Archives

An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices

  • July 29, 2022
  • Comments off

Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol […]

Read More

Blockchain enabled Smart Grid 2.0

  • June 8, 2022
  • Comments off

Smart Grid 2.0 (SG 2.0) architecture is envisaged to revolutionize the next generation of electricity networks. Further, it is identified as a key role player in realizing Industry 4.0, which is striving towards cyber-physical systems. Blockchain integration in next-generation smart grids has proven to be beneficial in catering to the requirements of SG 2.0, which […]

Read More

Robust and Resilient Federated Learning for Securing Future Networks

  • June 7, 2022
  • Comments off

Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicability of FL for securing […]

Read More

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

  • June 7, 2022
  • Comments off

Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also […]

Read More

Blockchain-based Network Slice Broker to Facilitate Factory-as-a-Service

  • May 31, 2022
  • Comments off

The novel concept of Factory-as-a-Service (FaaS) allows the agility of adapting the manufacturing process by identifying the industry’s supply chain and user requirements. To cater to FaaS, flexibility in networking and cloud services is a must. 5G network slice broker is a third-party mediator that caters to networking resource demand from clients to the service […]

Read More

LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN

  • May 16, 2022
  • Comments off

The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant’s identity who attempts to connect his wireless device to an access point (AP) […]

Read More
Contactless Use Cases

Realizing Contact-less Applications with Multi-Access Edge Computing

  • March 10, 2022
  • Comments off

The entire world progression has ceased with the unexpected outbreak of the COVID-19 pandemic, and urges the requirement for contact-less and autonomous services and applications. Realizing these predominantly Internet of Things (IoT) based applications demands a holistic pervasive computinginfrastructure. In this paper, we conduct a survey to determine the possible pervasive approaches for utilizing the […]

Read More

A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain

  • February 7, 2022
  • Comments off

The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network, the 3GPP has designed an authentication and key agreement protocol, 5GAKA, to safely and stably access the mobile services. However, some recent observations indicate that 5G-AKA has numerous shortcomings such […]

Read More

Fog Computing and Blockchain-Based Security Service Architecture for 5G Industrial IoT-Enabled Cloud Manufacturing

  • February 1, 2022
  • Comments off

Recent evolution of the industrial Internet of Things empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-time process monitoring, which is renowned as cloud manufacturing (CM). However, cloud integration exposes the entire manufacturing ecosystem to a new set of […]

Read More