liu.seSök publikationer i DiVA
Ändra sökning
Avgränsa sökresultatet
1 - 22 av 22
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Ahmad, Ijaz
    et al.
    University of Oulu, Finland.
    Kumar, Tanesh
    University of Oulu, Finland.
    Liyanage, Madhusanka
    University of Oulu, Finland.
    Okwuibe, Jude
    University of Oulu, Finland.
    Ylianttila, Mika
    University of Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    5G Security: Analysis of Threats and Solutions2017Ingår i: 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN), IEEE , 2017, s. 193-199Konferensbidrag (Refereegranskat)
    Abstract [en]

    5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing security challenges in these technologies besides the growing concerns for user privacy. In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G. Furthermore, we present security solutions to these challenges and future directions for secure 5G systems.

  • 2.
    Ahmad, Ijaz
    et al.
    Univ Oulu, Finland.
    Liyanage, Madhusanka
    Univ Oulu, Finland.
    Ylianttila, Mika
    Univ Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Analysis of Deployment Challenges of Host Identity Protocol2017Ingår i: 2017 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC), IEEE , 2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited deployment and highlight the challenges faced by HIP for its commercial use. We propose technological development and outline deployment strategies for the wide use of HIP. Furthermore, this paper investigates the use of HIP in Software Defined Networks (SDN) to evaluate its performance in new disruptive networking technologies. In a nutshell, this paper presents revealing challenges for the deployment of innovative networking protocols and a way ahead for successful and large scale deployment.

  • 3.
    Borisenko, Konstantin
    et al.
    St Petersburg Electrotech University of LETI, Russia.
    Rukavitsyn, Andrey
    St Petersburg Electrotech University of LETI, Russia.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Shorov, Andrey
    St Petersburg Electrotech University of LETI, Russia.
    Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques2016Ingår i: Internet of Things, Smart Spaces, and Next Generation Networks and Systems, NEW2AN 2016/uSMART 2016, SPRINGER INT PUBLISHING AG , 2016, Vol. 9870, s. 303-315Konferensbidrag (Refereegranskat)
    Abstract [en]

    The paper presents the results of the design and implementation of detection system against DDoS attacks for OpenStack cloud computing platform. Proposed system uses data mining techniques to detect malicious traffic. Formal models of detecting components are described. To train data mining models real legitimate traffic was combined with modelled malicious one. Paper presents results of detecting the origin of DDoS attacks on cloud instances.

  • 4.
    Chiesa, Marco
    et al.
    Catholic University of Louvain, Belgium.
    Nikolaevskiy, Ilya
    Aalto University, Finland.
    Mitrovic, Slobodan
    Ecole Polytech Federal Lausanne, Switzerland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Madry, Aleksander
    MIT, MA 02139 USA.
    Schapira, Michael
    Hebrew University of Jerusalem, Israel.
    Shenker, Scott
    University of Calif Berkeley, CA 94720 USA; Int Comp Science Institute, CA 94704 USA.
    On the Resiliency of Static Forwarding Tables2017Ingår i: IEEE/ACM Transactions on Networking, ISSN 1063-6692, E-ISSN 1558-2566, Vol. 25, nr 2, s. 1133-1146Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Fast reroute and other forms of immediate failover have long been used to recover from certain classes of failures without invoking the network control plane. While the set of such techniques is growing, the level of resiliency to failures that this approach can provide is not adequately understood. In this paper, we embarked upon a systematic algorithmic study of the resiliency of forwarding tables in a variety of models (i.e., deterministic/probabilistic routing, with packet-headerrewriting, with packet-duplication). Our results show that the resiliency of a routing scheme depends on the "connectivity" k of a network, i.e., the minimum number of link deletions that partition a network. We complement our theoretical result with extensive simulations. We show that resiliency to four simultaneous link failures, with limited path stretch, can be achieved without any packet modification/duplication or randomization. Furthermore, our routing schemes provide resiliency against k - 1 failures, with limited path stretch, by storing log(k) bits in the packet header, with limited packet duplication, or with randomized forwarding technique.

