Now showing 1 - 10 of 53
- PublicationReliable Control and Data Planes for Softwarized NetworksDriven by the requirement of increasing performance and flexibility, networks are being softwarized by paradigms such as software-defined networking (SDN) and network function virtualization (NFV). These solutions reduce the complexity and the specialization of hardware devices, by extracting the inherently distributed control plane of forwarding network elements such as switches and routers, to a logically centralized control plane (referred as controller in SDN). The control plane acts as a broker between the network applications (e.g. monitoring, traffic engineering) and the data plane (i.e. physical network infrastructure). For scalability and robustness, the logically centralized control plane is implemented by physically distributing different controllers throughout the network. This chapter presents different solutions to increase the reliability of both planes: data and control planes. The reliability of the data plane can be increased by considering survivable virtual network embedding solutions. This chapter proposes a survivable embedding against single and double failures at either links or nodes. Furthermore, in order to provide a programmable and resilient data plane, BPFabric has been proposed for SDN which supports high performance functions suitable for detecting attacks. On the other hand, the reliability of the control plane applied to SDN can be addressed by considering enhanced controller placement solutions providing redundancy against uncorrelated as well as targeted failures while coping with latency and capacity requirements. Furthermore, a solution to increase the security and robustness of the control channel is also addressed in this chapter.
- Publication6G Security Challenges and Potential SolutionsAlthough the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless systems with the possible challenges and potential solutions. Especially, we discuss the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including distributed ledger technologies, physical layer security, distributed artificial intelligence (AI)/ machine learning (ML), Visible Light Communication (VLC), THz bands, and quantum communication
Scopus© Citations 59 20
- PublicationAGE: authentication in gadget-free healthcare environmentsMobile and sensor related technologies are significantly revolutionizing the medical healthcare sectors. In current healthcare systems, gadgets are the prominent way of acquiring medical services. However, the recent technological advancements in smart and ambient environments are offering users new ways to access the healthcare services without using any explicit gadgets. One of the key challenges in such gadget-free environments is performing secure user authentication with the intelligent surroundings. For example, a secure, efficient and user-friendly authentication mechanism is essential for elderly/disabled people or patients in critical conditions requiring medical services. Hence, modern authentication systems should be sophisticated enough to identify such patients without requiring their physical efforts or placing gadgets on them. This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment. We performed formal security verification of our proposed scheme using CDVT/AD tool and our results indicate that the proposed scheme is secure for such smart and gadget-free environments. We verify that the proposed scheme can resist against various well-known security attacks. Moreover, the proposed system showed better performance as compared with existing biometrics base remote user authentication schemes.
- PublicationProxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchainData is central to the Internet of Things (IoT) ecosystem. With billions of devices connected, most of the current IoT systems are using centralized cloud-based data sharing systems, which will be difficult to scale up to meet the demands of future IoT systems. The involvement of such a third-party service provider requires also trust from both the sensor owner and sensor data user. Moreover, fees need to be paid for their services. To tackle both the scalability and trust issues and to automatize the payments, this paper presents a blockchain-based marketplace for sharing of the IoT data. We also use a proxy re-encryption scheme for transferring the data securely and anonymously, from data producer to the consumer. The system stores the IoT data in cloud storage after encryption. To share the collected IoT data, the system establishes runtime dynamic smart contracts between the sensor and data consumer without the involvement of a trusted third-party. It also uses a very efficient proxy re-encryption scheme which allows that the data is only visible by the owner and the person present in the smart contract. This novel combination of smart contracts with proxy re-encryption provides an efficient, fast and secure platform for storing, trading and managing sensor data. The proposed system is implemented using off-the-shelf IoT sensors and computer devices. We also analyze the performance of our hybrid system by using the permission-less Ethereum blockchain and compare it to the IBM Hyperledger Fabric, a permissioned blockchain.
Scopus© Citations 68 357
- PublicationBlockchain-Based Wi-Fi Offloading Platform for 5GThe advent of 5G has sparked interest in Wi-Fi offloading techniques that enable efficient resource sharing and congestion management of wireless communication spectrum. However, offloading data between multiple networks (i.e. service providers) requires costly inter-provider communication which has a substantial overhead as well as high offloading latency. Moreover, involvement of the profit-oriented decision making of service providers has an inherent weakness of unfair scheduling among users and networks. To overcome those problems, this research work proposes a holistic framework similar to an online data market place where existing infrastructure can be used to set up Wi-Fi zones that everyone can use from their own data plan irrespective of the network operators they belong to. First, our proposed architecture improves the efficacy of offloading by using decentralized nature of the emerging Software-Defined Networking (SDN) to set up an operator-assisted data offloading platform, resulting in efficient inter-provider communication. Second, our proposal strengthens the fair scheduling of offloading resources by using blockchain technology to initiate unbiased and independent decision making. The resulting service is a rating system for the sellers to make reliable transactions for payments.
