Internet Engineering

Research Staff

  • Assoc.Prof. Youki Kadobayashi

    Assoc.Prof.
    Youki Kadobayashi

  • Assoc.Prof. Takeshi Okuda

    Assoc.Prof.
    Takeshi Okuda

  • Assist.Prof. Shigeru Kashihara

    Assist.Prof.
    Shigeru Kashihara

  • Assist.Prof. Doudou Fall

    Assist.Prof.
    Doudou Fall

E-mail {youki-k, okuda, shigeru, doudou-f }[at] is.naist.jp

Research Area

Making the internet a dependable infrastructure

Information infrastructure attack prevention and mitigation techniques

Reliable communication over mobile networks

Trusted identity management for modern applications and services

Smart responses to natural disasters via internet

Workload measurement and characterization

Acceleration of evolution toward a novel internet architecture

Wired and wireless network integration and convergence

Smart device mobility support

IPv6 transition and verification methodology

Construction and management of resilient infrastructure

Design and implementation of internet testbeds

Considering our society and the internet

Mission-critical service network creation

Information distribution based on user situation

Ambient sensing system invention

Learning effects on humanity

Internet user experience quality improvement

Key Features

The Internet has become a vital infrastructure for our daily lives. We believe the Internet has to be trustworthy and more dependable as a core component for various services and applications in our society. To this end, we explore novel architectures of the Internet to harness sustainability and to overcome the various challenges facing our society. In addition, we also consider the influence of technical innovations on humans. Our goal-oriented research employs a variety of methodologies, from the theoretical to the practical, and from simulation to demonstration.

Fig.1 Evaluation of Risk-Adaptive Authorisation Mechanism

Fig.1 Evaluation of a Risk-Adaptive Authorization Mechanism



Fig.2 Probability density functions

Fig.2 Probability density functions



Fig.3 Immobile victim's message propagation among visible victims' device and delivery to the rescuer

Fig.3 Immobile victim's message propagation among visible victims' device and delivery to the rescuer