#contents
  • *Description [#l559cfa5]
  • In this group, we research technologies to create stable, inexpensive, safe, and secure ubiquitous networking environments in which all objects contain networking functions and Internet connectivity is available everywhere.
  1. We research technologies to create stable, inexpensive, safe, and secure ubiquitous networking environments in which all objects contain networking functions and Internet connectivity is available everywhere.
    *Research Topics [#n4476362]
  • + Application of IPv6 for higher-reliability, higher-performance Internet:
  • IPv6 is one of the basic technologies in the next-generation Internet and represents an expansion (2^128) in the address space to distinguish among network terminals. We use this address space and multihoming to develop more reliable technologies. mobile technologies, and automatic terminal and router setup technologies.
  • (Application) Internet appliances, Internet mobile telephones, Internet broadcasting
  • +Real-time transmission of multimedia stream data:
  • The Internet is a "best-effort" service. Real-time transmission of high-quality video, and other multimedia data requires guaranteed quality of service at the IP level based on resource-reservation protocols, error correction codes, and path diversity. We develop multimedia stream distribution systems to support this.
  • (Application) High-resolution IP transmission systems, IP wireless cameras and microphones
  • +Design and analysis of algorithms addressing Internet issues:
  • We develop high-performance algorithms required to build and operate the Internet. The Group is noted for its results in the design and analysis of online algorithms (algorithms that make decision before the whole input is given) for router buffer management.
  • (Application) Routing algorithms, router buffer management
  • +Privacy protection and intrusion prevention in INternet communications:
  • We develop, apply, and deploy secure protocols using encoding electronic certificates, and other technologies to guarantee the mutual exchange of the minimum required information when communicating with unknown counterparties on the Internet so as to prevent the counterparty from using information in an illicit manner.
  • (Application) Location privacy, electronic watermarks, network gaming, coordinated web authentication
  • +Informationization of e-power flows:
  • We work for applying information communication technology to on-demand power networks. we develop technology for applying Internet protocols, such as routing and resource reservation, to power networks. We also develop electrical power switching technology and implement it.
  • (Application) Automatic energy saving
  • //#edited by oogami 2011.4.8
  1. **Network Architecture for Sustainable Improvement of the Internet [#r2861047]
  2. We develop technologies to flexibly modify logical design of networks and network control mechanisms using Software Defined Networking (SDN) and programmable networking technologies like P4 and XDP, and scalable middleboxes with Edge Computing, Network Functions Virtualization (NFV) and software running on commodity servers.
  3. - (Applications) Automatic network configuration and operation management system, cloud computing
  4. **Network Security [#s22d4fa6]
  5. We continuously collect attacks towards darknet (unused IP addresses), honeypots (servers that imitate legitimate services to collect attack activities), and normal servers, and develop technologies to analyze them. In addition, we use cyber threat information for the analysis. We seek to use the results of the analysis for dynamically implementing security measures.
  6. - (Application) Attack trend understanding and prediction, Automation and optimization of security measures
  7. **Trust and privacy protection in Internet communications [#d410be26]
  8. We develop, apply, and deploy secure protocols using encryption, digital signature, and other technologies to guarantee mutual exchange of the minimum required information when communicating with unknown counterparties on the Internet so as to prevent the counterparty from using the information in an illicit manner.
  9. - (Application) Single Sign-On, CAPTCHA, online games, Zero Trust Network
  10. **On-demand power networks [#i0c0144f]
  11. We work for applying information communication technology to on-demand power networks. We develop technology for applying Internet protocols, such as routing and resource reservation, to power networks. We also develop technology for electrical power packet and implement it.
  12. - (Application) Smart energy management
  13. **Algorithm design and computational complexity [#v9956e82]
  14. We develop algorithms for combinatorial decision/optimization problems, such as graph problems and constraint satisfaction problems. We also evaluate algorithms empirically by implementation and experiments, and theoretically from standpoint of approximation algorithms, online algorithms, and mechanism design. We also study computational complexity of problems in terms of NP-completeness, inapproximability, etc.
  15. - (Application) Stable matching, lab assignment, time-tabling, routing, buffer management