Now showing 1 - 7 of 7
  • Publication
    6G Security Challenges and Potential Solutions
    Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless systems with the possible challenges and potential solutions. Especially, we discuss the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including distributed ledger technologies, physical layer security, distributed artificial intelligence (AI)/ machine learning (ML), Visible Light Communication (VLC), THz bands, and quantum communication
    Scopus© Citations 63  20
  • Publication
    A Survey on Mobile Augmented Reality with 5G Mobile Edge Computing: Architectures, Applications and Technical Aspects
    The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated communication infrastructure, Mobile Augmented Reality (MAR) applications are gaining increased popularity. MAR allows users to run AR applications on mobile devices with greater mobility and at a lower cost. The emerging 5G communication technologies act as critical enablers for future MAR applications to achieve ultra-low latency and extremely high data rates while Multi-access Edge Computing (MEC) brings enhanced computational power closer to the users to complement MAR. This paper extensively discusses the landscape of MAR through the past and its future prospects with respect to the 5G systems and complementary technology MEC. The paper especially provides an informative analysis of the network formation of current and future MAR systems in terms of cloud, edge, localized, and hybrid architectural options. The paper discusses key application areas for MAR and their future with the advent of 5G technologies. The paper also discusses the requirements and limitations of MAR technical aspects such as communication, mobility management, energy management, service offloading and migration, security, and privacy and analyzes the role of 5G technologies.
      528Scopus© Citations 277
  • Publication
    The Roadmap to 6G Security and Privacy
    Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible challenges with different 6G technologies, and the potential solutions. We provide our vision on 6G security and security key performance indicators (KPIs) with the tentative threat landscape based on the foreseen 6G network architecture. Moreover, we discuss the security and privacy challenges that may encounter with the available 6G requirements and potential 6G applications. We also give the reader some insights into the standardization efforts and research-level projects relevant to 6G security. In particular, we discuss the security considerations with 6G enabling technologies such as distributed ledger technology (DLT), physical layer security, distributed AI/ML, visible light communication (VLC), THz, and quantum computing. All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality.
    Scopus© Citations 143  367
  • Publication
    Performance Analysis of Local 5G Operator Architectures for Industrial Internet
    5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links, in addition to the high degree of flexibility and customization required by different vertical sectors. The novel concept called local 5G networks enables a versatile set of stakeholders to operate 5G networks within their premises with guaranteed quality and reliability to complement Mobile Network Operators’ (MNOs) offerings. In this paper, we propose a descriptive architecture for a local 5G operator which provides user specific and location specific services in a spatially confined environment i.e. industrial internet environment. In addition to that, we propose hybrid architecture options where both the local 5G operator and MNO collaboratively contribute to establishing the core network to cater to such communications. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports Industry 4.0 standards. Moreover, to realize the conceptual design, we provide simulation results for the latency measurements of the proposed architecture options with respect to an Augmented Reality (AR), massive wireless sensor networks and mobile robots use cases. Thereby we discuss the benefits of deploying core network functions locally to cater to specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
    Scopus© Citations 30  444
  • Publication
    Robust and Resilient Federated Learning for Securing Future Networks
    Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicabil- ity of FL for securing future networks and its limitations due to the vulnerability to poisoning attacks. First, we investigate the shortcomings of state-of-the-art security algorithms for FL and perform an attack to circumvent FoolsGold algorithm, which is known as one of the most promising defense techniques currently available. The attack is launched with the addition of intelligent noise at the poisonous model updates. Then we propose a more sophisticated defense strategy, a threshold-based clustering mechanism to complement FoolsGold. Moreover, we provide a comprehensive analysis of the impact of the attack scenario and the performance of the defense mechanism.
    Scopus© Citations 1  189
  • Publication
    How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?
    Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario.
      10Scopus© Citations 7
  • Publication
    Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks
    Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also face resource limitations. Federated learning is a machine learning-based technique that addresses both privacy and com- munication efficiency issues. Therefore, we propose a federated learning-based model incorporating the ZSM architecture for network automation. The paper also contains the simulations and results of the proposed multi-stage federated learning model that uses the UNSW-NB15 dataset.
    Scopus© Citations 11  296