Archives

Utilization of a blockchainized reputation management service for performance enhancement of Smart Grid 2.0 applications

  • February 6, 2024
  • Comments off

Blockchain has become the technology enabler in delivering modern Smart Grid 2.0 functionalities. Many services including Peer-to-Peer energy trading, distribution network management, financial settlements, and energy data management are catered through blockchain-enabled platforms. However, areas such as service quality-based pricing strategies, supply-demand balancing in distribution system to attain enhanced reliability and consumption-oriented rewarding mechanisms need […]

Read More

Rec-Def: A Recommendation-based Defence Mechanism for Privacy Preservation in Federated Learning Systems

  • November 19, 2023
  • Comments off

An emergence of attention and regulations on consumer privacy can be observed over the recent years with the ubiquitous availability of IoT systems handling personal data. Federated Learning (FL) arises as a privacy-preserved Machine Learning (ML) technique where data can be kept private within these devices without transmitting to third parties. Yet, many privacy attacks […]

Read More

The Role of Security Orchestrator in Network Slicing for Future Networks

  • November 17, 2023
  • Comments off

The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecom-munication networks require a radical change to support these applications. Network Slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge […]

Read More

A Novel Blockchain-as-a-Service (BaaS) Platformfor Local 5G Operators

  • February 1, 2023
  • Comments off

5G is a promising technology that has the potentialto support verticals and applications such as Industrial Internetof Things IoT (IIoT), smart cities, autonomous vehicles, remotesurgeries, virtual and augmented realities, and so on. Theseverticals have a diverse set of network connectivity requirements,and it is challenging to deliver customized services for eachby using a common 5G infrastructure. […]

Read More

Proof-of-Monitoring (PoM): A Novel ConsensusMechanism for Blockchain-based Secure ServiceLevel Agreement Management

  • February 1, 2023
  • Comments off

AIn the current 5th Generation (5G) networkingparadigm, the enforcement of Service Level Agreements (SLAs)is a non-trivial measure to ensure the scope and the qual-ity of services and standards between tenants and serviceproviders (SPs). On top of this, Secure Service Level Agree-ments (SSLA) are introduced to ensure that SPs deliver themost critical and required security-related standards […]

Read More

Need of 6G for the Metaverse Realization

  • December 1, 2022
  • Comments off

The concept of the Metaverse aims to bring a fully-fledged extended reality environment to provide next generation applications and services. Development of the Metaverse is backed by many technologies, including, 5G, artificial intelligence, edge computing and extended reality. The advent of 6G is envisaged to mark a significant milestone in the development of the Metaverse, […]

Read More

DROAD: Demand-aware reconfigurable optically-switched agile data center network

  • September 20, 2022
  • Comments off

We present a Demand-aware Reconfigurable Data Center Network architecture design (DROAD) with integrated fast-switching optics and space switches that allows dynamic reconfiguration and separation of intra- and inter-cluster connections. The performance analysis results show a 64% improvement in average Flow Completion Time and a significant reduction in TCP session time, as well as a reduced […]

Read More

An improved and provably secure symmetric-key based 5G-AKA Protocol

  • September 12, 2022
  • Comments off

One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the next generation of mobile communications but has several serious flaws such as privacy issues, vulnerability to traceability attacks, and has de-synchronization problem. To deal with these issues, An Braeken presented […]

Read More

A survey on the convergence of edge computing and AI for UAVs: Opportunities and challenges

  • September 1, 2022
  • Comments off

The latest 5G mobile networks have enabled many exciting Internet of Things (IoT) applications that employ unmanned aerial vehicles (UAVs/drones). The success of most UAV-based IoT applications is heavily dependent on artificial intelligence (AI) technologies, for instance, computer vision and path planning. These AI methods must process data and provide decisions while ensuring low latency […]

Read More

An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices

  • July 29, 2022
  • Comments off

Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol […]

Read More