SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Gurtov Andrei) "

Sökning: WFRF:(Gurtov Andrei)

  • Resultat 1-10 av 87
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  •  
2.
  • Ahmad, Ijaz, et al. (författare)
  • 5G Security: Analysis of Threats and Solutions
  • 2017
  • Ingår i: 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN). - : IEEE. - 9781538630709 - 9781538630716 ; , s. 193-199
  • Konferensbidrag (refereegranskat)abstract
    • 5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing security challenges in these technologies besides the growing concerns for user privacy. In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G. Furthermore, we present security solutions to these challenges and future directions for secure 5G systems.
  •  
3.
  • Ahmad, Ijaz, et al. (författare)
  • Analysis of Deployment Challenges of Host Identity Protocol
  • 2017
  • Ingår i: 2017 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC). - : IEEE. - 9781538638736
  • Konferensbidrag (refereegranskat)abstract
    • Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited deployment and highlight the challenges faced by HIP for its commercial use. We propose technological development and outline deployment strategies for the wide use of HIP. Furthermore, this paper investigates the use of HIP in Software Defined Networks (SDN) to evaluate its performance in new disruptive networking technologies. In a nutshell, this paper presents revealing challenges for the deployment of innovative networking protocols and a way ahead for successful and large scale deployment.
  •  
4.
  • Ahmad, Ijaz, et al. (författare)
  • Machine Learning Meets Communication Networks: Current Trends and Future Challenges
  • 2020
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 8, s. 223418-223460
  • Tidskriftsartikel (refereegranskat)abstract
    • The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future communicating devices and services. In this article, we provide a detailed account of current research on the application of ML in communication networks and shed light on future research challenges. Research on the application of ML in communication networks is described in: i) the three layers, i.e., physical, access, and network layers; and ii) novel computing and networking concepts such as Multi-access Edge Computing (MEC), Software Defined Networking (SDN), Network Functions Virtualization (NFV), and a brief overview of ML-based network security. Important future research challenges are identified and presented to help stir further research in key areas in this direction.
  •  
5.
  • Ahmad, Ijaz, et al. (författare)
  • Security of Satellite-Terrestrial Communications : Challenges and Potential Solutions
  • 2022
  • Ingår i: IEEE Access. - : Institute of Electrical and Electronics Engineers (IEEE). - 2169-3536. ; 10, s. 96038-96052
  • Tidskriftsartikel (refereegranskat)abstract
    • The integration of satellite and terrestrial networks has become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical infrastructures in remote locations in sea, on land and in space will be seamlessly connected through a diverse set of terrestrial and non-terrestrial communication technologies. However, the integration of terrestrial and non-terrestrial systems will open up both systems to unique security challenges that can arise due to the migration of security challenges from one to another. Similarly, security challenges can also arise due to the incompatibility of distinct systems or incoherence of security policies. The resulting security implications, thus, can be highly consequential due to the criticality of the infrastructures such as space stations, autonomous ships, and airplanes, for instance. Therefore, in this article we study existing security challenges in satellite-terrestrial communication systems and discuss potential solutions for those challenges. Furthermore, we provide important research directions to encourage future research on existing security gaps.
  •  
6.
  • Ahmed, Ijaz, et al. (författare)
  • Security for 5G and Beyond
  • 2019
  • Ingår i: IEEE Communications Surveys and Tutorials. - USA : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 21:4, s. 3682-3722
  • Tidskriftsartikel (refereegranskat)abstract
    • The development of the Fifth Generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This article outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as Future Generations (XG) in this paper. In brief, this article highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
  •  
7.
  • Alizadeh Noghani, Kyoomars (författare)
  • Towards Seamless Live Migration in SDN-Based Data Centers
  • 2018
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Live migration of Virtual Machines (VMs) has significantly improved the flexibility of modern Data Centers (DCs). Ideally, live migration ought to be seamless which in turn raises challenges on how to minimize service disruption and avoid performance degradation. To address these challenges, a comprehensive support from the underlying network is required. However, legacy DC networks fall short to help as they take a reactive approach to live migration procedure. Moreover, the complexity and inflexibility of legacy DC networks make it difficult to deploy, manage, and improve network technologies that DC providers may need to use for migration.In this thesis, we explore the application of Software Defined Networking (SDN) paradigm for making live VM migration more seamless. Exploiting the characteristics of SDN such as its centralized view on network states, we contribute to the body of knowledge by enhancing the quality of intra- and inter-DC live migration. Firstly, for intra-DC migration, we provide an SDN-based solution which minimizes the service disruption by employing OpenFlow-based resiliency mechanisms to prepare a DC network for migration proactively. Secondly, we improve the inter-DC live migration by accelerating the network convergence through announcing the migration in the control plane using MP-BGP protocol. Further, our proposed framework resolves the sub-optimal routing problem by conducting the gateway functionality at the SDN controller. Finally, with the ultimate goal of improving the inter-DC migration, we develop an SDN-based framework which automates the deployment, improves the management, enhances the performance, and increases the scalability of interconnections among DCs.