227Scopus© Citations 7
- PublicationDriving forces for Multi-Access Edge Computing (MEC) IoT integration in 5GThe emergence of Multi-Access Edge Computing (MEC) technology aims to extend cloud computing capabilities to the edge of the wireless access networks, i.e., closer to the end-users. Thus, MEC-enabled 5G wireless systems are envisaged to offer real-time, low-latency, and high-bandwidth access to the radio network resources. Thus, MEC allows network operators to open up their networks to a wide range of innovative services, thereby giving rise to a brand-new ecosystem and a value chain. Furthermore, MEC as an enabling technology will provide new insights into coherent integration of Internet of Things (IoT) in 5G wireless systems. In this context, this paper expounds the four key technologies, including Network Function Virtualization (NFV), Software Defined Networking (SDN), Network Slicing and Information Centric Networking (ICN), that will propel and intensify the integration of MEC IoT in 5G networks. Moreover, our goal is to provide the close alliance between MEC and these four driving technologies in the 5G IoT context and to identify the open challenges, future directions, and concrete integration paths.
Scopus© Citations 55 13
- PublicationEnabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVsThe proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing the capabilities of sensor networks. In this paper, we introduce a system model that enables end-to-end secure connectivity between low-power IoT devices and UAVs, that helps to manage the data processing tasks of heterogeneous wireless sensor networks. The performance of proposed solution is analyzed by using simulation results. Moreover, in order to demonstrate the practical usability of the proposed solution, the prototype implementation is presented using commercial off-the-shelf devices.
Scopus© Citations 11 343
- PublicationEmerging Directions for Blockchainized 6GThe next generation of mobile networks, i.e., sixth generation (6G), is expected by 2030, with already burgeoning research efforts towards this goal. Along with various other candidate technologies, blockchain is envisioned to enable and enhance numerous key functionalities of 6G. Thus, the main objective of this paper is threefold: 1) to categorize the different aspects of 6G into four emerging directions that anticipate significant advancements leveraging blockchain, 2) to discuss the potential role of blockchainized 6G under each key emerging direction, 3) to expound on the technical challenges in blockchaining 6G along with possible solutions.
129Scopus© Citations 4
- PublicationDynamic Orchestration of Security Services at Fog Nodes for 5G IoTFog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and adaptability. Out of the various 5G based services possible with the fog computing platforms, security services are imperative but minimally investigated direct live. Thus, in this research, we are focused on launching security services in a fog node with an architecture capable of provisioning on-demand service requests. As the fog nodes are constrained on resources, our intention is to integrate light-weight virtualization technology such as Docker for forming the service provisioning infrastructure. We managed to launch multiple security instances configured to be Intrusion Detection and Prevention Systems (IDPSs) on the fog infrastructure emulated via a Raspberry Pi-4 device. This environment was tested with multiple network flows to validate its feasibility. In our proposed architecture, orchestration strategies performed by the security orchestrator were stated as guidelines for achieving pragmatic, dynamic orchestration with fog in IoT deployments. The results of this research guarantee the possibility of developing an ambient security service model that facilitates IoT devices with enhanced security.
Scopus© Citations 9 432
- PublicationNovel MEC based Approaches for Smart Hospitals to Combat COVID-19 PandemicCOVID-19 or Coronavirus has thrilled the entire world population with uncertainty over their survival and well-being. The impact this pathogen has caused over the globe has been profound due to its unique transmission features; that urges for contact-less strategies to interact and treat the infected. The impending 5G mobile technology is immersing the applications that enable the provisioning of medical and healthcare services in a contact-less manner. The edge computing paradigms offer a de-centralized and versatile networking infrastructure capable of adhering to the novel demands of 5G. In this article, we are considering Multi-Access Edge Computing (MEC) flavour of the edge paradigms for realizing the contact-less approaches that assist the mediation of COVID-19 and the future of healthcare. In order to formulate this ideology, we propose three use cases and discuss their implementation in the MEC context. Further, the requirements for launching these services are provided. Additionally, we validate our proposed approaches through simulations.
Scopus© Citations 26 387