Now showing 1 - 10 of 12
  • Publication
    6G Security Challenges and Potential Solutions
    Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless systems with the possible challenges and potential solutions. Especially, we discuss the security and privacy challenges that may emerge with the 6G requirements, novel network architecture, applications and enabling technologies including distributed ledger technologies, physical layer security, distributed artificial intelligence (AI)/ machine learning (ML), Visible Light Communication (VLC), THz bands, and quantum communication
    Scopus© Citations 63  20
  • Publication
    Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs
    The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing the capabilities of sensor networks. In this paper, we introduce a system model that enables end-to-end secure connectivity between low-power IoT devices and UAVs, that helps to manage the data processing tasks of heterogeneous wireless sensor networks. The performance of proposed solution is analyzed by using simulation results. Moreover, in order to demonstrate the practical usability of the proposed solution, the prototype implementation is presented using commercial off-the-shelf devices.
    Scopus© Citations 11  350
  • Publication
    A Survey on Mobile Augmented Reality with 5G Mobile Edge Computing: Architectures, Applications and Technical Aspects
    The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated communication infrastructure, Mobile Augmented Reality (MAR) applications are gaining increased popularity. MAR allows users to run AR applications on mobile devices with greater mobility and at a lower cost. The emerging 5G communication technologies act as critical enablers for future MAR applications to achieve ultra-low latency and extremely high data rates while Multi-access Edge Computing (MEC) brings enhanced computational power closer to the users to complement MAR. This paper extensively discusses the landscape of MAR through the past and its future prospects with respect to the 5G systems and complementary technology MEC. The paper especially provides an informative analysis of the network formation of current and future MAR systems in terms of cloud, edge, localized, and hybrid architectural options. The paper discusses key application areas for MAR and their future with the advent of 5G technologies. The paper also discusses the requirements and limitations of MAR technical aspects such as communication, mobility management, energy management, service offloading and migration, security, and privacy and analyzes the role of 5G technologies.
      528Scopus© Citations 277
  • Publication
    The Roadmap to 6G Security and Privacy
    Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible challenges with different 6G technologies, and the potential solutions. We provide our vision on 6G security and security key performance indicators (KPIs) with the tentative threat landscape based on the foreseen 6G network architecture. Moreover, we discuss the security and privacy challenges that may encounter with the available 6G requirements and potential 6G applications. We also give the reader some insights into the standardization efforts and research-level projects relevant to 6G security. In particular, we discuss the security considerations with 6G enabling technologies such as distributed ledger technology (DLT), physical layer security, distributed AI/ML, visible light communication (VLC), THz, and quantum computing. All in all, this work intends to provide enlightening guidance for the subsequent research of 6G security and privacy at this initial phase of vision towards reality.
    Scopus© Citations 143  367
  • Publication
    ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare
    The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to reality. Among the other MAR use cases, the incorporation of this MAR technology in the healthcare sector can elevate the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data available in this process, it is also highly vulnerable to all types of security threats. In this paper, an edge-based secure architecture is presented for a MAR healthcare application. Based on the ESSMAR architecture, a secure key management scheme is proposed for both the registration and authentication phases. Then the security of the proposed scheme is validated using formal and informal verification methods.
