Now showing 1 - 10 of 16
  • Publication
    Robust and Resilient Federated Learning for Securing Future Networks
    Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicabil- ity of FL for securing future networks and its limitations due to the vulnerability to poisoning attacks. First, we investigate the shortcomings of state-of-the-art security algorithms for FL and perform an attack to circumvent FoolsGold algorithm, which is known as one of the most promising defense techniques currently available. The attack is launched with the addition of intelligent noise at the poisonous model updates. Then we propose a more sophisticated defense strategy, a threshold-based clustering mechanism to complement FoolsGold. Moreover, we provide a comprehensive analysis of the impact of the attack scenario and the performance of the defense mechanism.
      48
  • Publication
    Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks
    Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also face resource limitations. Federated learning is a machine learning-based technique that addresses both privacy and com- munication efficiency issues. Therefore, we propose a federated learning-based model incorporating the ZSM architecture for network automation. The paper also contains the simulations and results of the proposed multi-stage federated learning model that uses the UNSW-NB15 dataset.
      55
  • Publication
    AGE: authentication in gadget-free healthcare environments
    Mobile and sensor related technologies are significantly revolutionizing the medical healthcare sectors. In current healthcare systems, gadgets are the prominent way of acquiring medical services. However, the recent technological advancements in smart and ambient environments are offering users new ways to access the healthcare services without using any explicit gadgets. One of the key challenges in such gadget-free environments is performing secure user authentication with the intelligent surroundings. For example, a secure, efficient and user-friendly authentication mechanism is essential for elderly/disabled people or patients in critical conditions requiring medical services. Hence, modern authentication systems should be sophisticated enough to identify such patients without requiring their physical efforts or placing gadgets on them. This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment. We performed formal security verification of our proposed scheme using CDVT/AD tool and our results indicate that the proposed scheme is secure for such smart and gadget-free environments. We verify that the proposed scheme can resist against various well-known security attacks. Moreover, the proposed system showed better performance as compared with existing biometrics base remote user authentication schemes.
      174
  • Publication
    Blockchain-based Roaming and Offload Service Platform for Local 5G Operators
    Local 5G Operator (L5GO) concept is one of the most prominent versatile applications of the 5G in the near future. The popularity of L5GOs will trigger a greater number of roaming and offloading events between mobile operators. However, existing static and the operator-assisted roaming and offloading procedures are inefficient for L5GO ecosystem due to poor service quality, data privacy issues, data transferring delays, excessive costs for intermediary parties and existence of roaming fraud. To address these challenges, we propose a blockchain / Distributed Ledger Technology (DLT) based service platform for L5GOs to facilitate efficient roaming and offload services. As the key contribution, blockchain-based smart contract scheme is proposed to establish dynamic and automated agreements between operators. By using smart contracts, we introduce several novel features such as universal wallet for subscribers, service quality based L5GO rating system, user-initiated roaming process and the roaming fraud prevention system to improve the operational quality of a L5GO. A prototype of the proposed platform is emulated with the Ethereum blockchain platform and Rinkeby Testnet to evaluate the performance and justify the feasibility of the proposal. Upon an extensive evaluation on the prototype, it was observed that the proposed platform offered benefits such as cost effective, more secure and reliable experience.
      205Scopus© Citations 3
  • Publication
    The Role of Blockchain to Fight Against COVID-19
    IEEE The COVID-19 pandemic has adversely affected almost all aspects of human life, various sectors of business, and regions of the world. The flow of human activities halted for several months, and are now being carefully redefined to align with guidelines and recommendations to avoid the spread of the novel coronavirus. In contrast to other pandemics the world has witnessed in the past, the technological advancements of the current era are a boon that can play a key role in safeguarding humanity. In this work, we begin by highlighting general challenges that have arisen during the COVID-19 pandemic. Next, to gauge the applicability of blockchain as a key enabling technology, we identify potential use cases to meet current needs. Further, for each use case, we present a high-level view of how blockchain can be leveraged and discuss the expected performance. Finally, we highlight the challenges that must be addressed to harness the full potential of blockchain technology and discuss plausible solutions.