  • 5.
    Fuchs, Adel
    et al.
    Jerusalem Coll Technol, Israel.
    Stulman, Ariel
    Jerusalem Coll Technol, Israel.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Hardening Opportunistic HIP2017Ingår i: PROCEEDINGS OF THE 20TH ACM INTERNATIONAL CONFERENCE ON MODELLING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS (MSWIM17), ASSOC COMPUTING MACHINERY , 2017, s. 123-127Konferensbidrag (Refereegranskat)
    Abstract [en]

    As mobile and multi-homed devices are becoming ubiquitous, the need for a dynamic, yet secure communication protocol is unavoidable. The Host Identity Protocol (HIP) was constructed to meet this requirement; to provide significantly more secure mobility and multi-homing capabilities. HIP opportunistic mode, which is to be used when other, more trusted mechanisms are lacking, is based on a leap of faith (LoF) paradigm. In this paper, we analyze different Man in the middle (MiTM) attacks which might occur under this LoF, and propose a set of tweaks for hardening opportunistic HIP (HOH) that strengthen opportunistic modes security.

  • 6.
    Gurtov, Andrei
    et al.
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Koskela, Joakim
    Aalto Univ, Finland.
    Korzun, Dmitry
    Petrozavodsk State Univ, Russia.
    Cyclic ranking in single-resource peer-to-peer exchange2018Ingår i: Peer-to-Peer Networking and Applications, ISSN 1936-6442, E-ISSN 1936-6450, Vol. 11, nr 3, s. 632-643Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Peer-to-peer (P2P) sharing systems use incentives for resource exchange to encourage cooperation and ensure fairness. In bilateral strategies, such as BitTorrent Tit-for-Tat or deficit-based FairTorrent, individual decisions of peers utilize direct observations. It may result in low performance and unfair treatment. In this paper, we study a novel exchange strategy that applies Cyclic Ranking (CR). In addition to direct observations, a peer utilizes provision cycles-a shared history of effective exchanges. The PageRank algorithm runs for the locally collected cycles and computes the numerical ranks to estimate the reputation. The CR strategy incrementally augments known incentive-aware strategies. For evaluation we implement CR-BitTorrent and CR-FairTorrent variants. Our simulation model captures the dependence on network bandwidth and the number of seeders as well as selfishness and stability of the participants. The initial experiments show improved fairness and download times, compared to the original BitTorrent and FairTorrent. The performance of selfish and unstable peers decreases by as much as 50%. The CR strategy suits well in environments where direct reciprocity has shown little effect. Contrasted to existing solutions, the CR strategy rewards longevity and stability of peers.

  • 7.
    Gurtov, Andrei
    et al.
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Liyanage, Madhusanka
    Centre for Wireless Communications, University of Oulu, Finland.
    Korzun, Dmitry
    Petrozavodsk State University, Petrozavodsk, Kareliya Republits, Russia.
    Secure Communication and Data Processing Challenges in the Industrial Internet2016Ingår i: Baltic Journal of Modern Computing, ISSN 2255-8942, E-ISSN 2255-8950, Vol. 4, nr 4, s. 1058-1073Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The next industrial revolution is foreseen to happen with upcoming Industrial Internet that combines massive data collected by industrial sensors with data analysis for improving the efficiency of operations. Collecting, pre-processing, storing and analyzing such real-time data is a complex task with stringent demands on communication intelligence, QoS and security. In this paper we outline some challenges facing the Industrial Internet, namely integration with 5G wireless networks, Software Defined Machines, ownership and smart processing of digital sensor data. We propose a secure communication architecture for the Industrial Internet based on Smart Spaces and Virtual Private LAN Services. It is a position paper, describing state-of-the-art and a roadmap for future research on the Industrial Internet.

  • 8.
    Gurtov, Andrei
    et al.
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Polishchuk, Tatiana
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska fakulteten.
    Wernberg, Max
    Linköpings universitet, Institutionen för teknik och naturvetenskap, Kommunikations- och transportsystem. Linköpings universitet, Tekniska fakulteten.
    Controller-Pilot Data Link Communication Security2018Ingår i: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, nr 5, artikel-id 1636Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The increased utilization of the new types of cockpit communications, including controller pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitations imposed by the system parameters, we propose several solutions for the improved security of the data messaging communication used in air traffic management (ATM). We discuss the applicability of elliptical curve cryptography (ECC), protected aircraft communications addressing and reporting systems (PACARs) and the Host Identity Protocol (HIP) as possible countermeasures to the identified security threats. In addition, we consider identity-defined networking (IDN) as an example of a genuine security solution which implies global changes in the whole air traffic communication system.

