About
59
Publications
16,782
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,094
Citations
Introduction
Van-Linh Nguyen received a Ph.D. degree in computer science and information engineering at National Chung Cheng University (CCU), Taiwan, 2019. His research interests include low-power networks, the Internet of Things, edge computing, and next-generation network security.
Education
June 2014 - July 2014
Publications
Publications (59)
Semantic communications (SEMCOM) is a novel communication model that exploits neural networks or deep learning techniques to convey the semantics of the data and contextual reasoning, instead of transmitting full raw bits as in the conventional transmission models. SEMCOM is anticipated to significantly increase the effectiveness of cognitive commu...
Many nations are promoting the green transition in the energy sector to attain neutral carbon emissions by 2050. Smart Grid 2.0 (SG2) is expected to explore data-driven analytics and enhance communication technologies to improve the efficiency and sustainability of distributed renewable energy systems. These features are beyond smart metering and e...
Network intrusion detection systems (NIDS) are vital for identifying security attacks and predicting early invasion attempts, which is essential for protecting the Internet. Recently, Deep learning (DL) has made significant achievements in enhancing intrusion detection accuracy. Nevertheless, the practical implementation of high-complexity DL model...
Abstract
The advent of sixth-generation (6G) networks is expected to start a new era in mobile networks, characterized by unprecedented high demands on dense connectivity, ultra-reliability, low latency, and high throughput. Artificial intelligence (AI) is at the forefront of this progress, optimizing and enabling intelligence for essential 6G func...
In this article, we consider a multiagent unmanned aerial vehicle (UAV)-aided system employing mobile edge computing (MEC) servers to satisfy the requirement of ultrareliable low latency communications (URLLCs) in intelligent autonomous transport applications. Our MEC architecture aims to guarantee quality-of-service (QoS) by investigating task off...
Guaranteeing stable connectivity for emergency communications in rural and remote areas (e.g., to transfer highquality video for remote surgery) has been challenging for any cellular network generation. With many initiatives proposed to expand the network coverage in 6G, emergency communications are supposed to be enhanced significantly. For exampl...
The accuracy and timeliness tradeoff prevents Digital Twins (DTs) from realizing their full potential. High accuracy is crucial for decision-making, and timeliness is equally essential for responsiveness. Therefore, this tradeoff in DT communication must be addressed to achieve DT synchronization. Previous studies identified the issue but considere...
Artificial intelligence (AI) is projected to be a critical part of open radio access networks (O-RAN) to enable intelligence for connectivity management in smart vehicle-to-everything (V2X) networks and vehicle road cooperation systems. However, the openness and dependence of AI models on massive volumes of data render them subject to serious secur...
Many nations are promoting the green transition in the energy sector to attain neutral carbon emissions by 2050. SG2 is expected to explore data-driven analytics and enhance communication technologies to improve the efficiency and sustainability of distributed renewable energy systems. These features are beyond smart metering and electric surplus d...
p>High-accuracy radio positioning and sensing technologies are crucial for many applications, including tracking hospital patients and identifying victims during emergency calls. However, these techniques present serious privacy concerns since malicious actors might use them to track users' activities and habits without their consent. This paper pr...
p>High-accuracy radio positioning and sensing technologies are crucial for many applications, including tracking hospital patients and identifying victims during emergency calls. However, these techniques present serious privacy concerns since malicious actors might use them to track users' activities and habits without their consent. This paper pr...
p>Directional antenna technologies are crucial to enhance high-speed data transmission in emerging wireless communications such as mmWave. These technologies can enable high-accuracy radio positioning by exploiting spatial-temporal signal processing in wideband beamforming space. However, the radio positioning technique potentially poses surveillan...
p>Directional antenna technologies are crucial to enhance high-speed data transmission in emerging wireless communications such as mmWave. These technologies can enable high-accuracy radio positioning by exploiting spatial-temporal signal processing in wideband beamforming space. However, the radio positioning technique potentially poses surveillan...
