Now showing 1 - 10 of 73
  • Publication
    AGE: authentication in gadget-free healthcare environments
    Mobile and sensor related technologies are significantly revolutionizing the medical healthcare sectors. In current healthcare systems, gadgets are the prominent way of acquiring medical services. However, the recent technological advancements in smart and ambient environments are offering users new ways to access the healthcare services without using any explicit gadgets. One of the key challenges in such gadget-free environments is performing secure user authentication with the intelligent surroundings. For example, a secure, efficient and user-friendly authentication mechanism is essential for elderly/disabled people or patients in critical conditions requiring medical services. Hence, modern authentication systems should be sophisticated enough to identify such patients without requiring their physical efforts or placing gadgets on them. This paper proposes an anonymous and privacy-preserving biometrics based authentication scheme for such gadget-free healthcare environment. We performed formal security verification of our proposed scheme using CDVT/AD tool and our results indicate that the proposed scheme is secure for such smart and gadget-free environments. We verify that the proposed scheme can resist against various well-known security attacks. Moreover, the proposed system showed better performance as compared with existing biometrics base remote user authentication schemes.
      283
  • Publication
    The Role of Blockchain to Fight Against COVID-19
    IEEE The COVID-19 pandemic has adversely affected almost all aspects of human life, various sectors of business, and regions of the world. The flow of human activities halted for several months, and are now being carefully redefined to align with guidelines and recommendations to avoid the spread of the novel coronavirus. In contrast to other pandemics the world has witnessed in the past, the technological advancements of the current era are a boon that can play a key role in safeguarding humanity. In this work, we begin by highlighting general challenges that have arisen during the COVID-19 pandemic. Next, to gauge the applicability of blockchain as a key enabling technology, we identify potential use cases to meet current needs. Further, for each use case, we present a high-level view of how blockchain can be leveraged and discuss the expected performance. Finally, we highlight the challenges that must be addressed to harness the full potential of blockchain technology and discuss plausible solutions.
      1267Scopus© Citations 147
  • Publication
    B-VNF: Blockchain-enhanced Architecture for VNF Orchestration in MEC-5G Networks
    The roll-out of 5G technology will nurture the realization of broadband, ultra-reliable, and zero latency services. Network Function Virtualization (NFV) and Multi-Access Edge Computing (MEC) are among the key enablers for 5G. The synergy between NFV and MEC allows migration of Virtual Network Functions (VNF) from cloud to the edge of the network thereby adding agility to the softwarized 5G networks. The overall orchestration of VNF includes, but is not limited to, processing VNF requests, selecting appropriate VNF, migrating VNF from cloud to MEC, instantiating migrated VNF at MEC, settling payment according to a VNF's usage, maintaining VNF's reputation, etc. The orchestration is not foolproof and raises doubts about its trustworthiness. To address all the existing issues in a unified manner, we leverage Blockchain technology as yet another enabling technology for MEC-enabled 5G. Thus, we propose a Blockchain-enhanced architecture for secure VNF orchestration such that issues like authenticity, integrity, confidentiality, reputation, payment transfer, and many more are resolved. To furnish a Proof-of-Concept (PoC), we develop a prototypical DApp (Decentralized Application) using Ethereum Blockchain and Suricata as an exemplar VNF. Further, we discuss the strong resiliency of the proposed architecture against numerous well-known attacks.
      20Scopus© Citations 11
  • Publication
    ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare
    The recent advances in mobile devices and wireless communication sector transformed Mobile Augmented Reality (MAR) from science fiction to reality. Among the other MAR use cases, the incorporation of this MAR technology in the healthcare sector can elevate the quality of diagnosis and treatment for the patients. However, due to the highly sensitive nature of the data available in this process, it is also highly vulnerable to all types of security threats. In this paper, an edge-based secure architecture is presented for a MAR healthcare application. Based on the ESSMAR architecture, a secure key management scheme is proposed for both the registration and authentication phases. Then the security of the proposed scheme is validated using formal and informal verification methods.
      369Scopus© Citations 3
  • Publication
    Reliable Control and Data Planes for Softwarized Networks
    Driven by the requirement of increasing performance and flexibility, networks are being softwarized by paradigms such as software-defined networking (SDN) and network function virtualization (NFV). These solutions reduce the complexity and the specialization of hardware devices, by extracting the inherently distributed control plane of forwarding network elements such as switches and routers, to a logically centralized control plane (referred as controller in SDN). The control plane acts as a broker between the network applications (e.g. monitoring, traffic engineering) and the data plane (i.e. physical network infrastructure). For scalability and robustness, the logically centralized control plane is implemented by physically distributing different controllers throughout the network. This chapter presents different solutions to increase the reliability of both planes: data and control planes. The reliability of the data plane can be increased by considering survivable virtual network embedding solutions. This chapter proposes a survivable embedding against single and double failures at either links or nodes. Furthermore, in order to provide a programmable and resilient data plane, BPFabric has been proposed for SDN which supports high performance functions suitable for detecting attacks. On the other hand, the reliability of the control plane applied to SDN can be addressed by considering enhanced controller placement solutions providing redundancy against uncorrelated as well as targeted failures while coping with latency and capacity requirements. Furthermore, a solution to increase the security and robustness of the control channel is also addressed in this chapter.
