Archives

Blockchain-based Roaming and Offload Service Platform for Local 5G Operators

  • February 1, 2023
  • Comments off

Local 5G Operator (L5GO) concept is one of themost prominent versatile applications of the 5G in the nearfuture. The popularity of L5GOs will trigger a greater numberof roaming and offloading events between mobile operators.However, existing static and operator-assisted roaming andoffloading procedures are inefficient for the L5GO ecosystem due topoor service quality, data privacy issues, data […]

Read More

Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT

  • February 1, 2023
  • Comments off

There is a global hype in the development of digital healthcare infrastructure to cater the massive elderly population and infectious diseases. The digital facilitation is expected to ensure the patient privacy, scalability, and data integrity on the sensitive life critical healthcare data, while aligning to the global healthcare data protection standards. The patient data sharing […]

Read More

Service Migration Authentication Protocol for MEC

  • December 7, 2022
  • Comments off

Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic to maintain the […]

Read More

Blockchain enabled Smart Grid 2.0

  • June 8, 2022
  • Comments off

Smart Grid 2.0 (SG 2.0) architecture is envisaged to revolutionize the next generation of electricity networks. Further, it is identified as a key role player in realizing Industry 4.0, which is striving towards cyber-physical systems. Blockchain integration in next-generation smart grids has proven to be beneficial in catering to the requirements of SG 2.0, which […]

Read More

Robust and Resilient Federated Learning for Securing Future Networks

  • June 7, 2022
  • Comments off

Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicability of FL for securing […]

Read More

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

  • June 7, 2022
  • Comments off

Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also […]

Read More

LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN

  • May 16, 2022
  • Comments off

The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant’s identity who attempts to connect his wireless device to an access point (AP) […]

Read More

A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain

  • February 7, 2022
  • Comments off

The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network, the 3GPP has designed an authentication and key agreement protocol, 5GAKA, to safely and stably access the mobile services. However, some recent observations indicate that 5G-AKA has numerous shortcomings such […]

Read More

AI and 6G security: Opportunities and challenges

  • June 8, 2021
  • Comments off

While 5G is well-known for network cloudification with micro-service based architecture, the next generation networks or the 6G era is closely coupled with intelligent network orchestration and management. Hence, the role of Artificial Intelligence (AI) is immense in the envisioned 6G paradigm. However, the alliance between 6G and AI may also be a double-edged sword […]

Read More

Secure and user efficient eap-based authentication protocol for ieee 802.11 wireless lans

  • December 10, 2020
  • Comments off

Wireless Local Area Networks (WLANs) have experienced significant growth in the last two decades due to the extensive use of wireless devices. Security (especially authentication) is a staple concern as the wireless medium is accessible to everybody. Extensible Authentication Protocol (EAP) is thewidely used authentication framework in WLANs to secure communication. The authentication mechanism designed […]

Read More