Now showing 1 - 10 of 43
- PublicationSecurity as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure ProvisionsThe mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible with the envisaged technologies, security is a demanding objective that should be applied beyond the design stages. Thus, Security as a Service (SECaaS) is an initiative for a service model that enable mobile and IoT consumers with diverse security functions such as Intrusion Detection and Prevention (IDPaaS), Authentication (AaaS), and Secure Transmission Channel (STCaaS) as a Service. A well-equipped edge computing infrastructure is intrinsic to achieve this goal. The emerging Multi-Access Edge Computing (MEC) paradigm standardized by the ETSI is excelling among other edge computing flavours due to its well-defined structure and protocols. Thus, in our directive, we intend to utilize MEC as the edge computing platform to launch the SECaaS functions. Though, the actual development of a MEC infrastructure is highly dependent on the integration of virtualization technologies to enable dynamic creation, the deployment, and the detachment of virtualized entities that should feature interoperability to cater the heterogeneous IoT devices and services. To that extent, this work is proposing a security service architecture that offers these SECaaS services. Further, we validate our proposed architecture through the development of a virtualized infrastructure that integrates lightweight and hypervisor-based virtualization technologies. Our experiments prove the plausibility of launching multiple security instances on the developed prototype edge platform.
198Scopus© Citations 16
- PublicationSurvey on Blockchain based Smart Contracts: Technical Aspects and Future ResearchInternet of Things (IoT) is an emerging technology that makes people’s lives smart by conquering a plethora of diverse application and service areas. In near future, the fifth-generation (5G) wireless networks provide the connectivity for this IoT ecosystem. It has been carefully designed to facilitate the exponential growth in the IoT field. Network slicing is one of the key technologies in the 5G architecture that has the ability to divide the physical network into multiple logical networks (i.e. slices) with different network characteristics. Therefore, network slicing is also a key enabler of realisation of IoT in 5G. Network slicing can satisfy the various networking demands by heterogeneous IoT applications via dedicated slices. In this survey, we present a comprehensive analysis of the exploitation of network slicing in IoT realisation. We discuss network slicing utilisation in different IoT application scenarios, along with the technical challenges that can be solved via network slicing. Furthermore, integration challenges and open research problems related to the network slicing in the IoT realisation are also discussed in this paper. Finally, we discuss the role of other emerging technologies and concepts, such as blockchain and Artificial Intelligence/Machine Learning(AI/ML) in network slicing and IoT integration
377Scopus© Citations 31
- PublicationReliable Control and Data Planes for Softwarized NetworksDriven by the requirement of increasing performance and flexibility, networks are being softwarized by paradigms such as software-defined networking (SDN) and network function virtualization (NFV). These solutions reduce the complexity and the specialization of hardware devices, by extracting the inherently distributed control plane of forwarding network elements such as switches and routers, to a logically centralized control plane (referred as controller in SDN). The control plane acts as a broker between the network applications (e.g. monitoring, traffic engineering) and the data plane (i.e. physical network infrastructure). For scalability and robustness, the logically centralized control plane is implemented by physically distributing different controllers throughout the network. This chapter presents different solutions to increase the reliability of both planes: data and control planes. The reliability of the data plane can be increased by considering survivable virtual network embedding solutions. This chapter proposes a survivable embedding against single and double failures at either links or nodes. Furthermore, in order to provide a programmable and resilient data plane, BPFabric has been proposed for SDN which supports high performance functions suitable for detecting attacks. On the other hand, the reliability of the control plane applied to SDN can be addressed by considering enhanced controller placement solutions providing redundancy against uncorrelated as well as targeted failures while coping with latency and capacity requirements. Furthermore, a solution to increase the security and robustness of the control channel is also addressed in this chapter.
- PublicationSurvey on blockchain based smart contracts: Applications, opportunities and challengesBlockchain is one of the disruptive technical innovation in the recent computing paradigm. Many applications already notoriously hard and complex are fortunate to ameliorate the service with the blessings of blockchain and smart contracts. The decentralized and autonomous execution with in-built transparency of blockchain based smart contracts revolutionize most of the applications with optimum and effective functionality. The paper explores the significant applications which already benefited from the smart contracts. We also highlight the future potential of the blockchain based smart contracts in these applications perspective.
