions of privacy. However, the question has remained open as to whether $O(n)$ nois...
Article
Full-text available
When dealing with privatized data, it is important to be able to protect against malformed user inputs. This becomes difficult in MPC systems as each server should not contain enough information to know what values any user has submitted. In this paper, we implement an MPC technique to verify blinded user inputs are unit vectors. In addition, we in...
Article
Nowadays, the Internet is part of our lives, being an essential way of communication. However, it suffers from limitations that prevent the Internet to guarantee Quality of Service (QoS) for the services to the clients. Recently, the scientific community presented the Edge as a Service (EaaS) paradigm as a possible approach to improve the Internet...
Conference Paper
We present an approach for using signal traces from Field Operational Tests (FOTs) for later evaluations and comparative studies of receive algorithms for the IEEE 802.11p PHY. In particular, we use Software Defined Radios (SDRs) to record the raw signal, i.e., complex baseband samples, from IEEE 802.11p transmissions during an experiment on the ro...
Article
In wireless networks, broadcasting is a fundamental communication primitive for network management and information sharing. However, in multi-channel networks, broadcast efficiency is very poor as devices are distributed across various channels. Thus, a sender tries all channels to broadcast a single message, causing large overhead. In this paper,...
Article
Full-text available
Recent advances in communications, controls, and embedded systems have changed the perception of a car. A vehicle has been the extension of the man’s ambulatory system, docile to the driver’s commands. It is now a formidable sensor platform, absorbing information from the environment (and from other cars) and feeding it to drivers and infrastructur...
Article
This paper presents a secure communication application called DiscoverFriends. Its purpose is to securely communicate to a group of online friends while bypassing their respective social networking servers under a mobile ad hoc network environment. DiscoverFriends leverages Bloom filters and a hybrid encryption technique with a self-organized publi...
Article
Full-text available
Smart cities rely on dynamic and real-time data to enable smart urban applications such as intelligent transport and epidemics detection. However, the streaming of big data from IoT devices, especially from mobile platforms like pedestrians and cars, raises significant privacy concerns. Future autonomous vehicles will generate, collect and consume...
Conference Paper
Full-text available
Today, mobile data owners lack consent and control over the release and utilization of their location data. Third party applications continuously process and access location data without data owners granular control and without knowledge of how location data is being used. The proliferation of GPS enabled IoT devices will lead to larger scale abuse...
Conference Paper
In a mobile, intermittently connected information-centric network (ICN), users download files either from the original source or from caches assembled during previous downloads. Network coding has helped to increase download robustness and overcome "missing coupon" delays. Prior work has also shown that network coding depletes energy resources much...
Article
It is a consensus that the Internet suffers from architectural limitations, including resilience, scalability, and manageability, among others. Therefore, companies access the Internet by establishing a service level agreement (SLA) in the attempt to ensure quality of service (QoS) for users. To address the current limitations of the Internet, rese...
Article
Full-text available
In our study, we seek to learn the real-time crowd levels at popular points of interests based on users continually sharing their location data. We evaluate the benefits of users sharing their location data privately and non-privately, and show that suitable privacy-preserving mechanisms provide incentives for user participation in a private study...
Article
Currently, it is hard to imagine our lives without the Internet, where services are accessed and shared by billions of users every day. However, even after many years, the Internet cannot guarantee Quality of Service (QoS) for the main services to current and future clients. To deal with this problem, clients establish Service Level Agreements (SLA...
Conference Paper
Information-Centric Networks (ICN) are network architectures aiming at decoupling locator and identifier of contents, the primary objective of communication. It has been widely assumed that pervasive network caching and name-based forwarding, the most important characteristics of ICN, are beneficial in VANETs. However, these potential benefits have...
Article
Data replication and in-network storage are two basic principles of the Information Centric Networking (ICN) framework in which caches spread out in the network can be used to store the most popular contents. This work shows how one of the ICN architectures, the Named Data Networking (NDN), with content pre-fetching can maximize the probability tha...
Article
Full-text available
Platooning, which is the idea of cars autonomously following their leaders to form a road train, has huge potential to improve traffic flow efficiency and, most importantly, road traffic safety. Wireless communication is a fundamental building block: It is needed to manage and maintain the platoons. To keep the system stable, strict constraints in...
Article
Full-text available
Situational awareness applications used in disaster response and tactical scenarios require efficient communication without support from a fixed infrastructure. As commercial off-the-shelf mobile phones and tablets become cheaper, they are increasingly deployed in volatile ad-hoc environments. Despite wide use, networking in an efficient and distri...
Conference Paper
Full-text available
Low earth orbit (LEO) satellite networks like Iridium have played a pivotal role in providing ubiquitous network access services to areas without terrestrial infrastructure because of their potential for global coverage and high bandwidth availability. With low orbit and short range as compared to geostationary satellites, LEO satellites are access...
Conference Paper
Full-text available
While geo-routing is a promising routing algorithm in urban vehicular ad-hoc networks (VANETs), there is still much work to be done for it to become truly usable for such environments. One of the biggest obstacles to this goal is the intermittent nature of VANETs due to mobility. Traditional geo-routing algorithms do not perform well in these condi...
Conference Paper
Full-text available
The Information Centric Networking (ICN) model relies on the ubiquitous use of caching to improve performance and reduce bandwidth requirements. ICN also makes it possible for routers to fetch content from downstream nodes, such as when a content for a home user is fetched from a neighbor’s home router, with significant performance improvement. Thi...
Article
In this paper we conduct a performance evaluation of privacy protocols for Information Centric Networking (ICN). Our contribution is three-fold: Firstly, we define a simple but complete performance framework for comparing current and future solutions. Secondly, we conjecture and prove the existence of unsafe replicas, namely cached content that rem...
Conference Paper
Full-text available
Content downloading from vehicles is becoming increasingly popular, but it also meets challenges due to the limited number of roadside units (RSUs) and the expensive cost of 3G/LTE downloads. Cooperative LTE + vehicle-to-vehicle (V2V) downloading schemes can significantly improve the efficiency and reduce costs. However, selfish users are motivated...
Conference Paper
Nowadays, the multimedia content accessed by users represents 55% of the Internet traffic and it is forecast to expand to 92% by 2020. This fact increased the resource demand in access networks across the world, since multimedia traffic has high network requirements. To deal with this scenario, Internet Service Providers (ISPs) tend to apply the Ed...