Archives

A Federated Learning Approach for Improving Security in Network Slicing

  • November 17, 2023
  • Comments off

Network Slicing (NS) is a predominant technology in future telecommunication networks, including Fifth Generation (5G), which supports the realization of heterogeneous applications and services. It allows the allocation of a dedicated logical network slice of the physical network to each application. Security is one of the paramount challenges in an NS ecosystem. Several technologies, including […]

Read More

Security Orchestration Framework for Federated Network Slicing

  • November 17, 2023
  • Comments off

Network slicing is a utilitarian technology in future mobile networks that can facilitate heterogeneous network requirements of a plethora of applications over a shared physical network cost-effectively. Federated slicing, an extension of conventional network slicing, allows network services across multiple administrative domains in a seamless manner. Management of security operations in such a system is […]

Read More

Realizing Internet of Things with Network Slicing: Opportunities and Challenges

  • November 17, 2023
  • Comments off

Internet of Things (IoT) is a lucrative technology within the modern community that realizes the concept of the smart world, by expanding within a myriad of applications. Existing wireless networks require a radical change to fulfill the network requirements and cater the rapid expansion of the IoT ecosystem. 5G architecture is specifically designed to facilitate […]

Read More

The Role of Security Orchestrator in Network Slicing for Future Networks

  • November 17, 2023
  • Comments off

The traditional paradigm of connecting mobile devices over the telecommunication networks for voice communication has evolved to a myriad of novel applications with heterogeneous network requirements. The conventional telecom-munication networks require a radical change to support these applications. Network Slicing (NS) is one of the utilitarian technologies in future telecommunication networks to address this challenge […]

Read More

A Novel Network Slicing based Security-as-a-Service (SECaaS) Framework for Private 5G Networks

  • November 17, 2023
  • Comments off

Fifth Generation (5G) and beyond telecommunication networks introduce a set of novel technologies such as private 5G networks, also known as Local 5G Operator (L5GO), and Network Slicing (NS) for the realization of diverse novel applications with heterogeneous network requirements. Among other network-level requirements, security is a critical challenge in L5GO networks. Facilitating the security […]

Read More

Need of 6G for the Metaverse Realization

  • December 1, 2022
  • Comments off

The concept of the Metaverse aims to bring a fully-fledged extended reality environment to provide next generation applications and services. Development of the Metaverse is backed by many technologies, including, 5G, artificial intelligence, edge computing and extended reality. The advent of 6G is envisaged to mark a significant milestone in the development of the Metaverse, […]

Read More

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

  • June 7, 2022
  • Comments off

Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also […]

Read More
MEC-Enabled_Factros_for_Service_Migration

Identifying Factors Enabling the Enhancement of
Service Migration of Multi-Access Edge Computing

  • June 8, 2021
  • Comments off

Edge computing is a novel concept proposed to overcome the limitations of the prevailing cloud-based telecommunication networks. Various concepts have emerged with edge computing that requires proper investigation prior to deployment. Migration of services within the edge computing nodes/ base stations is an imminent aspect of the envisaged paradigm that has created a lot of […]

Read More
MEC_Threat_Vectors

Survey on Multi-Access Edge Computing Security and Privacy

  • February 26, 2021
  • Comments off

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MECdeployments. In this paper, we analyse the security and privacy of the MEC system. We introduce […]

Read More
Security Considerations for IoT

Security Considerations for Internet of Things: A Survey

  • July 5, 2020
  • Comments off

Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-everything. However, the security of these connected Internet of things […]

Read More