3074Scopus© Citations 89
- PublicationMicro-Operator driven Local 5G Network Architecture for Industrial InternetIn addition to the high degree of flexibility and customization required by different vertical sectors, 5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links. The novel concept called micro-operator (uO) enables a versatile set of stakeholders to operate local 5G networks within their premises with a guaranteed quality and reliability to complement mobile network operators' (MNOs) offerings. In this paper, we propose a descriptive architecture for emerging 5G uOs which provides user specific and location specific services in a spatially confined environment. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports industry 4.0 standards. Moreover, in order to realize the conceptual design, we provide simulation results for the latency measurements of the proposed uO architecture with respect to an augmented reality use case in industrial internet. Thereby we discuss the benefits of having uO driven local 5G networks for specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
184Scopus© Citations 26
- PublicationPerformance Analysis of Local 5G Operator Architectures for Industrial Internet5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links, in addition to the high degree of flexibility and customization required by different vertical sectors. The novel concept called local 5G networks enables a versatile set of stakeholders to operate 5G networks within their premises with guaranteed quality and reliability to complement Mobile Network Operators’ (MNOs) offerings. In this paper, we propose a descriptive architecture for a local 5G operator which provides user specific and location specific services in a spatially confined environment i.e. industrial internet environment. In addition to that, we propose hybrid architecture options where both the local 5G operator and MNO collaboratively contribute to establishing the core network to cater to such communications. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports Industry 4.0 standards. Moreover, to realize the conceptual design, we provide simulation results for the latency measurements of the proposed architecture options with respect to an Augmented Reality (AR), massive wireless sensor networks and mobile robots use cases. Thereby we discuss the benefits of deploying core network functions locally to cater to specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
276Scopus© Citations 22
- PublicationFederated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G NetworksNetwork automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also face resource limitations. Federated learning is a machine learning-based technique that addresses both privacy and com- munication efficiency issues. Therefore, we propose a federated learning-based model incorporating the ZSM architecture for network automation. The paper also contains the simulations and results of the proposed multi-stage federated learning model that uses the UNSW-NB15 dataset.
- PublicationThe role of 5G for digital healthcare against COVID-19 pandemic: Opportunities and challengesCOVID-19 pandemic caused a massive impact on healthcare, social life, and economies on a global scale. Apparently, technology has a vital role to enable ubiquitous and accessible digital health services in pandemic conditions as well as against “re-emergence” of COVID-19 disease in a post-pandemic era. Accordingly, 5G systems and 5G-enabled e-health solutions are paramount. This paper highlights methodologies to effectively utilize 5G for e-health use cases and its role to enable relevant digital services. It also provides a comprehensive discussion of the implementation issues, possible remedies and future research directions for 5G to alleviate the health challenges related to COVID-19.
881Scopus© Citations 53
- PublicationAn Emergency Situation Detection System for Ambient Assisted LivingThis paper proposes “An Emergency Situation Detection System for Ambient Assisted Living (AAL)”, to support elderly people and patients with chronic conditions and potential health-related emergencies to live independently. It implements an Internet of Things (IoT) network that continuously monitors the health conditions of these people. The network includes mobile phones, to transmit the data generated by the IoT sensors to the cloud server. Especially, the paper proposes the 3 rd party unknown mobile relays instead of dedicated gateways as opposed to many existing solutions for IoT healthcare applications. The wireless communication technology used to provide the connectivity between the sensor nodes and mobile relays is Bluetooth Low Energy (BLE). To establish a secure end-to-end connectivity between low power IoT sensor nodes and cloud servers, the paper proposes several techniques. After the medical data transmission to the cloud server, it is responsible for emergency detection and alert generation accordingly. The type of emergency is not limited to a specific health issue, but new emergency situations can be defined and added to the proposed system. Ultimately, the interested parties such as family members, caretakers and doctors receive these alerts. The development of a prototype of the system as a part of the work using commercial off-the-shelf devices verifies the validity of the proposing system and evaluates the performance advantage over the existing systems.
147Scopus© Citations 7
- PublicationRobust and Resilient Federated Learning for Securing Future NetworksMachine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicabil- ity of FL for securing future networks and its limitations due to the vulnerability to poisoning attacks. First, we investigate the shortcomings of state-of-the-art security algorithms for FL and perform an attack to circumvent FoolsGold algorithm, which is known as one of the most promising defense techniques currently available. The attack is launched with the addition of intelligent noise at the poisonous model updates. Then we propose a more sophisticated defense strategy, a threshold-based clustering mechanism to complement FoolsGold. Moreover, we provide a comprehensive analysis of the impact of the attack scenario and the performance of the defense mechanism.