  • 9.
    Harjula, Erkki
    et al.
    University of Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Koskela, Timo
    University of Oulu, Finland.
    Ojala, Timo
    University of Oulu, Finland.
    Ylianttila, Mika
    University of Oulu, Finland.
    Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes2016Ingår i: SUSTAINABLE COMPUTING-INFORMATICS and SYSTEMS, ISSN 2210-5379, Vol. 12, s. 43-54Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In this article, we propose an energy -aware load monitoring model, called e-Mon, for enabling energy aware load balancing in Peer-to-Peer (P2P) systems. P2P is a scalable and self-organizing technology for utilizing computational resources of the end-user devices for the benefit of a computing system. In P2P systems, the need for fair balance of load is crucial since the end-users need to be incentivized to participate in the system. The short battery life, caused by additional strain on the computational resources of the end-user devices, is a significant negative incentive factor for mobile end-users of current P2P systems. The e-Mon model, proposed in this article, enables moving load from energy-critical to less energy-critical nodes in P2P systems. This is done by including the energy status of a peer node as one of the factors defining a nodes load. The model helps saving the energy of mobile P2P nodes, particularly in cases when the remaining battery capacity is low. The article provides a thorough energy efficiency evaluation demonstrating that e-Mon can significantly improve the battery life of mobile nodes by improving the quality and fairness of load balance between heterogeneous nodes. With a proper selection of a load balancing model for the application scenario, e-Mon is shown to achieve up to 470% battery life extension compared to the case with traditional load balancing with no battery monitoring. (C) 2016 Elsevier Inc. All rights reserved.

  • 10.
    Islam, Hasan M. A.
    et al.
    Aalto Univ, Finland.
    Lagutin, Dmitrij
    Aalto Univ, Finland.
    Lukyanenko, Andrey
    Aalto Univ, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Yla-Jaaski, Antti
    Aalto Univ, Finland.
    CIDOR: Content Distribution and Retrieval in Disaster Networks for Public Protection2017Ingår i: 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2017, s. 324-333Konferensbidrag (Refereegranskat)
    Abstract [en]

    Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN deployment. In this paper, we present a Content dIstribution and retrieval framework in disaster netwOrks for public pRotection (CIDOR) which exploits the design principle of the native CCN architecture in the native Delay Tolerant Networking (DTN) architecture. We prove the feasibility and investigate the performance of our proposed solution using extensive simulation with different classes of the DTN routing strategies in different mobility scenarios. The simulation result shows that CIDOR can reduce the content retrieval time up to 50% while the response ratio is close to 100%.

  • 11.
    Korzun, Dmitry
    et al.
    Department of Computer Science, Petrozavodsk State University, Petrozavodsk, Russian Federation.
    Kuptsov, Dmitriy
    Helsinki Institute for Information Technology, Helsinki, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    A comparative simulation study of deterministic and stochastic strategies for reduction of packet reordering in multipath data streaming2016Ingår i: International journal of simulation. Systems, Science and Technology, ISSN 1473-8031, E-ISSN 1473-804X, Vol. 17, nr 33, s. 10.1-10.8Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Multipath routing gains clear network performance advantages for data streaming in networked systems with high path diversity. The level of packet reordering, however, becomes higher: distant packets are reordered, the application performance is reduced due to head-of-line blocking at the destination, and a large resequencing buffer is needed for sorting incoming packets. In this paper, we study by simulation the stochastic compensation effect to reduce packet reordering. If a source randomizes packet scheduling into multiple paths of random transmission delays, then these two sides of randomness “quench” each other. We perform comparison experiments to test this hypothesis in various multipath configurations, focusing on deterministic vs. randomized strategies of packet scheduling. The experiments confirm the existence of the stochastic compensation effect and its considerable influence on the application performance. © 2016, UK Simulation Society. All rights reserved.

