Skip to Main Content
  • Carleton.ca
  • About
  • Admissions
    • Undergraduate
    • Graduate
  • Academics
  • Research
  • Campus
  • Future Students
    • Undergraduate
    • Graduate
  • Current Students
    • Undergraduate
    • Graduate
  • Faculty/Staff
  • Alumni
Carleton University Carleton University shield

Next Gen LabNext Generation Networks Lab

  • Search Next Generation Networks Lab Magnifying glass
  • Browse site navigation Menu icon

Home / Projects

Projects

  • Projects
  • Publications
  • People
  • Gallery
  • News
  • Contact

Monday, July 21, 2025

LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling

Project Description Artificial Intelligence (AI) is expected to be an integral part of next-generation AI-native 6G networks. With the prevalence of AI, researchers have identified numerous use cases of AI in network security. However, there are almost nonexistent studies that analyze the suitability of Large Language Models (LLMs) in network... More

Saturday, December 28, 2024

Analysis of Adversarial Attacks in Network Security

This project enables us to demonstrate the effects of adversarial samples on deep learning-based intrusion detection systems within the context of IoT networks. Our experimental results illustrate the vulnerability of deep learning-based intrusion detection systems. It also provides a performance comparison between the feed forward neural networks... More

Wednesday, December 25, 2024

Using Machine Learning in Security and Privacy

Our group studies Machine Learning (ML) in network security (as shown in the figure below) and the security of machine learning. Below are some of our projects in this area: Machine Learning Applications in Network Security [1] Surveying Adversarial Attacks against Networks Security [1] Machine learning enhances decision support systems in network... More

Wednesday, December 18, 2024

Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study

Many organizations were forced to quickly transition to the work-from-anywhere (WFA) model to continue their operations and remain in business despite the restrictions imposed during the COVID-19 pandemic. Many decisions were made in a rush, and cybersecurity decency tools were not in place to support this transition. This project aims to evaluate... More

Wednesday, December 11, 2024

Routing Protocol for Low Power and Lossy Networks (RPL) – Projects

Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the routing protocol for low power and lossy networks (RPL) incorporates three security modes to protect the integrity and confidentiality of the routing process: 1) the unsecured mode (UM); 2)... More

Sunday, December 1, 2024

Investigating QUIC’s Suitability for the Internet of Things

Investigating QUIC's Suitability for the Internet of Things QUIC is a connection-oriented, stateful, and flow-controlled transport protocol. Instead of identifying connections with IP addresses and port numbers, unique connection IDs are used -- allowing for connections to persist after network changes or address re-mappings. QUIC packets consist... More

Wednesday, November 20, 2024

Privacy in IoT Systems

Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart Home (SH) systems is essential, however, more research is needed in analyzing and evaluation of privacy threats for effective risk management. Although there has been some research on privacy in... More

Friday, November 1, 2024

Securing 5G Using Slice Isolation

We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:  Security Analysis of Critical 5G Interfaces  In this work, we investigate the interfaces-specific security recommendations presented by most active Standardization Development Organizations (SDOs), analyze the... More

Friday, May 28, 2021

Secure 5G Core Network Slicing in Support of IoT Application

      The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting networking performance requirements. These services will also require flexible and agile deployment. 5G networks, an essential component of future virtualized infrastructures, deal with this issue... More

Friday, May 28, 2021

Resource augmentation in Mobile Cloud Computing

    In this research, we address resourced-constrained mobile devices’ ability to get computing support from external sources. This could enhance the performance of their applications and extend their battery life by resource augmentation techniques where more powerful computing sources support the mobile devices. We investigate this... More

Friday, May 28, 2021

Location Verification on the Internet

  This research aims at verifying location claims of Internet clients. A wide spectrum of location-sensitive Internet applications could benefit from verifying location assertions. To that end, we designed Client Presence Verification (CPV), a delay-based mechanism by which a location assertion could be verified to a certain degree of... More

Friday, May 28, 2021

Adaptive SDN Controllers

    In this project, we introduce the use of adaptive controllers into software-defined networking (SDN), and propose the use of adaptive consistency models in the context of distributed SDN controllers. These adaptive controllers can tune their own configurations in real-time in order to enhance the performance of the applications... More

Load More →

Share: Twitter, Facebook
Short URL: https://carleton.ca/ngn/?p=33

  • Next Generation Networks Lab
  • Carleton University
  • 1125 Colonel By Drive
  • Ottawa, ON, K1S 5B6
Visit Carleton University Homepage
  • Privacy Policy
  • Accessibility
  • © Copyright 2025

Search

Site Menu

  • Projects
  • Publications
  • People
  • Gallery
  • News
  • Contact