- IPv6, Mobility, Handover, Networks, Security
- Caching and Content Delivery
- Network Traffic and Congestion Control
- Software-Defined Networks and 5G
- Network Security and Intrusion Detection
- Advanced Authentication Protocols Security
- Peer-to-Peer Network Technologies
- IoT and Edge/Fog Computing
- Wireless Networks and Protocols
- Mobile Ad Hoc Networks
- Security in Wireless Sensor Networks
- Internet Traffic Analysis and Secure E-voting
- User Authentication and Security Systems
- Energy Efficient Wireless Sensor Networks
- Opportunistic and Delay-Tolerant Networks
- Cooperative Communication and Network Coding
- Vehicular Ad Hoc Networks (VANETs)
- Wireless Body Area Networks
- Advanced Malware Detection Techniques
- Context-Aware Activity Recognition Systems
- Advanced Data Storage Technologies
- Smart Grid Security and Resilience
- Advanced Wireless Network Optimization
- Advanced Optical Network Technologies
- Network Packet Processing and Optimization
Linköping University
2015-2024
Informa (Sweden)
2023
ITMO University
2013-2020
Technical University of Darmstadt
2018
Ruhr University Bochum
2018
Curtin University
2018
Queensland University of Technology
2018
University of Oulu
2010-2017
Helsinki Institute for Information Technology
2007-2016
Aalto University
2010-2016
Software defined networking (SDN) decouples the network control and data planes. The intelligence state are logically centralized underlying infrastructure is abstracted from applications. SDN enhances security by means of global visibility where a conflict can be easily resolved plane. Hence, architecture empowers networks to actively monitor traffic diagnose threats facilitates forensics, policy alteration, service insertion. separation planes, however, opens challenges, such as man-in-the...
5G networks will use novel technological concepts to meet the requirements of broadband access everywhere, high user and device mobility, connectivity massive number devices (e.g., Internet Things) in an ultra-reliable affordable way. Software defined networking network functions virtualization leveraging advances cloud computing such as mobile edge are most sought out technologies these requirements. However, securely using providing privacy future wireless new concerns. Therefore, this...
The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects life through network with much higher speed, very low latency and ubiquitous connectivity. Due its crucial role in our lives, must secure users, components, services. security threat landscape 5G has grown enormously due unprecedented increase types services number devices. Therefore, solutions if not developed yet be envisioned already cope diverse threats on various services,...
Although the fifth generation (5G) wireless networks are yet to be fully investigated, visionaries of 6th (6G) echo systems have already come into discussion. Therefore, in order consolidate and solidify security privacy 6G networks, we survey how may impact envisioned systems, possible challenges with different technologies, potential solutions. We provide our vision on key performance indicators (KPIs) tentative threat landscape based foreseen network architecture. Moreover, discuss that...
In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity, which acquires, processes and provides information from sensor nodes. Conversely, in WSN applications distributed Internet of Things (IoT) architecture, nodes sense data, process, exchange perform collaboratively with other endusers. order to maintain trustworthy connectivity accessibility IoT, it is important establish secure links for end-to-end communication proper authentication. The authors...
The Internet of Things (IoT) is the current evolutionary paradigm networking and key driving force toward a smart world. Although privacy in IoT highly regarded to ensure protection users personal information from perspective individual or cooperative users, it's insufficiently studied. As members always-connected massive world, people can scarcely control disclosure their information. biggest challenge allow experience best utilization IoT-based products services with fewest threats...
The conceptualisation of the sixth generation mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving emergence a number innovative applications. Particularly, 6G will be prominent supporter evolution towards truly Intelligent Transportation System and realization Smart City concept by fulfilling limitations 5G, once vehicular are becoming highly dynamic complex stringent requirements on ultra-low latency, high...
The Host Identity Protocol (HIP) is an inter-networking architecture and associated set of protocols, developed at the IETF since 1999 reaching their first stable version in 2007. HIP enhances original Internet by adding a name space used between IP layer transport protocols. This new consists cryptographic identifiers, thereby implementing so-called identifier/locator split. In architecture, identifiers are naming application level end-points (sockets), replacing prior identification role...
The proliferation of current wireless communications and information technologies have been altering humans lifestyle social interactions-the next frontier is the smart home environments or spaces. A consists low capacity devices (e.g., sensors) networks, therefore, all working together as a secure system that needs an adequate level security. This paper introduces lightweight session key establishment scheme for environments. To establish trust among network, every sensor control unit uses...
5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number devices (e.g. Internet Things (IoT)) in an ultrareliable affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) Network Function Virtualization (NFV) are maturing towards their use 5G. However, there pressing security challenges these technologies besides the growing concerns for privacy. In this paper, we overview issues...
Smart meters (SMs) are considered as foundational part of the smart metering infrastructure (SMI) in energy networks (SENs). SM is a digital device that makes use two-way communication between consumer and utility to exchange, manage control consumptions within home. However, despite all features, an raises several security-related concerns. For instance, how exchange data legal entities (e.g., server) while maintaining privacy consumer. To address these concerns, authentication key...
Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet. According to architecture, nodes measure data, process, exchange information, and perform collaboratively with other end-users, which can internal or external network. In order maintain trustworthy connectivity accessibility IoT, it is important establish secure links for end-to-end communication a strong pervasive authentication mechanism. However, due...
The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide services in a ubiquitous manner the individuals. As homes become smarter, more complex, technology dependent, need for adequate security mechanism with minimum individual's intervention growing. recent serious attacks have shown how Internet-enabled can be turned into very dangerous spots various ill intentions, thus lead privacy concerns For instance, eavesdropper able...
This paper presents a methodology and mobile application for driver monitoring, analysis, recommendations based on detected unsafe driving behavior accident prevention using personal smartphone. For the smartphone's cameras built-in sensors (accelerometer, gyroscope, GPS, microphone) are used. A developed includes dangerous state classification, detection, reference model. The supports following driver's online states: distraction drowsiness as well an offline related to high pulse rate. We...
Wireless sensor networks (WSNs) are a prominent fundamental technology of the Internet Things (IoTs). Rather than device-to-device communications, group communications in form broadcasting and multicasting incur efficient message deliveries among resource-constrained nodes IoT-enabled WSNs. Secure key management is many cases used to protect authenticity, integrity, confidentiality multicast messages. This paper develops two establishment protocols for secure devices IoT. Major deployment...
The growing network density and unprecedented increase in traffic, caused by the massively expanding number of connected devices online services, require intelligent operations. Machine Learning (ML) has been applied this regard different types networks networking technologies to meet requirements future communicating services. In article, we provide a detailed account current research on application ML communication shed light challenges. Research is described in: i) three layers, i.e.,...
The roles of trust, security and privacy are somewhat interconnected, but different facets next generation networks. challenges in creating a trustworthy 6G multidisciplinary spanning technology, regulation, techno-economics, politics ethics. This white paper addresses their fundamental research three key areas. Trust: Under the current "open internet" telco cloud can be used for trust services only equally all users. network must support embedded increased level information 6G. Trust...
The paper presents an approach and case study of a distributed driver monitoring system. system utilizes smartphone sensors for detecting dangerous states in vehicle. We use mounted on vehicle windshield directed towards the driver's face tracked by front-facing camera. Using information from camera video frames as well other sensors, we determine drowsiness, distraction, aggressive driving, high pulse rate that can lead to road accidents. propose cloud architecture capture statistics...
The coronavirus pandemic has overburdened medical institutions, forcing physicians to diagnose and treat their patients remotely. Moreover, COVID-19 made humans more conscious about health, resulting in the extensive purchase of IoT-enabled devices. rapid boom market worth internet things (IoMT) captured cyber attackers' attention. Like data is also sensitive a lot on dark web. Despite fact that patient's health details have not been protected appropriately, letting trespassers exploit them....
The integration of satellite and terrestrial networks has become inevitable in the next generations communications due to emerging needs ubiquitous connectivity remote locations. New existing services critical infrastructures locations sea, on land space will be seamlessly connected through a diverse set non-terrestrial communication technologies. However, systems open up both unique security challenges that can arise migration from one another. Similarly, also incompatibility distinct or...
Cybersecurity attacks that target software have become profitable and popular targets for cybercriminals who consciously take advantage of web-based vulnerabilities execute might jeopardize essential industry 5.0 features. Several machine learning-based techniques been developed in the literature to identify these types assaults. In contrast single classifiers, ensemble methods not evaluated empirically. To best our knowledge, this work is first empirical evaluation both homogeneous...
Wireless links have intrinsic characteristics that affect the performance of transport protocols; these include variable bandwidth, corruption, channel allocation delays, and asymmetry. In this paper we review simulation models for cellular, WLAN satellite used in design protocols, consider interplay between wireless transport. We argue evaluation protocols can be improved by providing easily available strike a balance realism, generality, detail.There is an ongoing tussle link protocol...