Archives

Need of 6G for the Metaverse Realization

  • December 1, 2022
  • Comments off

The concept of the Metaverse aims to bring a fully-fledged extended reality environment to provide next generation applications and services. Development of the Metaverse is backed by many technologies, including, 5G, artificial intelligence, edge computing and extended reality. The advent of 6G is envisaged to mark a significant milestone in the development of the Metaverse, […]

Read More

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks

  • June 7, 2022
  • Comments off

Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also […]

Read More
MEC-Enabled_Factros_for_Service_Migration

Identifying Factors Enabling the Enhancement of
Service Migration of Multi-Access Edge Computing

  • June 8, 2021
  • Comments off

Edge computing is a novel concept proposed to overcome the limitations of the prevailing cloud-based telecommunication networks. Various concepts have emerged with edge computing that requires proper investigation prior to deployment. Migration of services within the edge computing nodes/ base stations is an imminent aspect of the envisaged paradigm that has created a lot of […]

Read More
MEC_Threat_Vectors

Survey on Multi-Access Edge Computing Security and Privacy

  • February 26, 2021
  • Comments off

The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MECdeployments. In this paper, we analyse the security and privacy of the MEC system. We introduce […]

Read More
Security Considerations for IoT

Security Considerations for Internet of Things: A Survey

  • July 5, 2020
  • Comments off

Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-everything. However, the security of these connected Internet of things […]

Read More
Dynamic Orchestration of Fog Nodes

Dynamic Orchestration of Security Services at Fog Nodes for 5G IoT

  • June 7, 2020
  • Comments off

Fog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and adaptability. Out of the various 5G based services […]

Read More

Security as a Service Platform Leveraging
Multi-Access Edge Computing Infrastructure
Provisions

  • June 7, 2020
  • Comments off

The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible […]

Read More
MEC Threat Vectors

Realizing Multi-Access Edge Computing
Feasibility: Security Perspective

  • October 28, 2019
  • Comments off

Internet of Things (IoT) and 5G are emerging technologies that prompt a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. To achieve these limitations, ETSI has introduced the paradigm of […]

Read More
IoT_book_chapter

Introduction to IoT Security

  • September 5, 2019
  • Comments off

In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart everything, the Internet of Things (IoT) security plays a centric role with no margin for error or shortage on supply. Securing, including the authentication of these […]

Read More