This letter presents a novel method to enable beam steering optimization for secure communications and resilience against radio tracking in an intelligent reflecting surfaces-enabled multiple-input multiple-output dual-functional radar and communications system. The approach involves optimizing beam steering by solving two convex sub-problems: i) m...
High-accuracy radio positioning and sensing technologies are crucial for many applications, including tracking hospital patients and identifying victims during emergency calls. However, these techniques present serious privacy concerns since malicious actors might use them to track users' activities and habits without their consent. This paper prov...
Twenty-two years after the advent of the first-generation vehicular network, i.e., dedicated short-range communications (DSRC) standard/IEEE 802.11p, the vehicular technology market has become very competitive with a new player, Cellular Vehicle-to-Everything (C-V2X). Currently, C-V2X technology likely dominates the race because of the big advantag...
Resolving traffic congestion caused by sudden events (e.g., an accident, lane closed due to construction) on the freeway has always been a problem that is challenging to address perfectly. The congestion resolution can take hours if the congestion is severe, and the vehicles must voluntarily line up to exit the congestion spots. Most state-of-the-a...
This work compares the performance of different combinations of data sources for intrusion detection in depth. To learn and distinguish between normal and malicious behavior, we use machine learning algorithms and train three typical models on three kinds of datasets: system logs, packet flows and host statistics. Unlike other studies, our study ca...
A centralized public-key infrastructure (PKI) has revealed disadvantages to enterprise applications, as a result of a single point of failure and risks of misbehaving certificate authorities. This work presents a taxonomy of blockchain-based decentralized PKI schemes along with the prospective technologies for developing a robust PKI for Vehicle-to...
As a result of the explosion of security attacks and the complexity of modern networks, machine learning (ML) has recently become the favored approach for intrusion detection systems (IDS). However, the ML approach usually faces three challenges: massive attack variants, imbalanced data issues, and appropriate data segmentation. Improper handling o...
Channel congestion has been an open challenge for vehicular networks due to the limited resource of communication channels. Explosion of channel access requests from a massive number of transmitter vehicles can exhaust bandwidth and then degrade transmission quality. The rapid drop of messages (because of the high bit error rate in the transmission...
Twenty-two years after the advent of the firstgeneration vehicular network, i.e., dedicated short-range communications (DSRC) standard/IEEE 802.11p, the vehicular technology market has become very competitive with a new player, Cellular Vehicle-to-Everything (C-V2X). Currently, C-V2X technology likely dominates the race because of the big advantage...
Vehicle platooning is a promising technology to bring up significant benefits of improved fuel economy and fewer traffic collisions. However, many security attacks such as beacon message falsification have been exposed, creating grave concerns about maintaining a vehicle platoon stably. This work introduces a robust positioning-based verification s...
In the next decades, the popularity of Internet of Vehicles (IoV) technologies and autonomous driving promises to fundamentally change the way of handling the traffic flow on the streets. Traffic separation can be entirely carried out from a remote traffic control center without the police. This work introduces a sequential coordination algorithm,...
Dispatching emergency vehicles (EVs) to fatal accidents or fires as fast as possible is vital to save lives; however, minimizing an EV's travel time to the rescue spot is still an open challenge. This work presents a path planning and traffic clear-out scheduling scheme to lessen the EV's travel time in the vision of the Internet of Vehicles (IoV)....
Intrusion detection is one of the most common approaches for addressing security attacks in modern networks. However, given the increasing diversity of attack behaviors, efficient detection becomes more challenging. Machine learning (ML) has recently dominated as one of the most promising techniques to improve detection accuracy for intrusion detec...
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues...
Sixth-generation (6G) mobile networks will have to cope with diverse threats on a space-air-ground integrated network environment, novel technologies, and an accessible user information explosion. However, for now, security and privacy issues for 6G remain largely in concept. This survey provides a systematic overview of security and privacy issues...
Vehicle-to-Everything (V2X) communication technologies and High-definition (HD) maps are essential to improve the safety of vehicles in areas with limited visibility. V2X- enabled vehicles use periodic beacon messages to update each other on their moving state (position, velocity, heading). However, due to the limited resources of V2X wireless chan...
Next-generation advanced driver-assistance systems (ADAS) and cooperative adaptive cruise control (CACC) for advanced/autonomous driving are expected to increasingly use wireless connectivity such as V2V and V2I to improve the coverage, particularly in the locations where a vehicle's camera or radar is ineffective. However, using shared sensing dat...
Various attacks have emerged as the major threats to the success of a connected world like the Internet of Things (IoT), in which billions of devices interact with each other to facilitate human life. By exploiting the vulnerabilities of cheap and insecure devices such as IP cameras, an attacker can create hundreds of thousands of zombie devices an...
Vehicle-to-Everything (V2X) communications are vital for autonomous vehicles to share sensing data about the surrounding environment, particularly in non-line-of-sight (NLOS) areas where the camera and radar systems often perform poorly. However, an insider adversary such as a compromised vehicle can disseminate false sensing data that even a signa...
Recently, deep learning has been successfully applied to network security assessments and intrusion detection systems (IDSs) with various breakthroughs such as using Convolutional Neural Networks (CNN) and Long Short-Term Memory (LSTM) to classify malicious traffic. However, these state-of-the-art systems also face tremendous challenges to satisfy...
In vehicle-to-everything (V2X) communications, collecting sensing data from nearby entities is common and essential. However, this approach also raises grave concerns about the truthfulness of data reported by the senders, particularly the unreliable stakeholders. For example, a compromised vehicle may deliberately disseminate its false location to...
According to Internet Live Stat, the total number of online websites has already soared over 1.9 billion and is steadily increasing. ¹ The most popular content management systems (CMS) installed on such websites are PHP-based frameworks such as Wordpress and Joomla, which account for (as of December 2018) 59% and 6% of market share. 2,3 A large num...
Low Power Wireless (LPW) networks have recently been emerging as key candidates to offer affordable connectivity for the constrained devices in the Internet of Things (IoT). However, they also raise major security concerns due to the inherent security vulnerabilities of built-in communication protocols. By exploiting these flaws, an adversary can a...
Over the past decades, the web is always one of the most popular targets of hackers. Today, along with the popular usage of open sources such as Wordpress and Joomla, the explosion of the vulnerabilities in such frameworks causes the websites using them to face numerous security threats. Unfortunately, many clients and small companies may not be aw...
The programmable data plane model of softwaredefined networks (SDN) continues to gain adoption and support
in many enterprise entities such as Google and Barefoot. This
leading trend promises to enable flexible mechanisms for
handling traffic on SDN switches. In the early stage of its
development, few already-in-market proposals exploit the
innovat...
Distributed denial of service is one of the most critical threats to the availability of Internet services. A botnet with only 0.01 percent of the 50 billion connected devices in the Internet of Things is sufficient to launch a massive DDoS flooding attack that could exhaust resources and interrupt any target. However, the mobility of user equipmen...
Software-defined networking (SDN) separates the control plane from underlying devices, and allows it to control the data plane from a global view. While SDN brings conveniences to management, it also introduces new security threats. Knowing reactive rules, attackers can launch denial-of-service (DoS) attacks by sending numerous rule-matched packets...
Questions
Question (1)
Dear researchers
I am starting researching deeply about DDOS and detection algorithm as well as preventing technique. Detect and Prevent DDOS both for Streaming Media Application and Web-based Service. What should read latest science paper about this field?
I read this
1.Edhud Doron , WDA: A Web farm Distributed Denial Of Service attack attenuator
2.Huizhong Sun, Huizhong Sun ; Chao, H.J. ; Wing Cheong Lau, Wing Cheong Lau ,ALPi: A DDoS Defense System for High-Speed Networks, Ayres, P.E. ;
3. Chen Lei, Chen Lei ; Ye Dejian, Ye Dejian, DoS and DDoS Attack's Possibility Verification on Streaming Media Application , 2008 International Symposium on Information Science and Engineering, Dec. 2008, Vol.2, pp.63-67