Options
Ylianttila, Mika
Preferred name
Ylianttila, Mika
Official Name
Ylianttila, Mika
Research Output
Now showing 1 - 7 of 7
- PublicationBlockchain-based Automated Certificate Revocation for 5G IoTInternet of Things (IoT) is a key topic of interest in modern communication context with the evolution of 5G and beyond ecosystems. 5G will interconnects billions of IoT devices wirelessly. The wireless communication exposes the devices to massive security risks in different dimensions. The Public Key Infrastructure (PKI) is one of the promising solutions to eliminate security risks. It ensures the authentication and communication integrity by using public key certificates. However, the overhead of certificate storage is a significant problem for the resource constrained IoT devices. We propose an application of Elliptic Curve Qu Vanstone (ECQV) certificates, which are lightweight in size for the resource restricted IoT devices. Furthermore, we incorporate the blockchain based smart contracts to handle the certificate related operations. We utilize the smart contracts in the certificate issuance and developed a smart contract based threat scoring mechanism to automatically revoke the certificates. The lightweight nature of ECQV certificates enables the distributed ledger to store, update, and revoke the certificates. We evaluated the proposed solution in Hyperledger Fabric blockchain platform.
407Scopus© Citations 25 - PublicationMulti-Access Edge Computing and Blockchain-based Secure Telehealth System Connected with 5G and IoTThere is a global hype in the development of digital healthcare infrastructure to cater the massive elderly population and infectious diseases. The digital facilitation is expected to ensure the patient privacy, scalability, and data integrity on the sensitive life critical healthcare data, while aligning to the global healthcare data protection standards. The patient data sharing to third parties such as research institutions and universities is also concerned as a significant contribution to the society to sharpen the research and investigations. The emergence of 5G communication technologies eradicates the borders between patients, hospital and other institutions with high end service standards. In patients' perspective, healthcare service delivery through the digital medium is beneficial in terms of time, costs, and risks. In this paper, we propose a novel Multi-access Edge Computing(MEC) and blockchain based service architecture utilizing the lightweight ECQV (Elliptic Curve Qu-Vanstone) certificates for the realtime data privacy, integrity, and authentication between IoT, MEC, and cloud. We further attached storage offloading capability to the blockchain to ensure scalability with a massive number of connected medical devices to the cloud. We introduced a rewarding scheme to the patients and hospitals through the blockchain to encourage data sharing. The access control is handled through the smart contracts. We evaluated the proposed system in a near realistic implementation using Hyperledger Fabric blockchain platform with Raspberry Pi devices to simulate the activity of the medical sensors.
597Scopus© Citations 27 - Publication6G Security Challenges and Potential Solutions(IEEE, 2021-06-11)
; ; ; ; Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless systems with the possible challenges and potential solutions. Especially, we discuss the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including distributed ledger technologies, physical layer security, distributed artificial intelligence (AI)/ machine learning (ML), Visible Light Communication (VLC), THz bands, and quantum communication21Scopus© Citations 64 - PublicationBlockchain-based Roaming and Offload Service Platform for Local 5G Operators(IEEE, 2021-01-12)
; ; ; ; Local 5G Operator (L5GO) concept is one of the most prominent versatile applications of the 5G in the near future. The popularity of L5GOs will trigger a greater number of roaming and offloading events between mobile operators. However, existing static and the operator-assisted roaming and offloading procedures are inefficient for L5GO ecosystem due to poor service quality, data privacy issues, data transferring delays, excessive costs for intermediary parties and existence of roaming fraud. To address these challenges, we propose a blockchain / Distributed Ledger Technology (DLT) based service platform for L5GOs to facilitate efficient roaming and offload services. As the key contribution, blockchain-based smart contract scheme is proposed to establish dynamic and automated agreements between operators. By using smart contracts, we introduce several novel features such as universal wallet for subscribers, service quality based L5GO rating system, user-initiated roaming process and the roaming fraud prevention system to improve the operational quality of a L5GO. A prototype of the proposed platform is emulated with the Ethereum blockchain platform and Rinkeby Testnet to evaluate the performance and justify the feasibility of the proposal. Upon an extensive evaluation on the prototype, it was observed that the proposed platform offered benefits such as cost effective, more secure and reliable experience.402Scopus© Citations 7 - PublicationHow DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?(IEEE, 2021-09-16)
; ; ; ; Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is that it can be victimized by DoS (Denial of Service) attack. Thus, the aim of this work is three fold. First, to present the possible ways in which DoS/DDoS attacks can be mounted on NSB and their adverse effects. Second, to propose and implement initial blockchain-based solution named as Security Service Blockchain (SSB) to prevent DoS attacks on NSB. Third, to enumerate the challenges and future research directions to effectively utilize blockchain for mitigating DoS/DDoS attacks on NSB. To evaluate the performance the proposed SSB framework is implemented using Hyperledger Fabric. The results manifest that the latency impact of the legitimate slice creation over scaled up malicious traffic remains minimal with the use of SSB framework. The integration of SSB with NSB results in gaining several fold reduction in latency under DoS attack scenario.10Scopus© Citations 7 - PublicationRobust and Resilient Federated Learning for Securing Future Networks(IEEE, 2022-06-10)
; ; ; Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicabil- ity of FL for securing future networks and its limitations due to the vulnerability to poisoning attacks. First, we investigate the shortcomings of state-of-the-art security algorithms for FL and perform an attack to circumvent FoolsGold algorithm, which is known as one of the most promising defense techniques currently available. The attack is launched with the addition of intelligent noise at the poisonous model updates. Then we propose a more sophisticated defense strategy, a threshold-based clustering mechanism to complement FoolsGold. Moreover, we provide a comprehensive analysis of the impact of the attack scenario and the performance of the defense mechanism.191Scopus© Citations 2 - PublicationFederated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks(IEEE, 2022-06-10)
; ; ; ; Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine learning models can also face resource limitations. Federated learning is a machine learning-based technique that addresses both privacy and com- munication efficiency issues. Therefore, we propose a federated learning-based model incorporating the ZSM architecture for network automation. The paper also contains the simulations and results of the proposed multi-stage federated learning model that uses the UNSW-NB15 dataset.305Scopus© Citations 11