Huazhe Wang’s research while affiliated with University of California, Santa Cruz and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (12)


Concurrent Rate-Adaptive Reading With Passive RFIDs
  • Article

January 2022

·

14 Reads

·

2 Citations

IEEE Internet of Things Journal

Ge Wang

·

Shouqian Shi

·

Huazhe Wang

·

[...]

·

Jizhong Zhao

Radio frequency identification (RFID)-assisted management systems have been widely applied in warehousing, logistics, retailing, etc. In these scenarios, RFID-aided applications, e.g., object tracking and human behavior sensing, rely on a high-efficiency tag reading to realize accurate analyses and timely responses. However, serious tag collisions in those large-scale RFID systems will inevitably lead to significant decreases in the tag reading rates. To meet the strict timeliness requirements of those practical applications, we aim to treat the individual reading rate for each item tag differently and focus more attention on those user-interactive ones. However, due to unpredictable user behaviors, it is impractical to infer the user-interactive tags in advance. In addition, keeping focusing on them for continuous monitoring despite user movements and multipath-prevalent environments is also challenging. To solve these problems, we propose Spotlight, the first concurrent rate-adaptive reading system in passive RFIDs. Spotlight screens the ID-agnostic user-interactive tags by proposing a multichannel feature for narrow-band RFID systems without any hardware or protocol modification and achieves rate-adaptive reading by implementing real-time MU-MIMO beamforming. Substantial experiments with 1000+ COTS RFID tags exhibit that Spotlight outperforms the commercial reader by 2.7×2.7\times and the SDR-based reader by 6.12×6.12\times . In addition, Spotlight first proposes the online parallel decoding method to realize concurrency among multiple users, which breaks the commercial protocol’s throughput ceiling (37%) and achieves up to 59% throughputs.



SICS: Secure and Dynamic Middlebox Outsourcing

September 2020

·

18 Reads

·

2 Citations

IEEE/ACM Transactions on Networking

There is an increasing trend that enterprises outsource their middlebox processing to a cloud for lower cost and easier management. However, outsourcing middleboxes brings threats to the enterprise's private information, including the traffic and rules of middleboxes, all of which are visible within the cloud. Existing solutions for secure middlebox outsourcing either incur significant performance overhead or do not support incremental updates. In this article, we present a secure and dynamic middlebox outsourcing framework, SICS, short for Secure In-Cloud Service. SICS encrypts each packet header and uses a label for in-cloud rule matching, which enables the cloud to perform its functionalities correctly with minimum header information leakage. Evaluation results show that SICS achieves higher throughput, faster construction and update speed, and lower resource overhead at the enterprise and in the cloud when compared with existing solutions.


Encoding and verifying network intents for stateful networks
  • Patent
  • Full-text available

September 2020

·

15 Reads

Example method includes: identifying three relationships about a network function in an intent-based stateful network—(1) the network function forwarding a network packet implies that at least one previous network packet was received by the network function in the same direction prior to the network packet is forwarded, (2) an established state in the network function implies that at least one previous network packet was received at the network function, (3) the network function receiving the network packet as a downward network function implies the network packet was previously sent by a second network function acting as an upward network function; encoding the network function using a combination of at least one of the three identified relationships; and verifying a plurality of network intents in the intent-based stateful network based at least in part on the encoding of the network function.

Download

Toward Secure and Efficient Communication for the Internet of Things

January 2019

·

124 Reads

·

33 Citations

IEEE/ACM Transactions on Networking

Internet of Things has been widely applied in everyday life, ranging from transportation and healthcare to smart homes. As most IoT devices carry constrained resources and limited storage capacity, sensing data need to be transmitted to and stored at resource-rich platforms, such as a cloud. IoT applications need to retrieve sensing data from the cloud for analysis and decision-making purposes. Ensuring the authenticity and integrity of the sensing data is essential for the correctness and safety of IoT applications. We summarize the new challenges of the IoT data communication with authenticity and integrity and argue that existing solutions cannot be easily adopted to resource-constraint IoT devices. We present two solutions called dynamic tree chaining and geometric star chaining that provide efficient and secure communication for the Internet of Things. Extensive simulations and prototype emulation experiments driven by real IoT data show that the proposed system is more efficient than alternative solutions in terms of time and space.



Practical Network-Wide Packet Behavior Identification by AP Classifier

July 2017

·

12 Reads

·

22 Citations

IEEE/ACM Transactions on Networking

Identifying the network-wide forwarding behaviors of a packet is essential for many network management applications, including rule verification, policy enforcement, attack detection, traffic engineering, and fault localization. Current tools that can perform packet behavior identification either incur large time and memory costs or do not support real-time updates. In this paper, we present AP Classifier, a control plane tool for packet behavior identification. AP Classifier is developed based on the concept of atomic predicates, which can be used to characterize the forwarding behaviors of packets. Experiments using the data plane network state of two real networks show that the processing speed of AP Classifier is faster than existing tools by at least an order of magnitude. Furthermore, AP Classifier uses very small memory and is able to support real-time updates.



An IoT Data Communication Framework for Authenticity and Integrity

April 2017

·

133 Reads

·

33 Citations

Internet of Things has been widely applied in everyday life, ranging from transportation, healthcare, to smart homes. As most IoT devices carry constrained resources and limited storage capacity, sensing data need to be transmitted to and stored at resource-rich platforms, such as a cloud. IoT applications retrieve sensing data from the cloud for analysis and decision-making purposes. Ensuring the authenticity and integrity of the sensing data is essential for the correctness and safety of IoT applications. We summarize the new challenges of the IoT data communication framework with authenticity and integrity and argue that existing solutions cannot be easily adopted. We present two solutions, called Dynamic Tree Chaining (DTC) and Geometric Star Chaining (GSC) that provide authenticity, integrity, sampling uniformity, system efficiency, and application flexibility to IoT data communication. Extensive simulations and prototype emulation experiments driven by real IoT data show that the proposed system is more efficient than alternative solutions in terms of time and space.


Table 1 : Construction time of the gateway.
Figure 3: Header space divided by predicates  
Figure 4: (a) Per-field equivalence class. (b) An example on header modification.
Figure 5: Software architecure falling in [s, e] are encrypted to values in [S, E]. Knowing the interval [S, E], it takes an attacker at most 2 16 queries (e.g., sample packets with destination port traversing from 0 to 2 16 ) to find all port numbers in [s, e], where 16 is the length of the port field. So the attacker has successfully deciphered the encrypted interval [S, E] in the cloud. In addition, when a future packet matches the interval [S, E], the attacker learns that the original destination port of the packet falls in [s, e]. Similarly, the attacker could get mapping relationships for other fields. As a chosen packet header can test each header field simultaneously, the number of required queries to decipher all header fields is determined by the length of the longest header field. For five tuples, the longest header field is 32 bits. So it takes at most 2 32 quires to decipher a fivetuple based ruleset encrypted using PrefixMatch. As described in §4.2, SICS encrypts packet header fields as a whole. That is, all packet header fields are involved in the header space mapping process, the label of a packet is determined by all bits of its header. To launch the same attack described above, it costs 2 104 queries which is much larger than 2 32 .  
Figure 6: Example to convert an abstract function network to in-cloud deployment  

+1

SICS: Secure In-Cloud Service Function Chaining

June 2016

·

224 Reads

·

7 Citations

There is an increasing trend that enterprises outsource their network functions to the cloud for lower cost and ease of management. However, network function outsourcing brings threats to the privacy of enterprises since the cloud is able to access the traffic and rules of in-cloud network functions. Current tools for secure network function outsourcing either incur large performance overhead or do not support real-time updates. In this paper, we present SICS, a secure service function chain outsourcing framework. SICS encrypts each packet header and use a label for in-cloud rule matching, which enables the cloud to perform its functionalities correctly with minimum header information leakage. Evaluation results show that SICS achieves higher throughput, faster construction and update speed, and lower resource overhead at both enterprise and cloud sides, compared to existing solutions.


Citations (7)


... Its validation types include feasibility and validity verification. To ensure that the network configuration and status derived from network automation match the administrator's specified intent, Epinoia has designed a network intent checker for stateful networks [13]. Epinoia expands the PGA-based on a unified network function model and gradually checks for intent violations within the network to reduce the impacts and costs of network changes. ...

Reference:

Full-Life Cycle Intent-Driven Network Verification: Challenges and Approaches
Epinoia: Intent Checker for Stateful Networks
  • Citing Conference Paper
  • July 2021

... This helps to thwart unauthorized entry to sensitive data while it is in transit. Another approach to improving IoT security is through the use of multi-factor authentication, which mandates multiple layers of verification prior to granting access to a device or system [11,12]. Consistent software updates and patch management play a critical role in upholding IoT security. ...

Toward Secure and Efficient Communication for the Internet of Things
  • Citing Article
  • January 2019

IEEE/ACM Transactions on Networking

... How to detect and prevent such errors efficiently is a fundamental challenge for the network community. A major advance for this problem has been network verification, which analyzes the control plane [6, 11, 13-15, 26-28, 30-32, 40, 59, 64, 68, 71, 78, 84] and data plane [8,9,35,39,42,43,51,58,69,70,73,74,76,77,81,83] of network devices to identify errors. ...

Practical Network-Wide Packet Behavior Identification by AP Classifier
  • Citing Article
  • July 2017

IEEE/ACM Transactions on Networking

... When target values are sparse and directly dependent on the input packet header, this technique can greatly speed coverage. For example, consider an ingress MAC filter that only matches the interface and broadcast MAC addresses, two values out of 2 48 . Even at ∼2 billion packets per second, triggering the action would take an average of ∼20 hours. ...

Pronto: Efficient Test Packet Generation for Dynamic Network Data Planes
  • Citing Conference Paper
  • June 2017

... Managing thousands of devices pushes the technology to its limits, and creates one of the most important and not yet solved problems of scaling the solution to myriads of connected devices. There are many approaches that try to address this problem efficiently, some of them are focus on centralized solutions, such as cloud [6,25,28,35,41], others are introducing novel architectures like mist and fog [10,16,24,35] or leveraging fully decentralized solutions based on blockchain [30]. Each of them has its own merits but in this work, we are focusing on blockchains that have been leveraged to provide decentralized, verifiable, trusted, and traceable IoT-based applications [36]. ...

An IoT Data Communication Framework for Authenticity and Integrity
  • Citing Conference Paper
  • April 2017

... To improve the speed of verification, many scholars have launched research on real-time verification. Examples include VeriFlow [6], Atomic Predicates Verifier [7], NetPlumber [8] and AP classifier [9]. The above tools mainly focus on small and medium networks such as campus networks. ...

Practical network-wide packet behavior identification by AP classifier
  • Citing Conference Paper
  • December 2015

... The algorithm used -Policy-Graph-Composition reduces the complexity associated with policy composition. The algorithm discussed in Section 6.1 computes policy graph with 37% less latency compared to similar research works that perform policy graph composition SICS [9] and PGA [7]. 2) Our framework OOPC identifies object oriented dependencies at infrastructure level between Open-Flow rules -Inheritance, Polymorphism, Aggregation, and Composition. ...

SICS: Secure In-Cloud Service Function Chaining