Andrei Gurtov

ORCID: 0000-0002-9829-9287
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • IPv6, Mobility, Handover, Networks, Security
  • Caching and Content Delivery
  • Network Traffic and Congestion Control
  • Software-Defined Networks and 5G
  • Network Security and Intrusion Detection
  • Advanced Authentication Protocols Security
  • Peer-to-Peer Network Technologies
  • IoT and Edge/Fog Computing
  • Wireless Networks and Protocols
  • Mobile Ad Hoc Networks
  • Security in Wireless Sensor Networks
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Energy Efficient Wireless Sensor Networks
  • Opportunistic and Delay-Tolerant Networks
  • Cooperative Communication and Network Coding
  • Vehicular Ad Hoc Networks (VANETs)
  • Wireless Body Area Networks
  • Advanced Malware Detection Techniques
  • Context-Aware Activity Recognition Systems
  • Advanced Data Storage Technologies
  • Smart Grid Security and Resilience
  • Advanced Wireless Network Optimization
  • Advanced Optical Network Technologies
  • Network Packet Processing and Optimization

Linköping University
2015-2024

Informa (Sweden)
2023

ITMO University
2013-2020

Technical University of Darmstadt
2018

Ruhr University Bochum
2018

Curtin University
2018

Queensland University of Technology
2018

University of Oulu
2010-2017

Helsinki Institute for Information Technology
2007-2016

Aalto University
2010-2016

Software defined networking (SDN) decouples the network control and data planes. The intelligence state are logically centralized underlying infrastructure is abstracted from applications. SDN enhances security by means of global visibility where a conflict can be easily resolved plane. Hence, architecture empowers networks to actively monitor traffic diagnose threats facilitates forensics, policy alteration, service insertion. separation planes, however, opens challenges, such as man-in-the...

10.1109/comst.2015.2474118 article EN IEEE Communications Surveys & Tutorials 2015-01-01

5G networks will use novel technological concepts to meet the requirements of broadband access everywhere, high user and device mobility, connectivity massive number devices (e.g., Internet Things) in an ultra-reliable affordable way. Software defined networking network functions virtualization leveraging advances cloud computing such as mobile edge are most sought out technologies these requirements. However, securely using providing privacy future wireless new concerns. Therefore, this...

10.1109/mcomstd.2018.1700063 article EN IEEE Communications Standards Magazine 2018-03-01

The development of the fifth generation (5G) wireless networks is gaining momentum to connect almost all aspects life through network with much higher speed, very low latency and ubiquitous connectivity. Due its crucial role in our lives, must secure users, components, services. security threat landscape 5G has grown enormously due unprecedented increase types services number devices. Therefore, solutions if not developed yet be envisioned already cope diverse threats on various services,...

10.1109/comst.2019.2916180 article EN IEEE Communications Surveys & Tutorials 2019-01-01

Although the fifth generation (5G) wireless networks are yet to be fully investigated, visionaries of 6th (6G) echo systems have already come into discussion. Therefore, in order consolidate and solidify security privacy 6G networks, we survey how may impact envisioned systems, possible challenges with different technologies, potential solutions. We provide our vision on key performance indicators (KPIs) tentative threat landscape based foreseen network architecture. Moreover, discuss that...

10.1109/ojcoms.2021.3078081 article EN cc-by IEEE Open Journal of the Communications Society 2021-01-01

In the centralized Wireless Sensor Network (WSN) architecture there exists a central entity, which acquires, processes and provides information from sensor nodes. Conversely, in WSN applications distributed Internet of Things (IoT) architecture, nodes sense data, process, exchange perform collaboratively with other endusers. order to maintain trustworthy connectivity accessibility IoT, it is important establish secure links for end-to-end communication proper authentication. The authors...