  • 12.
    Kumar, Pardeep
    et al.
    University of Oxford, England.
    Braeken, An
    Vrije University of Brussel, Belgium.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Iinatti, Jari
    University of Oulu, Finland.
    Hoai Ha, Phuong
    University of Tromso, Norway.
    Anonymous Secure Framework in Connected Smart Home Environments2017Ingår i: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 12, nr 4, s. 968-979Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The smart home is an environment, where heterogeneous electronic devices and appliances are networked together to provide smart services in a ubiquitous manner to the individuals. As the homes become smarter, more complex, and technology dependent, the need for an adequate security mechanism with minimum individuals intervention is growing. The recent serious security attacks have shown how the Internet-enabled smart homes can be turned into very dangerous spots for various ill intentions, and thus lead the privacy concerns for the individuals. For instance, an eavesdropper is able to derive the identity of a particular device/appliance via public channels that can be used to infer in the life pattern of an individual within the home area network. This paper proposes an anonymous secure framework (ASF) in connected smart home environments, using solely lightweight operations. The proposed framework in this paper provides efficient authentication and key agreement, and enables devices (identity and data) anonymity and unlinkability. One-time session key progression regularly renews the session key for the smart devices and dilutes the risk of using a compromised session key in the ASF. It is demonstrated that computation complexity of the proposed framework is low as compared with the existing schemes, while security has been significantly improved.

  • 13.
    Kumar, Pardeep
    et al.
    UiT Arctic University of Norway, Norway.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Iinatti, Jari
    University of Oulu, Finland.
    Sain, Mangal
    Dongseo University, South Korea.
    Ha, Phuong H.
    UiT Arctic University of Norway, Norway.
    Access Control Protocol With Node Privacy in Wireless Sensor Networks2016Ingår i: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 16, nr 22, s. 8142-8150Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    For preventing malicious nodes joining wireless sensor networks (WSNs), an access control mechanism is necessary for the trustworthy cooperation between the nodes. In addition to access control, recently, privacy has been an important topic regarding how to achieve privacy without disclosing the real identity of communicating entities in the WSNs. Based on elliptic curve cryptography, in this paper, we present an access control protocol with node privacy (called ACP) for the WSN. The proposed scheme not only accomplishes the node authentication but also provides the identity privacy (i.e., source to destination and vice-versa) for the communicating entities. Compared with the current state of the art, the proposed solution can defend actively against attacks. The efficacy and the efficiency of the proposed ACP are confirmed through the test bed analysis and performance evaluations.

  • 14.
    Liyanage, Madhusanka
    et al.
    University of Oulu, Finland.
    Braeken, An
    Vrije University of Brussel, Belgium.
    Delia Jurcut, Anca
    University of Coll Dublin, Ireland.
    Ylianttila, Mika
    University of Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Secure communication channel architecture for Software Defined Mobile Networks2017Ingår i: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 114, s. 32-50Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    A Software-Defined Mobile Network (SDMN) architecture is proposed to enhance the performance, flexibility, and scalability of todays telecommunication networks. However, SDMN features such as centralized controlling, network programmability, and virtualization introduce new security challenges to telecommunication networks. In this article, we present security challenges related to SDMN communication channels (i.e., control and data channel) and propose a novel secure communication channel architecture based on Host Identity Protocol (HIP). IPsec tunneling and security gateways are widely utilized in present-day mobile networks to secure backhaul communication channels. However, the utilization of legacy IPsec mechanisms in SDMNs is challenging due to limitations such as distributed control, lack of visibility, and limited scalability. The proposed architecture also utilizes IPsec tunnels to secure the SDMN communication channels by eliminating these limitations. The proposed architecture is implemented in a testbed and we analyzed its security features. The performance penalty of security due to the proposed security mechanisms is measured on both control and data channels. (C) 2017 Elsevier B.V. All rights reserved.

  • 15.
    Liyanage, Madhusanka
    et al.
    University of Oulu, Finland.
    Bux Abro, Ahmed
    VMware, CA USA.
    Ylianttila, Mika
    University of Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. ITMO University, Russia.
    Opportunities and Challenges of Software-Defined Mobile Networks in Network Security2016Ingår i: IEEE Security and Privacy, ISSN 1540-7993, E-ISSN 1558-4046, Vol. 14, nr 4, s. 34-44Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    To transform rigid and disparate legacy mobile networks into scalable and dynamic ecosystems, software-defined mobile network (SDMN) architecture integrates software-defined networks, network functions virtualization, and cloud computing principles. However, because SDMN architecture separates control and data planes, it can introduce new security challenges.

