Archives

Robust and Resilient Federated Learning for Securing Future Networks

  • June 7, 2022
  • Comments off

Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicability of FL for securing […]

Read More

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

  • June 7, 2022
  • Comments off

Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also […]

Read More

LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN

  • May 16, 2022
  • Comments off

The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant’s identity who attempts to connect his wireless device to an access point (AP) […]

Read More

Security enhanced Emergency Situation Detection System for Ambient Assisted LivingSystem for Ambient Assisted Living

Typical wearable devices use a dedicated mobile phone as relay node to transfer the collected sensor data toa server. However, such relay nodes can be faulty or inactive due to various reasons, leading to interruptions of the communication link. To mitigate this challenge, we propose anovel security-enhanced emergency situation detection system, where 3rd party unknown […]

Read More

AI and 6G security: Opportunities and challenges

  • June 8, 2021
  • Comments off

While 5G is well-known for network cloudification with micro-service based architecture, the next generation networks or the 6G era is closely coupled with intelligent network orchestration and management. Hence, the role of Artificial Intelligence (AI) is immense in the envisioned 6G paradigm. However, the alliance between 6G and AI may also be a double-edged sword […]

Read More
MEC_Threat_Vectors

Survey on Multi-Access Edge Computing Security and Privacy

  • February 26, 2021
  • Comments off

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MECdeployments. In this paper, we analyse the security and privacy of the MEC system. We introduce […]

Read More

A survey on mobile augmented reality with 5G mobile edge computing: architectures, applications, and technical aspects

  • February 25, 2021
  • Comments off

The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated communication infrastructure, Mobile Augmented Reality (MAR) applications are gaining increased popularity. MAR allows users to run AR applications on […]

Read More

Secure and user efficient eap-based authentication protocol for ieee 802.11 wireless lans

  • December 10, 2020
  • Comments off

Wireless Local Area Networks (WLANs) have experienced significant growth in the last two decades due to the extensive use of wireless devices. Security (especially authentication) is a staple concern as the wireless medium is accessible to everybody. Extensible Authentication Protocol (EAP) is thewidely used authentication framework in WLANs to secure communication. The authentication mechanism designed […]

Read More
Security Considerations for IoT

Security Considerations for Internet of Things: A Survey

  • July 5, 2020
  • Comments off

Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-everything. However, the security of these connected Internet of things […]

Read More
Dynamic Orchestration of Fog Nodes

Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT

  • June 7, 2020
  • Comments off

Fog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and adaptability. Out of the various 5G based services […]

Read More