      1087Scopus© Citations 100
  • Publication
    Performance Analysis of Local 5G Operator Architectures for Industrial Internet
    5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links, in addition to the high degree of flexibility and customization required by different vertical sectors. The novel concept called local 5G networks enables a versatile set of stakeholders to operate 5G networks within their premises with guaranteed quality and reliability to complement Mobile Network Operators’ (MNOs) offerings. In this paper, we propose a descriptive architecture for a local 5G operator which provides user specific and location specific services in a spatially confined environment i.e. industrial internet environment. In addition to that, we propose hybrid architecture options where both the local 5G operator and MNO collaboratively contribute to establishing the core network to cater to such communications. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports Industry 4.0 standards. Moreover, to realize the conceptual design, we provide simulation results for the latency measurements of the proposed architecture options with respect to an Augmented Reality (AR), massive wireless sensor networks and mobile robots use cases. Thereby we discuss the benefits of deploying core network functions locally to cater to specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
      283Scopus© Citations 23
  • Publication
    Blockchain-based Automated Certificate Revocation for 5G IoT
    Internet of Things (IoT) is a key topic of interest in modern communication context with the evolution of 5G and beyond ecosystems. 5G will interconnects billions of IoT devices wirelessly. The wireless communication exposes the devices to massive security risks in different dimensions. The Public Key Infrastructure (PKI) is one of the promising solutions to eliminate security risks. It ensures the authentication and communication integrity by using public key certificates. However, the overhead of certificate storage is a significant problem for the resource constrained IoT devices. We propose an application of Elliptic Curve Qu Vanstone (ECQV) certificates, which are lightweight in size for the resource restricted IoT devices. Furthermore, we incorporate the blockchain based smart contracts to handle the certificate related operations. We utilize the smart contracts in the certificate issuance and developed a smart contract based threat scoring mechanism to automatically revoke the certificates. The lightweight nature of ECQV certificates enables the distributed ledger to store, update, and revoke the certificates. We evaluated the proposed solution in Hyperledger Fabric blockchain platform.
      226Scopus© Citations 12
  • Publication
    Survey on Blockchain based Smart Contracts: Technical Aspects and Future Research
    Internet of Things (IoT) is an emerging technology that makes people’s lives smart by conquering a plethora of diverse application and service areas. In near future, the fifth-generation (5G) wireless networks provide the connectivity for this IoT ecosystem. It has been carefully designed to facilitate the exponential growth in the IoT field. Network slicing is one of the key technologies in the 5G architecture that has the ability to divide the physical network into multiple logical networks (i.e. slices) with different network characteristics. Therefore, network slicing is also a key enabler of realisation of IoT in 5G. Network slicing can satisfy the various networking demands by heterogeneous IoT applications via dedicated slices. In this survey, we present a comprehensive analysis of the exploitation of network slicing in IoT realisation. We discuss network slicing utilisation in different IoT application scenarios, along with the technical challenges that can be solved via network slicing. Furthermore, integration challenges and open research problems related to the network slicing in the IoT realisation are also discussed in this paper. Finally, we discuss the role of other emerging technologies and concepts, such as blockchain and Artificial Intelligence/Machine Learning(AI/ML) in network slicing and IoT integration
      382Scopus© Citations 31
  • Publication
    The Roadmap to 6G Security and Privacy
    Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible challenges with different 6G technologies, and the potential solutions. We provide our vision on 6G security and security key performance indicators (KPIs) with the tentative threat landscape based on the foreseen 6G network architecture. Moreover, we discuss the security and privacy challenges that may encounter with the available 6G requirements and potential 6G applications. We also give the reader some insights into the standardization efforts and research-level projects relevant to 6G security. In particular, we discuss the security considerations with 6G enabling technologies such as distributed ledger technology (DLT), physical layer security, distributed AI/ML, visible light communication (VLC), THz, and quantum computing. All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality.
      231Scopus© Citations 59
  • Publication
    The Fight against COVID-19 Pandemic with 5G Technologies
    COVID-19 pandemic has affected the world in an unexpected manner. The human race is battling against the pandemic while schools, universities, industries, hospitals and governments are seeking new methods and technologies to seamlessly continue their usual operations. In response, this paper presents how 5G and IoT (Internet of Things) related technologies can be efficiently utilized and developed to fight against the COVID-19 pandemic. Several use-cases on how 5G and IoT can be enablers to provide innovative solutions in the areas of telehealth, contact tracing, education, retail and supply chains, e-government/ remote office/ information sharing, smart manufacturing and factory automation, e-tourism and entertainment are presented along with their technical requirements and challenges. It is envisaged that the proposed solutions will be instrumental to facilitate the usual lifestyle, work and other day-to-day activities of humans in the post-pandemic world.
      177Scopus© Citations 80