2012 Eur. Workshop Softw. Defined Netw. (EWSDN), Publ., 2012,
pp. 109–133.
[137] B.-Y. Ke, P.-L. Tien, and Y.-L. Hsiao, “Identity-based cryptography for
securing mobile phone calls,” in Proc. Int. Conf. Adv. Inf. Netw. Appl.
Workshops, 2013, pp. 217–218.
[138] S. Gutz, A. Story, C. Schlesinger, and N. Foster, “Splendid isolation: A
slice abstraction for software-defined networks,” in Proc. 1st Workshop
Hot Topics Softw. Defined Netw. (HotSDN’12). ACM, New York, NY,
USA, 2012, pp. 79–84.
[139] K. Pentikousis, Y. Wang, and W. Hu, “MobileFlow: Toward software-
defined mobile networks,” Commun. Mag., IEEE, vol. 51, no. 7, pp. 44–
53, Jul. 2013.
[140] T. Luo, H.-P. Tan, P. C. Quan, Y. W. Law, and J. Jin, “Enhancing respon-
siveness and scalability for OpenFlow networks via control-message
quenching,” in Proc. Int. Conf. CT Convergence (ICTC), Oct. 15–17,
2012, pp. 348–353.
[141] Y. Kanizo, D. Hay, and I. Keslassy, “Palette: Distributing tables in
software-defined networks,” in Proc. IEEE INFOCOM, Apr. 14–19,
2013, pp. 545–549.
[142] Y. Hu, W. Wang, X. Gong, X. Que, and S. Cheng, “BalanceFlow:
Controller load balancing for OpenFlow networks,” in Proc. IEEE 2nd
Int. Conf. Cloud Comput. Intell. Syst. (CCIS), Oct./Nov. 2012, vol. 2,
pp. 780–785.
[143] J. Biswas et al., “The IEEE P1520 standards initiative for programmable
network interfaces,” IEEE Commun. Mag., vol. 36, no. 10, pp. 64–70,
Oct. 1998.
[144] A. Doria et al., Forwarding and Control Element Separation (ForCES)
Protocol Specification. [Online]. Available: http://tools.ietf.org/html/
rfc5810
[145] T. V. Lakshman, T. Nandagopal, R. Ramjee, K. Sabnani, and T. Woo,
“The SoftRouter Architecture,” in Proc. ACM SIGCOMM Workshop Hot
Topics Netw., 2004, pp. 1–6.
[146] On the Difference Between Security and Safety: A Reference Answer
is Provided in WiKi. [Online]. Available: http://wiki.answers.com/Q/
1_Explain_the_difference_between_safety_and_security?#slide=1
Fei Hu received the Ph.D. degree in signal pro-
cessing from Tongji University, Shanghai, China, in
1999 and the Ph.D. degree in electrical and computer
engineering from Clarkson University, New York,
NY, USA, in 2002. He is currently an Associate
Professor with the Department of Electrical and
Computer Engineering, The University of Alabama,
Tuscaloosa, AL, USA. He has published over 150
journal/conference papers and book (chapters). His
research has been supported by the U.S. NSF, Cisco,
Sprint, and other sources. His research interests in-
clude cyber-physical system security and medical security issues; intelligent
signal processing, such as using machine learning algorithms to process sensing
signals; and issues on wireless sensor network design.
Qi Hao received the B.E. and M.E. degrees from
Shanghai Jiao Tong University, Shanghai, China, in
1994 and 1997, respectively, and the Ph.D. degree
from Duke University, Durham, NC, USA, in 2006,
all in electrical engineering. His postdoctoral training
in the Center for Visualization and Virtual Environ-
ment, The University of Kentucky, Lexington, KY,
USA was focused on 3-D computer vision for human
tracking and identification. From 2007 to 2014, he
was an Assistant Professor with the Department of
Electrical and Computer Engineering, The Univer-
sity of Alabama, Tuscaloosa, AL, USA. He is currently an Associate Professor
with South University of Science and Technology of China, Shenzhen, China.
His research has been supported by the U.S. NSF and other sources. His current
research interests include smart sensors, intelligent wireless sensor networks,
and distributed information processing.
Ke Bao is currently working toward the Ph.D. degree
in the Department of Electrical and Computer En-
gineering, The University of Alabama, Tuscaloosa,
AL, USA. His research interests include wireless
networks, multimedia QoS, and wireless test beds.