  •  
8.
  • Avgouleas, Ioannis, 1983-, et al. (författare)
  • A Wireless Caching Helper System Serving Heterogeneous Traffic with Secrecy Constraints
  • 2024
  • Ingår i: <em>Proceedings - IEEE CHILEAN Conference on Electrical, Electronics Engineering, Information and Communication Technologies, ChileCon</em>. - : IEEE. - 9798350369533
  • Konferensbidrag (refereegranskat)abstract
    • In this paper, we analyze the performance of a wireless caching system with heterogeneous traffic and relaying capabilities satisfying secrecy constraints for one of two receiving users. In this setup, the second user has no secrecy requirements and receives cacheable content either from the relay helper or the core network through a wireless base station. The wireless relay helper can assist both users since it is equipped with finite storage that is split into cacheable and non-cacheable storage. Concurrently, a passive eavesdropper tries to overhear transmissions to the user with secrecy requirements. Consequently, we examine how this relay’s storage split and the eavesdropper affect the performance of the average throughput and delay of the system as the transmission powers, the relay’s transmission probability, and the relay’s cache size vary. © 2023 IEEE.
  •  
9.
  • Bhattacherjee, Debopam, et al. (författare)
  • Watch your step! Detecting stepping stones in programmable networks
  • 2019
  • Ingår i: ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). - : IEEE. - 9781538680889 - 9781538680896
  • Konferensbidrag (refereegranskat)abstract
    • Hackers hide behind compromised intermediate hosts and pose advanced persistent threats (APTs). The compromised hosts are used as stepping stones to launch real attacks, as is evident from an incident that shook the world in 2016 - Panama Papers Leak. The major attack would not go unnoticed if the compromised stepping stone, in this case an email server, could be identified in time. In this paper, we explore how todays programmable networks could be retrofitted with effective stepping stone detection mechanisms to correlate flows. We share initial results to prove that such a setup exists. Lastly, we analyze scalability issues associated with the setup and explore recent developments in network monitoring which have potential to address these issues.
  •  
10.
  • Blåberg, Anton, et al. (författare)
  • Simulating ADS-B Attacks in Air Traffic Management
  • 2020
  • Ingår i: 2020 AIAA/IEEE 39TH DIGITAL AVIONICS SYSTEMS CONFERENCE (DASC) PROCEEDINGS. - : IEEE. - 9781728198255
  • Konferensbidrag (refereegranskat)abstract
    • In Air Traffic Management (ATM) training, simulations of real air traffic control (ATC) scenarios are a key part of practical teaching. On the internet one may find multiple different ATM simulators available to the public with open source code. Today most aircraft transmit data about position, altitude, and speed into the atmosphere that practically are unencrypted data points. This data is called automatic dependant surveillance broadcast (ADS-B) data. The lack of security means that potential attackers could project "fake" ADS-B data and spoof existing data to air traffic controllers (ATCO) if the right equipment is used. We see this as a security flaw and we want to prepare ATCO for cyberattacks by modifying an ATM simulator with cyberattacks. First, OpenScope was chosen as the ATM simulator to be modified. Subsequently, three types of attacks were chosen for the simulator to be equipped with, based on ADS-B weaknesses from existing literature: aircraft not responding to commands, aircraft with altering positional data, and aircraft with incorrect speed and altitude data. The recorded parameters were the written command lines and corresponding aircraft type it was applied to. Using this modified simulator, ATCO can now be evaluated against cyberattacks.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 87
Typ av publikation
tidskriftsartikel (40)
konferensbidrag (34)
rapport (5)
bokkapitel (3)
doktorsavhandling (2)
licentiatavhandling (2)
visa fler...
forskningsöversikt (1)
visa färre...
Typ av innehåll
refereegranskat (78)
övrigt vetenskapligt/konstnärligt (9)
Författare/redaktör
Gurtov, Andrei (53)
Gurtov, Andrei, 1979 ... (31)
Ylianttila, Mika (16)
Liyanage, Madhusanka (14)
Khan, Suleman (13)
Kumar, Pardeep (11)
visa fler...
Porambage, Pawani (8)
Sodhro, Ali Hassan (6)
Ahmad, Ijaz (5)
Braeken, An (5)
Borhani, Mohammad, 1 ... (4)
Wiethuechter, Adam (4)
Moskowitz, Robert (4)
Pirbhulal, Sandeep (4)
Singh, Gurjot (4)
Singh Gaba, Gurjot, ... (4)
Wang, Lei (3)
Yla-Jaaski, Antti (3)
Avgouleas, Ioannis, ... (3)
Sodhro, Ali Hassan, ... (3)
Hasselquist, David (3)
Card, Stuart W. (3)
Sadqi, Yassine (3)
Korzun, Dmitry (3)
Lukyanenko, Andrey (3)
Thorn, Joakim (3)
Wahlgren, Alex (3)
Kashevnik, Alexey (2)
Okwuibe, Jude (2)
Harjula, Erkki (2)
Polishchuk, Tatiana (2)
Jurcut, Anca Delia (2)
Chakir, Oumaima (2)
Rehaimi, Abdeslam (2)
Singh Gaba, Gurjot (2)
Korzhitskii, Nikita (2)
Fuchs, Adel (2)
Stulman, Ariel (2)
R., Moskowitz (2)
S., Card (2)
A., Wiethuechter (2)
Khodari, Mohammad (2)
Rawat, Abhimanyu (2)
Gurtov, Andrei, Prof ... (2)
Lagutin, Dmitrij (2)
Lashkov, Igor (2)
Iinatti, Jari (2)
Sain, Mangal (2)
Ha, Phuong H. (2)
Zahid, Noman (2)
visa färre...
Lärosäte
Linköpings universitet (81)
Luleå tekniska universitet (2)
Karlstads universitet (2)
Högskolan Kristianstad (1)
Kungliga Tekniska Högskolan (1)
Uppsala universitet (1)
visa fler...
Mittuniversitetet (1)
VTI - Statens väg- och transportforskningsinstitut (1)
visa färre...
Språk
Engelska (87)
Forskningsämne (UKÄ/SCB)
Teknik (60)
Naturvetenskap (30)

År

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy