Archives

Rec-Def: A Recommendation-based Defence Mechanism for Privacy Preservation in Federated Learning Systems

  • November 19, 2023
  • Comments off

An emergence of attention and regulations on consumer privacy can be observed over the recent years with the ubiquitous availability of IoT systems handling personal data. Federated Learning (FL) arises as a privacy-preserved Machine Learning (ML) technique where data can be kept private within these devices without transmitting to third parties. Yet, many privacy attacks […]

Read More

From Opacity to Clarity: Leveraging XAI for Robust Network Traffic Classification

  • November 19, 2023
  • Comments off

A wide adoption of Artificial Intelligence (AI) can be observed in recent years over networking to provide zero-touch, full autonomy of services towards the next generation Beyond 5G (B5G)/6G. However, AI-driven attacks on these services are a major concern in reaching the full potential of this future vision. Identifying how resilient the AI models are […]

Read More

Privacy-preserved Collaborative Federated Learning Platform for Industrial Internet of Things

  • November 19, 2023
  • Comments off

Federated learning (FL) is an intriguing approach to privacy-preserving collaborative learning. Decentralised FL is achieving increased favour for investigation due to the mitigation of vulnerability for a single point of failure and more controllability for end users over their models. However, many existing decentralised FL systems face limitations, such as privacy concerns, latency in aggregation, […]

Read More

FL-TIA: Novel Time Inference Attacks on Federated Learning

  • November 19, 2023
  • Comments off

Federated Learning (FL) is an emerging privacy-preserved distributed Machine Learning (ML) technique where multiple clients can contribute to training an ML model without sharing private data. Even though FL offers a certain level of privacy by design, recent works show that FL is vulnerable to numerous privacy attacks. One of the key features of FL […]

Read More

A Federated Learning Approach for Improving Security in Network Slicing

  • November 17, 2023
  • Comments off

Network Slicing (NS) is a predominant technology in future telecommunication networks, including Fifth Generation (5G), which supports the realization of heterogeneous applications and services. It allows the allocation of a dedicated logical network slice of the physical network to each application. Security is one of the paramount challenges in an NS ecosystem. Several technologies, including […]

Read More

Service Migration Authentication Protocol for MEC

  • December 7, 2022
  • Comments off

Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic to maintain the […]

Read More

An improved and provably secure symmetric-key based 5G-AKA Protocol

  • September 12, 2022
  • Comments off

One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the next generation of mobile communications but has several serious flaws such as privacy issues, vulnerability to traceability attacks, and has de-synchronization problem. To deal with these issues, An Braeken presented […]

Read More

A survey on the convergence of edge computing and AI for UAVs: Opportunities and challenges

  • September 1, 2022
  • Comments off

The latest 5G mobile networks have enabled many exciting Internet of Things (IoT) applications that employ unmanned aerial vehicles (UAVs/drones). The success of most UAV-based IoT applications is heavily dependent on artificial intelligence (AI) technologies, for instance, computer vision and path planning. These AI methods must process data and provide decisions while ensuring low latency […]

Read More

An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices

  • July 29, 2022
  • Comments off

Several symmetric and asymmetric encryption based authentication protocols have been developed for the wireless local area networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced security, a lightweight extensible authentication protocol based authentication protocol […]

Read More