Archives

Service Migration Authentication Protocol for MEC

  • December 7, 2022
  • Comments off

Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic to maintain the […]

Read More
Contactless Use Cases

Realizing Contact-less Applications with Multi-Access Edge Computing

  • March 10, 2022
  • Comments off

The entire world progression has ceased with the unexpected outbreak of the COVID-19 pandemic, and urges the requirement for contact-less and autonomous services and applications. Realizing these predominantly Internet of Things (IoT) based applications demands a holistic pervasive computinginfrastructure. In this paper, we conduct a survey to determine the possible pervasive approaches for utilizing the […]

Read More
MEC-Enabled_Factros_for_Service_Migration

Identifying Factors Enabling the Enhancement of
Service Migration of Multi-Access Edge Computing

  • June 8, 2021
  • Comments off

Edge computing is a novel concept proposed to overcome the limitations of the prevailing cloud-based telecommunication networks. Various concepts have emerged with edge computing that requires proper investigation prior to deployment. Migration of services within the edge computing nodes/ base stations is an imminent aspect of the envisaged paradigm that has created a lot of […]

Read More
MEC_Threat_Vectors

Survey on Multi-Access Edge Computing Security and Privacy

  • February 26, 2021
  • Comments off

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MECdeployments. In this paper, we analyse the security and privacy of the MEC system. We introduce […]

Read More
Novel MEC Based Approaches for Smart Hospitals to Combat COVID-19 Pandemic

Novel MEC-based Approaches for Smart Hospitals to Combat COVID-19 Pandemic

  • October 15, 2020
  • Comments off

COVID-19 or Coronavirus has thrilled the entire world population with uncertainty over their survival and well-being. The impact this pathogen has caused over the globe has been profound due to its unique transmission features; that urges for contact-less strategies to interact and treat the infected. The impending 5G mobile technology is immersing the applications that […]

Read More
Security Considerations for IoT

Security Considerations for Internet of Things: A Survey

  • July 5, 2020
  • Comments off

Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-everything. However, the security of these connected Internet of things […]

Read More
Dynamic Orchestration of Fog Nodes

Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT

  • June 7, 2020
  • Comments off

Fog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and adaptability. Out of the various 5G based services […]

Read More

Security as a Service Platform Leveraging
Multi-Access Edge Computing Infrastructure
Provisions

  • June 7, 2020
  • Comments off

The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible […]

Read More
MEC Threat Vectors

Realizing Multi-Access Edge Computing
Feasibility: Security Perspective

  • October 28, 2019
  • Comments off

Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of […]

Read More
IoT_book_chapter

Introduction to IoT Security

  • September 5, 2019
  • Comments off

In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart everything, the Internet of Things (IoT) security plays a centric role with no margin for error or shortage on supply. Securing, including the authentication of these […]

Read More