Archives

A Novel Blockchain-as-a-Service (BaaS) Platformfor Local 5G Operators

  • February 1, 2023
  • Comments off

5G is a promising technology that has the potentialto support verticals and applications such as Industrial Internetof Things IoT (IIoT), smart cities, autonomous vehicles, remotesurgeries, virtual and augmented realities, and so on. Theseverticals have a diverse set of network connectivity requirements,and it is challenging to deliver customized services for eachby using a common 5G infrastructure. […]

Read More

Proof-of-Monitoring (PoM): A Novel ConsensusMechanism for Blockchain-based Secure ServiceLevel Agreement Management

  • February 1, 2023
  • Comments off

AIn the current 5th Generation (5G) networkingparadigm, the enforcement of Service Level Agreements (SLAs)is a non-trivial measure to ensure the scope and the qual-ity of services and standards between tenants and serviceproviders (SPs). On top of this, Secure Service Level Agree-ments (SSLA) are introduced to ensure that SPs deliver themost critical and required security-related standards […]

Read More

Multi-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoT

  • February 1, 2023
  • Comments off

There is a global hype in the development of digital healthcare infrastructure to cater the massive elderly population and infectious diseases. The digital facilitation is expected to ensure the patient privacy, scalability, and data integrity on the sensitive life critical healthcare data, while aligning to the global healthcare data protection standards. The patient data sharing […]

Read More

Service Migration Authentication Protocol for MEC

  • December 7, 2022
  • Comments off

Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic to maintain the […]

Read More

An improved and provably secure symmetric-key based 5G-AKA Protocol

  • September 12, 2022
  • Comments off

One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the next generation of mobile communications but has several serious flaws such as privacy issues, vulnerability to traceability attacks, and has de-synchronization problem. To deal with these issues, An Braeken presented […]

Read More

An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices

  • July 29, 2022
  • Comments off

Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol […]

Read More

Blockchain enabled Smart Grid 2.0

  • June 8, 2022
  • Comments off

Smart Grid 2.0 (SG 2.0) architecture is envisaged to revolutionize the next generation of electricity networks. Further, it is identified as a key role player in realizing Industry 4.0, which is striving towards cyber-physical systems. Blockchain integration in next-generation smart grids has proven to be beneficial in catering to the requirements of SG 2.0, which […]

Read More

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

  • June 7, 2022
  • Comments off

Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also […]

Read More

Blockchain-based Network Slice Broker to Facilitate Factory-as-a-Service

  • May 31, 2022
  • Comments off

The novel concept of Factory-as-a-Service (FaaS) allows the agility of adapting the manufacturing process by identifying the industry’s supply chain and user requirements. To cater to FaaS, flexibility in networking and cloud services is a must. 5G network slice broker is a third-party mediator that caters to networking resource demand from clients to the service […]

Read More
Contactless Use Cases

Realizing Contact-less Applications with Multi-Access Edge Computing

  • March 10, 2022
  • Comments off

The entire world progression has ceased with the unexpected outbreak of the COVID-19 pandemic, and urges the requirement for contact-less and autonomous services and applications. Realizing these predominantly Internet of Things (IoT) based applications demands a holistic pervasive computinginfrastructure. In this paper, we conduct a survey to determine the possible pervasive approaches for utilizing the […]

Read More