  • 16.
    Liyanage, Madhusanka
    et al.
    Univ Oulu, Finland.
    Ylianttila, Mika
    Univ Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services2017Ingår i: 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), IEEE , 2017, s. 286-291Konferensbidrag (Refereegranskat)
    Abstract [en]

    Ethernet based VPLS (Virtual Private LAN Service) networks are now becoming attractive in many enterprise applications due to simple, protocol-independent and cost efficient operation. However, new VPLS applications demand additional requirements, such as elevated security, enhanced scalability and improved flexibility. This paper summarized the results of a thesis which focused to increase the scalability, flexibility and compatibility of secure VPLS networks. First, we propose a scalable secure flat-VPLS architecture based on Host Identity Protocol (HIP) to increase the forwarding and security plane scalability. Then, a secure hierarchical-VPLS architecture has been proposed by extending the previous proposal to achieve control plane scalability as well. To solve the compatibility issues of Spanning Tree Protocol (STP) in VPLS networks, a novel Distributed STP (DSTP) is proposed. Lastly, we propose a novel SDN (Software Defined Networking) based VPLS (SoftVPLS) architecture to overcome tunnel management limitations in legacy secure VPLS architectures. Simulation models and testbed implementations are used to verify the performance of proposed solutions.

  • 17.
    Liyanage, Madhusanka
    et al.
    Univ Oulu, Finland.
    Ylianttila, Mika
    Univ Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Fast Transmission Mechanism for Secure VPLS Architectures2017Ingår i: 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), IEEE , 2017, s. 192-196Konferensbidrag (Refereegranskat)
    Abstract [en]

    Ethernet based secure VPLS (Virtual Private LAN Services) networks require to establish full mesh of VPLS tunnels between the customer sites. However, the tunnel establishment between geographically distant customer sites introduces a significantly high delay to the user traffic transportation. In this article, we propose a novel fast transmission mechanism for secure VPLS architectures to reduce the waiting time before transmitting the data and the average data transmission delay between geographically distant customer sites. The performance of proposed mechanism is analyzed by using a simulation model and a testbed implementation.

  • 18.
    Liyanage, Madhusanka
    et al.
    Univ Oulu, Finland.
    Ylianttila, Mika
    Univ Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Software Defined VPLS Architectures: Opportunities and Challenges2017Ingår i: 2017 IEEE 28TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), IEEE , 2017Konferensbidrag (Refereegranskat)
    Abstract [en]

    Virtual Private LAN Services (VPLS) is an Ethernet based VPN (Virtual Private Network) service which provides protocol independent and high speed multipoint-to-multipoint connectivity. In this article, we discuss the possibility to use emerging networks concepts such as Software Defined Networking (SDN) and Network Function Virtualization (NFV) to improve the performance, flexibility and adaptability of VPLS networks. SDN and NFV based VPLS (SoftVPLS) architectures offer new features such as centralized control, network programmability and abstraction to improve the performance, flexibility and automation of traffic, security and network management functions for future VPLS networks.

  • 19.
    Manzoor, Ahsan
    et al.
    Univ Oulu, Finland.
    Porambage, Pawani
    Univ Oulu, Finland.
    Liyanage, Madhsanka
    Univ Oulu, Finland.
    Ylianttila, Mika
    Univ Oulu, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    DEMO: Mobile Relay Architecture for Low-Power IoT Devices2018Ingår i: 2018 IEEE 19TH INTERNATIONAL SYMPOSIUM ON A WORLD OF WIRELESS, MOBILE AND MULTIMEDIA NETWORKS (WOWMOM), IEEE , 2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    Internet of Things (IoT) devices need pervasive and secure connections to transfer the aggregated data to the central servers located in remote clouds where the collected data further processed and stored. However, most low-power IoT devices cannot transmit the collected the data directly to such servers due the limited transmission power and range. Thus, third-party devices such as smart mobile phones are used as a relay to establish the communication link between IoT devices and the cloud server. This paper demonstrates a mobile-based relay assistance solution for secure end-to-end connectivity between low-power IoT sensors and cloud servers by using Bluetooth Low Energy (BLE) technology. The prototype implementation verifies the technical readiness of the proposed solution.