    Scopus© Citations 2  321
  • Publication
    Micro-Operator driven Local 5G Network Architecture for Industrial Internet
    In addition to the high degree of flexibility and customization required by different vertical sectors, 5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links. The novel concept called micro-operator (uO) enables a versatile set of stakeholders to operate local 5G networks within their premises with a guaranteed quality and reliability to complement mobile network operators' (MNOs) offerings. In this paper, we propose a descriptive architecture for emerging 5G uOs which provides user specific and location specific services in a spatially confined environment. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports industry 4.0 standards. Moreover, in order to realize the conceptual design, we provide simulation results for the latency measurements of the proposed uO architecture with respect to an augmented reality use case in industrial internet. Thereby we discuss the benefits of having uO driven local 5G networks for specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
    Scopus© Citations 27  407
  • Publication
    Performance Analysis of Local 5G Operator Architectures for Industrial Internet
    5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links, in addition to the high degree of flexibility and customization required by different vertical sectors. The novel concept called local 5G networks enables a versatile set of stakeholders to operate 5G networks within their premises with guaranteed quality and reliability to complement Mobile Network Operators’ (MNOs) offerings. In this paper, we propose a descriptive architecture for a local 5G operator which provides user specific and location specific services in a spatially confined environment i.e. industrial internet environment. In addition to that, we propose hybrid architecture options where both the local 5G operator and MNO collaboratively contribute to establishing the core network to cater to such communications. The architecture is discussed in terms of network functions and the operational units which entail the core and radio access networks in a smart factory environment which supports Industry 4.0 standards. Moreover, to realize the conceptual design, we provide simulation results for the latency measurements of the proposed architecture options with respect to an Augmented Reality (AR), massive wireless sensor networks and mobile robots use cases. Thereby we discuss the benefits of deploying core network functions locally to cater to specialized user requirements, rather than continuing with the conventional approach where only MNOs can deploy cellular networks.
    Scopus© Citations 30  444
  • Publication
    Blockchain-based Network Slice Broker to Facilitate Factory-as-a-Service
    The novel concept of Factory-as-a-Service~(FaaS) allows the agility of adapting the manufacturing process by identifying the industry's supply chain and user requirements. To cater to FaaS, flexibility in networking and cloud services is a must. 5G network slice broker is a third-party mediator that caters to networking resource demand from clients to the service providers. Thus, this paper introduces a secure blockchain-based network slice broker to facilitate FaaS. The proposed secure network slice broker (SNSB) provides secure, cognitive, and distributed network services for resource allocation and security service level agreement (SSLA) formation with coordination of slice managers and SSLA managers. In SNSB we introduce a federated slice selection algorithm with Stackelberg game model and Reinforcement Learning~(RL) algorithm to compute the real-time and the optimal unit price and demand level. Moreover, we provide an extensive implementation and performance evaluation of SNSB using the Katana slice manager and a custom SSLA manager.
      94Scopus© Citations 4
  • Publication
    Robust and Resilient Federated Learning for Securing Future Networks
    Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify the applicabil- ity of FL for securing future networks and its limitations due to the vulnerability to poisoning attacks. First, we investigate the shortcomings of state-of-the-art security algorithms for FL and perform an attack to circumvent FoolsGold algorithm, which is known as one of the most promising defense techniques currently available. The attack is launched with the addition of intelligent noise at the poisonous model updates. Then we propose a more sophisticated defense strategy, a threshold-based clustering mechanism to complement FoolsGold. Moreover, we provide a comprehensive analysis of the impact of the attack scenario and the performance of the defense mechanism.
    Scopus© Citations 1  189
  • Publication
    Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G
    The emergence of Multi-Access Edge Computing (MEC) technology aims to extend cloud computing capabilities to the edge of the wireless access networks, i.e., closer to the end-users. Thus, MEC-enabled 5G wireless systems are envisaged to offer real-time, low-latency, and high-bandwidth access to the radio network resources. Thus, MEC allows network operators to open up their networks to a wide range of innovative services, thereby giving rise to a brand-new ecosystem and a value chain. Furthermore, MEC as an enabling technology will provide new insights into coherent integration of Internet of Things (IoT) in 5G wireless systems. In this context, this paper expounds the four key technologies, including Network Function Virtualization (NFV), Software Defined Networking (SDN), Network Slicing and Information Centric Networking (ICN), that will propel and intensify the integration of MEC IoT in 5G networks. Moreover, our goal is to provide the close alliance between MEC and these four driving technologies in the 5G IoT context and to identify the open challenges, future directions, and concrete integration paths.
    Scopus© Citations 57  13