10.1109/wcnc.2014.6952860 article EN 2022 IEEE Wireless Communications and Networking Conference (WCNC) 2014-04-01

The Internet of Things (IoT) is the current evolutionary paradigm networking and key driving force toward a smart world. Although privacy in IoT highly regarded to ensure protection users personal information from perspective individual or cooperative users, it's insufficiently studied. As members always-connected massive world, people can scarcely control disclosure their information. biggest challenge allow experience best utilization IoT-based products services with fewest threats...

10.1109/mcc.2016.28 article EN IEEE Cloud Computing 2016-03-01

The conceptualisation of the sixth generation mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving emergence a number innovative applications. Particularly, 6G will be prominent supporter evolution towards truly Intelligent Transportation System and realization Smart City concept by fulfilling limitations 5G, once vehicular are becoming highly dynamic complex stringent requirements on ultra-low latency, high...

10.1109/ojcoms.2022.3143098 article EN cc-by IEEE Open Journal of the Communications Society 2022-01-01

The Host Identity Protocol (HIP) is an inter-networking architecture and associated set of protocols, developed at the IETF since 1999 reaching their first stable version in 2007. HIP enhances original Internet by adding a name space used between IP layer transport protocols. This new consists cryptographic identifiers, thereby implementing so-called identifier/locator split. In architecture, identifiers are naming application level end-points (sockets), replacing prior identification role...

10.1109/surv.2010.021110.00070 article EN IEEE Communications Surveys & Tutorials 2010-01-01

The proliferation of current wireless communications and information technologies have been altering humans lifestyle social interactions-the next frontier is the smart home environments or spaces. A consists low capacity devices (e.g., sensors) networks, therefore, all working together as a secure system that needs an adequate level security. This paper introduces lightweight session key establishment scheme for environments. To establish trust among network, every sensor control unit uses...

10.1109/jsen.2015.2475298 article EN IEEE Sensors Journal 2015-09-01

5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number devices (e.g. Internet Things (IoT)) in an ultrareliable affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) Network Function Virtualization (NFV) are maturing towards their use 5G. However, there pressing security challenges these technologies besides the growing concerns for privacy. In this paper, we overview issues...

10.1109/cscn.2017.8088621 article EN 2017-09-01

Smart meters (SMs) are considered as foundational part of the smart metering infrastructure (SMI) in energy networks (SENs). SM is a digital device that makes use two-way communication between consumer and utility to exchange, manage control consumptions within home. However, despite all features, an raises several security-related concerns. For instance, how exchange data legal entities (e.g., server) while maintaining privacy consumer. To address these concerns, authentication key...

10.1109/tsg.2018.2857558 article EN IEEE Transactions on Smart Grid 2018-07-19

Wireless sensor Networks (WSNs) deployed in distributed Internet of Things (IoT) applications should be integrated into the Internet. According to architecture, nodes measure data, process, exchange information, and perform collaboratively with other end-users, which can internal or external network. In order maintain trustworthy connectivity accessibility IoT, it is important establish secure links for end-to-end communication a strong pervasive authentication mechanism. However, due...

10.1155/2014/357430 article EN cc-by International Journal of Distributed Sensor Networks 2014-07-01

The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide services in a ubiquitous manner the individuals. As homes become smarter, more complex, technology dependent, need for adequate security mechanism with minimum individual's intervention growing. recent serious attacks have shown how Internet-enabled can be turned into very dangerous spots various ill intentions, thus lead privacy concerns For instance, eavesdropper able...

10.1109/tifs.2016.2647225 article EN IEEE Transactions on Information Forensics and Security 2017-01-02

This paper presents a methodology and mobile application for driver monitoring, analysis, recommendations based on detected unsafe driving behavior accident prevention using personal smartphone. For the smartphone's cameras built-in sensors (accelerometer, gyroscope, GPS, microphone) are used. A developed includes dangerous state classification, detection, reference model. The supports following driver's online states: distraction drowsiness as well an offline related to high pulse rate. We...

10.1109/tits.2019.2918328 article EN IEEE Transactions on Intelligent Transportation Systems 2019-06-04

Wireless sensor networks (WSNs) are a prominent fundamental technology of the Internet Things (IoTs). Rather than device-to-device communications, group communications in form broadcasting and multicasting incur efficient message deliveries among resource-constrained nodes IoT-enabled WSNs. Secure key management is many cases used to protect authenticity, integrity, confidentiality multicast messages. This paper develops two establishment protocols for secure devices IoT. Major deployment...

10.1109/access.2015.2474705 article EN cc-by-nc-nd IEEE Access 2015-01-01

The growing network density and unprecedented increase in traffic, caused by the massively expanding number of connected devices online services, require intelligent operations. Machine Learning (ML) has been applied this regard different types networks networking technologies to meet requirements future communicating services. In article, we provide a detailed account current research on application ML communication shed light challenges. Research is described in: i) three layers, i.e.,...

10.1109/access.2020.3041765 article EN cc-by IEEE Access 2020-01-01

The roles of trust, security and privacy are somewhat interconnected, but different facets next generation networks. challenges in creating a trustworthy 6G multidisciplinary spanning technology, regulation, techno-economics, politics ethics. This white paper addresses their fundamental research three key areas. Trust: Under the current "open internet" telco cloud can be used for trust services only equally all users. network must support embedded increased level information 6G. Trust...

10.48550/arxiv.2004.11665 preprint EN cc-by arXiv (Cornell University) 2020-01-01

The paper presents an approach and case study of a distributed driver monitoring system. system utilizes smartphone sensors for detecting dangerous states in vehicle. We use mounted on vehicle windshield directed towards the driver's face tracked by front-facing camera. Using information from camera video frames as well other sensors, we determine drowsiness, distraction, aggressive driving, high pulse rate that can lead to road accidents. propose cloud architecture capture statistics...

10.1109/jsen.2020.2975382 article EN IEEE Sensors Journal 2020-02-20

The coronavirus pandemic has overburdened medical institutions, forcing physicians to diagnose and treat their patients remotely. Moreover, COVID-19 made humans more conscious about health, resulting in the extensive purchase of IoT-enabled devices. rapid boom market worth internet things (IoMT) captured cyber attackers' attention. Like data is also sensitive a lot on dark web. Despite fact that patient's health details have not been protected appropriately, letting trespassers exploit them....

10.1109/jbhi.2022.3186250 article EN IEEE Journal of Biomedical and Health Informatics 2022-07-11

The integration of satellite and terrestrial networks has become inevitable in the next generations communications due to emerging needs ubiquitous connectivity remote locations. New existing services critical infrastructures locations sea, on land space will be seamlessly connected through a diverse set non-terrestrial communication technologies. However, systems open up both unique security challenges that can arise migration from one another. Similarly, also incompatibility distinct or...

10.1109/access.2022.3205426 article EN cc-by IEEE Access 2022-01-01

Cybersecurity attacks that target software have become profitable and popular targets for cybercriminals who consciously take advantage of web-based vulnerabilities execute might jeopardize essential industry 5.0 features. Several machine learning-based techniques been developed in the literature to identify these types assaults. In contrast single classifiers, ensemble methods not evaluated empirically. To best our knowledge, this work is first empirical evaluation both homogeneous...

10.1016/j.jksuci.2023.02.009 article EN cc-by Journal of King Saud University - Computer and Information Sciences 2023-02-15

Wireless links have intrinsic characteristics that affect the performance of transport protocols; these include variable bandwidth, corruption, channel allocation delays, and asymmetry. In this paper we review simulation models for cellular, WLAN satellite used in design protocols, consider interplay between wireless transport. We argue evaluation protocols can be improved by providing easily available strike a balance realism, generality, detail.There is an ongoing tussle link protocol...

10.1145/997150.997159 article EN ACM SIGCOMM Computer Communication Review 2004-04-01
Coming Soon ...