Archives

MEC_Threat_Vectors

Survey on Multi-Access Edge Computing Security and Privacy

  • February 26, 2021
  • Comments off

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MECdeployments. In this paper, we analyse the security and privacy of the MEC system. We introduce […]

Read More

The fight against the COVID-19 pandemic with 5G technologies

  • August 18, 2020
  • Comments off

The coronavirus disease (COVID-19) pandemic has affected the world in an unexpected manner. The human race is battling against the pandemic while schools, universities, industries, hospitals, and governments are seeking new methods and technologies to seamlessly continue their usual operations. In response, this article presents how 5G and Internet of Things (IoT) related technologies can […]

Read More
Security Considerations for IoT

Security Considerations for Internet of Things: A Survey

  • July 5, 2020
  • Comments off

Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-everything. However, the security of these connected Internet of things […]

Read More

An Emergency Situation Detection System for Ambient Assisted Living

This paper proposes “An Emergency Situation Detection System for Ambient Assisted Living (AAL)”, to support elderly people and patients with chronic conditions and potential health-related emergencies to live independently. It implements an Internet of Things (IoT) network that continuously monitors the health conditions of these people. The network includes mobile phones, to transmit the data […]

Read More
Dynamic Orchestration of Fog Nodes

Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT

  • June 7, 2020
  • Comments off

Fog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and adaptability. Out of the various 5G based services […]

Read More

Security as a Service Platform Leveraging
Multi-Access Edge Computing Infrastructure
Provisions

  • June 7, 2020
  • Comments off

The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible […]

Read More
IoT_book_chapter

Introduction to IoT Security

  • September 5, 2019
  • Comments off

In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart everything, the Internet of Things (IoT) security plays a centric role with no margin for error or shortage on supply. Securing, including the authentication of these […]

Read More