{"id":33,"date":"2022-09-19T12:12:05","date_gmt":"2022-09-19T16:12:05","guid":{"rendered":"https:\/\/carleton.ca\/ngn\/?page_id=33"},"modified":"2025-08-27T16:11:59","modified_gmt":"2025-08-27T20:11:59","slug":"projects","status":"publish","type":"page","link":"https:\/\/carleton.ca\/ngn\/projects\/","title":{"rendered":"Projects"},"content":{"rendered":"<section class=\"content-wrapper content-wrapper--shortcode\"><div class=\"u-post-reload\"><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2025\/llm-stride\/\"><p class=\"news__date news__date--archive\">Monday, July 21, 2025<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">LLMs\u2019 Suitability for Network Security: A Case Study of STRIDE Threat Modeling<\/h3><p class=\"news__excerpt news__excerpt--archive\">Project Description Artificial Intelligence (AI) is expected to be an integral part of next-generation AI-native 6G networks. With the prevalence of AI, researchers have identified numerous use cases of AI in network security. However, there are almost nonexistent studies that analyze the suitability of Large Language Models (LLMs) in network... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/analysis-of-adversarial-attacks-in-network-security\/\"><p class=\"news__date news__date--archive\">Saturday, December 28, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Analysis of Adversarial Attacks in Network Security<\/h3><p class=\"news__excerpt news__excerpt--archive\">This project enables us to demonstrate the effects of adversarial samples on deep learning-based intrusion detection systems within the context of IoT networks. Our experimental results illustrate the vulnerability of deep learning-based intrusion detection systems. It also provides a performance comparison between the feed forward neural networks... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/machine-learning-projects\/\"><p class=\"news__date news__date--archive\">Wednesday, December 25, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Using Machine Learning in Security and Privacy<\/h3><p class=\"news__excerpt news__excerpt--archive\">Our group studies Machine Learning (ML) in network security (as shown in the figure below) and the security of machine learning. Below are some of our projects in this area: Machine Learning Applications in Network Security [1] Surveying Adversarial Attacks against Networks Security [1] Machine learning enhances decision support systems in network... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/cybersecurity-challenge-analysis-of-work-from-anywhere-wfa-and-recommendations-guided-by-a-user-study\/\"><p class=\"news__date news__date--archive\">Wednesday, December 18, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Cybersecurity Challenge Analysis of Work-from-Anywhere (WFA) and Recommendations guided by a User Study<\/h3><p class=\"news__excerpt news__excerpt--archive\">Many organizations were forced to quickly transition to the work-from-anywhere (WFA) model to continue their operations and remain in business despite the restrictions imposed during the COVID-19 pandemic. Many decisions were made in a rush, and cybersecurity decency tools were not in place to support this transition. This project aims to evaluate... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/routing-protocol-for-low-power-and-lossy-networks-rpl-_-projects\/\"><p class=\"news__date news__date--archive\">Wednesday, December 11, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Routing Protocol for Low Power and Lossy Networks (RPL) &#8211; Projects<\/h3><p class=\"news__excerpt news__excerpt--archive\">Securing RPL Using Network Coding: The Chained Secure Mode (CSM) Considered the preferred routing protocol for many Internet of Things (IoT) networks, the routing protocol for low power and lossy networks (RPL) incorporates three security modes to protect the integrity and confidentiality of the routing process: 1) the unsecured mode (UM); 2)... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/investigating-quics-suitability-for-the-internet-of-things\/\"><p class=\"news__date news__date--archive\">Sunday, December 1, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Investigating QUIC&#8217;s Suitability for the Internet of Things<\/h3><p class=\"news__excerpt news__excerpt--archive\">Investigating QUIC&#039;s Suitability for the Internet of Things QUIC is a connection-oriented, stateful, and flow-controlled transport protocol. Instead of identifying connections with IP addresses and port numbers, unique connection IDs are used -- allowing for connections to persist after network changes or address re-mappings. QUIC packets consist... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/privacy-engineering-in-smart-home-sh-systems-a-comprehensive-privacy-threat-analysis-and-risk-management-approach\/\"><p class=\"news__date news__date--archive\">Wednesday, November 20, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Privacy in IoT Systems<\/h3><p class=\"news__excerpt news__excerpt--archive\">Privacy Engineering in Smart Home (SH) Systems: A Comprehensive Privacy Threat Analysis and Risk Management Approach Addressing privacy concerns in Smart Home (SH) systems is essential, however, more research is needed in analyzing and evaluation of privacy threats for effective risk management. Although there has been some research on privacy in... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2024\/securing-5g-using-slice-isolation\/\"><p class=\"news__date news__date--archive\">Friday, November 1, 2024<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Securing 5G Using Slice Isolation<\/h3><p class=\"news__excerpt news__excerpt--archive\">We study the security of 5G mobile networks and securing 5G using slice isolation. Following are our recent projects on 5G security:\u00a0 Security Analysis of Critical 5G Interfaces\u00a0 In this work, we investigate the interfaces-specific security recommendations presented by most active Standardization Development Organizations (SDOs), analyze the... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2021\/secure-5g-core-network-slicing-in-support-of-iot-application\/\"><p class=\"news__date news__date--archive\">Friday, May 28, 2021<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Secure 5G Core Network Slicing in Support of IoT Application<\/h3><p class=\"news__excerpt news__excerpt--archive\">&nbsp; &nbsp; &nbsp; The key motivation for this work is that future smart services (e.g. IoT applications) will have competing and perhaps conflicting networking performance requirements. These services will also require flexible and agile deployment. 5G networks, an essential component of future virtualized infrastructures, deal with this issue... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2021\/resource-augmentation-in-mobile-cloud-computing\/\"><p class=\"news__date news__date--archive\">Friday, May 28, 2021<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Resource augmentation in Mobile Cloud Computing<\/h3><p class=\"news__excerpt news__excerpt--archive\">&nbsp; &nbsp; In this research, we address resourced-constrained mobile devices\u2019 ability to get computing support from external sources. This could enhance the performance of their applications and extend their battery life by resource augmentation techniques where more powerful computing sources support the mobile devices. We investigate this... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2021\/location-verification-on-the-internet\/\"><p class=\"news__date news__date--archive\">Friday, May 28, 2021<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Location Verification on the Internet<\/h3><p class=\"news__excerpt news__excerpt--archive\">&nbsp; This research aims at verifying location claims of Internet clients. A wide spectrum of location-sensitive Internet applications could benefit from verifying location assertions. To that end, we designed Client Presence Verification (CPV), a delay-based mechanism by which a location assertion could be verified to a certain degree of... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><div class=\"news news--archive u-width-limited\"><a class=\"news__link  news__link--archive\" href=\"https:\/\/carleton.ca\/ngn\/2021\/adaptive-sdn-controllers\/\"><p class=\"news__date news__date--archive\">Friday, May 28, 2021<\/p><h3 class=\"news__heading u-hide-in-toc news__heading--archive\" rel=\"bookmark\">Adaptive SDN Controllers<\/h3><p class=\"news__excerpt news__excerpt--archive\">&nbsp; &nbsp; In this project, we introduce the use of adaptive controllers into software-defined networking (SDN), and propose the use of adaptive consistency models in the context of distributed SDN controllers. These adaptive controllers can tune their own configurations in real-time in order to enhance the performance of the applications... <span class=\"news__more-link\">More<\/span><\/p><\/a><\/div><\/div><div class=\"button button--news button--more\"><a class=\"load-more button__red button__red--outline\"\n\t\t\t\tdata-numposts=\"12\"\n\t\t\t\tdata-offset=\"12\"\n\t\t\t\tdata-selector=\"blog\" data-catid=\"23\"\n\t\t\t\tdata-nonce=\"6e7bf60064\"\n\t\t\t\tdata-thumbnail=\"false\">Load More &rarr;<\/a><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_mi_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Projects - Next Generation Networks Lab<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/carleton.ca\/ngn\/projects\/\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/carleton.ca\/ngn\/projects\/\",\"url\":\"https:\/\/carleton.ca\/ngn\/projects\/\",\"name\":\"Projects - Next Generation Networks Lab\",\"isPartOf\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\"},\"datePublished\":\"2022-09-19T16:12:05+00:00\",\"dateModified\":\"2025-08-27T20:11:59+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/carleton.ca\/ngn\/projects\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/carleton.ca\/ngn\/projects\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/carleton.ca\/ngn\/projects\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/carleton.ca\/ngn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Projects\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/carleton.ca\/ngn\/#website\",\"url\":\"https:\/\/carleton.ca\/ngn\/\",\"name\":\"Next Generation Networks Lab\",\"description\":\"Carleton University\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/carleton.ca\/ngn\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Projects - Next Generation Networks Lab","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/carleton.ca\/ngn\/projects\/","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/carleton.ca\/ngn\/projects\/","url":"https:\/\/carleton.ca\/ngn\/projects\/","name":"Projects - Next Generation Networks Lab","isPartOf":{"@id":"https:\/\/carleton.ca\/ngn\/#website"},"datePublished":"2022-09-19T16:12:05+00:00","dateModified":"2025-08-27T20:11:59+00:00","breadcrumb":{"@id":"https:\/\/carleton.ca\/ngn\/projects\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/carleton.ca\/ngn\/projects\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/carleton.ca\/ngn\/projects\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/carleton.ca\/ngn\/"},{"@type":"ListItem","position":2,"name":"Projects"}]},{"@type":"WebSite","@id":"https:\/\/carleton.ca\/ngn\/#website","url":"https:\/\/carleton.ca\/ngn\/","name":"Next Generation Networks Lab","description":"Carleton University","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/carleton.ca\/ngn\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"acf":{"banner_image_type":"none","banner_button":"no","banner_hosted_image":"eng-electrical","banner_opacity":"default"},"_links":{"self":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages\/33"}],"collection":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":3,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages\/33\/revisions"}],"predecessor-version":[{"id":912,"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/pages\/33\/revisions\/912"}],"wp:attachment":[{"href":"https:\/\/carleton.ca\/ngn\/wp-json\/wp\/v2\/media?parent=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}