      224
  • Publication
    Security as a Service Platform Leveraging Multi-Access Edge Computing Infrastructure Provisions
    The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible with the envisaged technologies, security is a demanding objective that should be applied beyond the design stages. Thus, Security as a Service (SECaaS) is an initiative for a service model that enable mobile and IoT consumers with diverse security functions such as Intrusion Detection and Prevention (IDPaaS), Authentication (AaaS), and Secure Transmission Channel (STCaaS) as a Service. A well-equipped edge computing infrastructure is intrinsic to achieve this goal. The emerging Multi-Access Edge Computing (MEC) paradigm standardized by the ETSI is excelling among other edge computing flavours due to its well-defined structure and protocols. Thus, in our directive, we intend to utilize MEC as the edge computing platform to launch the SECaaS functions. Though, the actual development of a MEC infrastructure is highly dependent on the integration of virtualization technologies to enable dynamic creation, the deployment, and the detachment of virtualized entities that should feature interoperability to cater the heterogeneous IoT devices and services. To that extent, this work is proposing a security service architecture that offers these SECaaS services. Further, we validate our proposed architecture through the development of a virtualized infrastructure that integrates lightweight and hypervisor-based virtualization technologies. Our experiments prove the plausibility of launching multiple security instances on the developed prototype edge platform.
      511Scopus© Citations 24
  • Publication
    Survey on Blockchain based Smart Contracts: Technical Aspects and Future Research
    Internet of Things (IoT) is an emerging technology that makes people’s lives smart by conquering a plethora of diverse application and service areas. In near future, the fifth-generation (5G) wireless networks provide the connectivity for this IoT ecosystem. It has been carefully designed to facilitate the exponential growth in the IoT field. Network slicing is one of the key technologies in the 5G architecture that has the ability to divide the physical network into multiple logical networks (i.e. slices) with different network characteristics. Therefore, network slicing is also a key enabler of realisation of IoT in 5G. Network slicing can satisfy the various networking demands by heterogeneous IoT applications via dedicated slices. In this survey, we present a comprehensive analysis of the exploitation of network slicing in IoT realisation. We discuss network slicing utilisation in different IoT application scenarios, along with the technical challenges that can be solved via network slicing. Furthermore, integration challenges and open research problems related to the network slicing in the IoT realisation are also discussed in this paper. Finally, we discuss the role of other emerging technologies and concepts, such as blockchain and Artificial Intelligence/Machine Learning(AI/ML) in network slicing and IoT integration
    Scopus© Citations 65  607
  • Publication
    Survey on blockchain for future smart grids: Technical aspects, applications, integration challenges and future research
    Smart Grid 2.0 is envisaged to automate the operations of the intelligent electricity grid. Blockchain and smart contracts are integrated to facilitate the transformation from DSO-centric operations to consumer-oriented, distributed electricity grid management. The envisaged smart grids, integrated with blockchain would provoke challenges, which would hinder the maximum utilization of Distribute Energy Resources (DERs). This comprehensive review aims at analyzing the applicability of blockchain technology in Smart Grid 2.0, which would facilitate a seamless decentralization process. Further, the paper elaborates the blockchain-based applications of future smart grid operations and the role of blockchain in each scenario. The paper further provides a concise analysis on the blockchain integration challenges, thereby ensure secure and scalable, decentralized operations of future, autonomous electricity networks.
      10Scopus© Citations 63
  • Publication
    Deployment Options of 5G Network Slicing for Smart Healthcare
    Network slicing enables the creation of multiple logical independent networks on physical networking infrastructure. Network slice deployment in a Fifth Generation (5G) mobile network can be classified as vertical and horizontal slicing. The paper compares the performance of the two slicing methods through solving two convex optimization problems, considering several smart hospital scenarios that differ from each other based on their medical speciality. The results are used to draw insights on the most appropriate slicing approach for each setup.
      30Scopus© Citations 3
  • Publication
    Blockchain-based Automated Certificate Revocation for 5G IoT
    Internet of Things (IoT) is a key topic of interest in modern communication context with the evolution of 5G and beyond ecosystems. 5G will interconnects billions of IoT devices wirelessly. The wireless communication exposes the devices to massive security risks in different dimensions. The Public Key Infrastructure (PKI) is one of the promising solutions to eliminate security risks. It ensures the authentication and communication integrity by using public key certificates. However, the overhead of certificate storage is a significant problem for the resource constrained IoT devices. We propose an application of Elliptic Curve Qu Vanstone (ECQV) certificates, which are lightweight in size for the resource restricted IoT devices. Furthermore, we incorporate the blockchain based smart contracts to handle the certificate related operations. We utilize the smart contracts in the certificate issuance and developed a smart contract based threat scoring mechanism to automatically revoke the certificates. The lightweight nature of ECQV certificates enables the distributed ledger to store, update, and revoke the certificates. We evaluated the proposed solution in Hyperledger Fabric blockchain platform.
    Scopus© Citations 28  450