  • 20.
    Monshizadeh, Mehrnoosh
    et al.
    Nokia Bell Labs, Finland; Aalto University, Finland.
    Khatri, Vikramajeet
    Nokia Bell Labs, Finland.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    NFV Security Considerations for Cloud-Based Mobile Virtual Network Operators2016Ingår i: 2016 24TH INTERNATIONAL CONFERENCE ON SOFTWARE, TELECOMMUNICATIONS AND COMPUTER NETWORKS (SOFTCOM), IEEE , 2016, s. 228-232Konferensbidrag (Refereegranskat)
    Abstract [en]

    Cloud computing offers benefits of sharing computing and network resources among multiple mobile network operators. To utilize such benefits, in earlier paper we proposed a platform called telecommunication network as a service (TaaS). Sharing of such resources in cloud technology affects security of whole mobile network in general and software defined network (SDN) amp; network functions virtualization (NFV) in particular. In this paper, we have analyzed open platform for network functions virtualization (OPNFV) activities and compared them with TaaS concept to find commonalities and see how well it addresses security concerns outlined for TaaS. Through a comparison we show OPNFV security doesnt cover application security at all, however it partially covers data security and considerably covers hypervisor, SDN amp; NFV security. Therefore, OPNFV security needs to be revised in areas of data and application domain specially to meet the security requirements for TaaS. Furthermore, we conclude that our proposed TaaS platform implements at least current security requirements outlined in OPNFV specification.

  • 21.
    Porambage, Pawani
    et al.
    University of Oulu, Finland.
    Braeken, An
    Vrije University of Brussel, Belgium.
    Kumar, Pardeep
    University of Oxford, England.
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Ylianttila, Mika
    University of Oulu, Finland.
    CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things2017Ingår i: Wireless personal communications, ISSN 0929-6212, E-ISSN 1572-834X, Vol. 96, nr 1, s. 421-440Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their resource capabilities and local networks. In order to provide seamless connectivity and interoperability, it is notable to maintain secure end-to-end (E2E) communication links in IoT. However, device constraints and the dynamic link creations make it challenging to use pre-shared keys for every secure E2E communication scenario in IoT. Variants of Host Identity Protocol (HIP) are adopted for constructing dynamic and secure E2E connections among the heterogeneous network devices with imbalanced resource profiles and less or no previous knowledge about each other. We propose a solution called collaborative HIP (CHIP) with an efficient key establishment component for the high resource-constrained devices in IoT. CHIP delegates the expensive cryptographic operations to the resource rich devices in the local networks. Finally, by providing quantitative performance evaluation and descriptive security analysis, we demonstrate the applicability of the key establishment in CHIP for the constrained IoT devices rather than the existing HIP variants.

  • 22.
    Sodhro, Ali Hassan
    et al.
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten. Electrical Engineering Department Sukkur IBA, Pakistan.
    Pirbhulal, Sandeep
    CAS, SIAT, Shenzhen, China .
    Sodhro, Gul Hassan
    Physics Shah Abdul Latif, Pakistan .
    Gurtov, Andrei
    Linköpings universitet, Institutionen för datavetenskap, Databas och informationsteknik. Linköpings universitet, Tekniska fakulteten.
    Muzamal, Muhammad
    Department of Computer Science Bahria University, Pakistan.
    Luo, Zongwei
    Shenzhen Key Laboratory of Computational Intelligence, China .
    A Joint Transmission Power Control and Duty-Cycle Approach for Smart Healthcare System2018Ingår i: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    Emerging revolution in the healthcare has caught the attention of both the industry and academia due to the rapid proliferation in the wearable devices and innovative techniques. In the mean-time, Body Sensor Networks (BSNs) have become the potential candidate in transforming the entire landscape of the medical world. However, large battery lifetime and less power drain are very vital for these resource-constrained sensor devices while collecting the bio-signals. Hence, minimizing their charge and energy depletions are still very challenging tasks. It is examined through large real-time data sets that due to the dynamic nature of the wireless channel, the traditional predictive transmission power control (PTPC) and a constant transmission power techniques are no more supportive and potential candidates for BSNs. Thus this paper first, proposes a novel joint transmission power control (TPC) and duty-cycle adaptation based framework for pervasive healthcare. Second, adaptive energy-efficient transmission power control (AETPC) algorithm is developed by adapting the temporal variation in the on-body wireless channel amid static (i.e., standing and walking at a constant speed) and dynamic (i.e., running) body postures. Third, a Feedback Control-based duty-cycle algorithm is proposed for adjusting the execution period of tasks (i.e., sensing and transmission). Fourth, system-level battery and energy harvesting models are proposed for body sensor nodes by examining the energy depletion of sensing and transmission tasks. It is validated through Monte Carlo experimental analysis that proposed algorithm saves more energy of 11.5% with reasonable packet loss ratio (PLR) by adjusting both transmission power and duty-cycle unlike the conventional constant TPC and PTPC methods.

1 - 22 av 22
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • oxford
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf