Changes between Version 8 and Version 9 of GEC25Agenda/Demos


Ignore:
Timestamp:
02/28/17 16:42:19 (7 years ago)
Author:
lnevers@bbn.com
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • GEC25Agenda/Demos

    v8 v9  
    1919== Moving Target Defense ==
    2020
    21 __Authors:__
     21__Authors:__ Minh Nguyen, Priyanka Samanta, Saptarshi Debroy  - The City University of New York
     22
     23
     24A Security demo and presentation for moving Target Defense against cyber attack.
     25
    2226
    2327== Run My Experiment on GENI ==
    2428
    25 __Authors:__
     29__Authors:__ Fraida Fund - New York University
    2630
    27 == A SDN-based Traffic Aanlysis Resistant Network (TARN) Architecture ==
    2831
    29 __Authors:__
     32GENI is used in a tremendous variety of ways, from cutting edge research on new Internet architectures, to undergraduate senior projects in distributed systems, to classroom assignments in cognitive radio design. One major advantage of GENI is the ease with which students and researchers can replicate and then extend existing experiments. This demo highlights a wide range of reproducible GENI experiments that others can build on (from the Run My Experiment on GENI blog https://witestlab.poly.edu/blog/ ).
     33
     34
     35== A SDN-based Traffic Anlysis Resistant Network (TARN) Architecture ==
     36
     37__Authors:__ Qing Wang, Geddings Barrineau, Lu Yu; Jon Oakley, Kuang-ching Wang, Richard Brooks - Clemson University
     38
     39
     40"This demo will show a prototype of an SDN-based traffic analysis resistant network architecture (TRAN). TRAN intends to explore an end-to-end network architecture that removes traffic analysis vulnerabilities by using SDN-based solutions to ""shake up"" the foundation of the Internet architecture - IP.
     41
     42One of proposed goal for TARN is to circumvent the Internet censorship without being subject to traffic analysis, by reducing the likelihood of being ""tracked"". Unlike other proxy-based solutions (e.g,. Tor, Psiphon, Decoy Routing), TARN architecture avoids forcing Internet users to trust intermediate proxy nodes. "
    3043
    3144== Demonstration of a GENI based cyber physical test bed for advanced manufacturing ==
    3245
    33 __Authors:__
     46__Authors:__ J. Cecil , Sadiq AlBuhamood - Oklahoma State University
     47
     48This demonstration will be a milestone in the area of Digital Manufacturing and involves showcasing a GENI based cyber physical framework for advanced manufacturing. This Next Internet based framework will enable globally distributed software and manufacturing resources to be accessed from different locations to accomplish a complex set of life cycle activities including design analysis, assembly planning, and simulation. The advent of the Next Internet holds the promise of ushering in a new era in Information Centric engineering and digital manufacturing activities. The focus will be on the emerging domain of micro devices assembly, which involves the assembly of micron sized parts using automated micro assembly work cells.
    3449
    3550== A Distributed Delay Minimization Approach for  Networked Control Systems in Wide-Area Power Grids ==
    3651
    37 __Authors:__
     52__Authors:__ Mohamed Rahouti, Tommy Chin, Kaiqi Xiong - University of South Florida
     53
     54As the design and deployment of an efficient wide-area communication and computing framework for large power grids remains one of the greatest challenges to harvest the gigantic volume of Phasor Measurement Units (PMUs) data in real-time, in this project, we explore and leverage Software Defined Networking (SDN) and cloud computing to address the above challenge. This poster/demo presents our efficient approaches with their GENI experimental results.
     55
    3856
    3957== Virtual Computer Networks Lab ==