SwePub
Sök i SwePub databas

  Utökad sökning

Träfflista för sökning "WFRF:(Ylianttila Mika) "

Sökning: WFRF:(Ylianttila Mika)

  • Resultat 1-10 av 21
Sortera/gruppera träfflistan
   
NumreringReferensOmslagsbildHitta
1.
  • Ahmad, Ijaz, et al. (författare)
  • 5G Security: Analysis of Threats and Solutions
  • 2017
  • Ingår i: 2017 IEEE CONFERENCE ON STANDARDS FOR COMMUNICATIONS AND NETWORKING (CSCN). - : IEEE. - 9781538630709 - 9781538630716 ; , s. 193-199
  • Konferensbidrag (refereegranskat)abstract
    • 5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing towards their use in 5G. However, there are pressing security challenges in these technologies besides the growing concerns for user privacy. In this paper, we provide an overview of the security challenges in these technologies and the issues of privacy in 5G. Furthermore, we present security solutions to these challenges and future directions for secure 5G systems.
  •  
2.
  • Ahmad, Ijaz, et al. (författare)
  • Analysis of Deployment Challenges of Host Identity Protocol
  • 2017
  • Ingår i: 2017 EUROPEAN CONFERENCE ON NETWORKS AND COMMUNICATIONS (EUCNC). - : IEEE. - 9781538638736
  • Konferensbidrag (refereegranskat)abstract
    • Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited deployment and highlight the challenges faced by HIP for its commercial use. We propose technological development and outline deployment strategies for the wide use of HIP. Furthermore, this paper investigates the use of HIP in Software Defined Networks (SDN) to evaluate its performance in new disruptive networking technologies. In a nutshell, this paper presents revealing challenges for the deployment of innovative networking protocols and a way ahead for successful and large scale deployment.
  •  
3.
  • Ahmad, Ijaz, et al. (författare)
  • Machine Learning Meets Communication Networks: Current Trends and Future Challenges
  • 2020
  • Ingår i: IEEE Access. - : IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC. - 2169-3536. ; 8, s. 223418-223460
  • Tidskriftsartikel (refereegranskat)abstract
    • The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future communicating devices and services. In this article, we provide a detailed account of current research on the application of ML in communication networks and shed light on future research challenges. Research on the application of ML in communication networks is described in: i) the three layers, i.e., physical, access, and network layers; and ii) novel computing and networking concepts such as Multi-access Edge Computing (MEC), Software Defined Networking (SDN), Network Functions Virtualization (NFV), and a brief overview of ML-based network security. Important future research challenges are identified and presented to help stir further research in key areas in this direction.
  •  
4.
  • Ahmed, Ijaz, et al. (författare)
  • Security for 5G and Beyond
  • 2019
  • Ingår i: IEEE Communications Surveys and Tutorials. - USA : Institute of Electrical and Electronics Engineers (IEEE). - 1553-877X. ; 21:4, s. 3682-3722
  • Tidskriftsartikel (refereegranskat)abstract
    • The development of the Fifth Generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has grown enormously due to the unprecedented increase in types of services and in the number of devices. Therefore, security solutions if not developed yet must be envisioned already to cope with diverse threats on various services, novel technologies, and increased user information accessible by the network. This article outlines the 5G network threat landscape, the security vulnerabilities in the new technological concepts that will be adopted by 5G, and provides either solutions to those threats or future directions to cope with those security challenges. We also provide a brief outline of the post-5G cellular technologies and their security vulnerabilities which is referred to as Future Generations (XG) in this paper. In brief, this article highlights the present and future security challenges in wireless networks, mainly in 5G, and future directions to secure wireless networks beyond 5G.
  •  
5.
  • Granlund, Daniel (författare)
  • Secure and scalable roaming support in heterogeneous access networks
  • 2011
  • Licentiatavhandling (övrigt vetenskapligt/konstnärligt)abstract
    • Mobility support for users connecting to the Internet is an increasing trend. Different types of access networks like WiFi, CDMA, and UMTS are available, creating a heterogeneous access network environment. In the Internet today, there are a number of providers of various sizes supporting different technologies. Moving between such operators different types of authentication methods are often used interrupting ongoing services. This, in combination with lacking roaming agreements makes mobility among them with maintained connectivity and uninterrupted services difficult or even impossible.This thesis proposes an extended functionality to the Authentication, Authorization and Accounting, (AAA) protocol that enables a single AAA infrastructure to exist in a heterogeneous network environment and that enables interconnection between different operators in a tree-like structure of AAA servers. Mobile devices will maintain their IP address while connected to a network different from the home network independent of the network access technology. Furthermore, a scalability study is carried out in order to determine what is required from an AAA system in order for it to perform when dealing with larger numbers of users, service providers as well as supporting new technologies. A method for providing information for handover decisions for intra- and inter-operator mobility is also proposed. The proposed method selects the access network that according to a metric based on jitter and delay shows best performance.Evaluations show that authentication and IP address assignment can be supported in an efficient way in comparison with state of the art for both Ethernet and PPP based access networks using a common AAA infrastructure. CPU, memory and network link capacity in the home AAA server are identified as the primary bottlenecks when discussing scalability in RADIUS based AAA infrastructures and guidelines are proposed to address scalability issues during system design. The metric proposed to support in handover decisions shows that bandwidth can be estimated with more than 90% accuracy for WiFi, CDMA, and UMTS access networks.
  •  
6.
  • Harjula, Erkki, et al. (författare)
  • Analysis of Peer-to-Peer SIP in a Distributed Mobile Middleware System
  • 2006
  • Ingår i: 49th IEEE Global Telecommunications Conference.
  • Konferensbidrag (refereegranskat)abstract
    • The seamless and flexible interconnection of the existing and emerging protocols and networks is essential to the success of the new generation mobile applications and services. For exploiting the functional diversity, we have developed a middleware for mobile devices called the Plug-and-Play Application Platform (PnPAP). We have previously studied the Session Initiation Protocol (SIP) as an interconnecting protocol for the PnPAP nodes. In this paper, we analyze the usage of a new variant of SIP called Peer-to-Peer SIP (P2P SIP) for this purpose. Our interconnection architecture utilizes layered (hierarchical) P2P SIP to establish a self-organizing, failure tolerant overlay signaling network between PnPAP nodes. Signaling latency and scalability of the layered P2P SIP signaling is compared in a simulation environment with both the traditional client-server SIP and fully distributed P2P SIP. Simulation results illustrate the benefits of the layered P2P SIP solution where only the supernodes participate to the DHT management, enabling light-weight peer node implementation for mobile nodes.
  •  
7.
  • Harjula, Erkki, et al. (författare)
  • Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes
  • 2016
  • Ingår i: SUSTAINABLE COMPUTING-INFORMATICS and SYSTEMS. - : ELSEVIER SCIENCE BV. - 2210-5379. ; 12, s. 43-54
  • Tidskriftsartikel (refereegranskat)abstract
    • In this article, we propose an energy -aware load monitoring model, called e-Mon, for enabling energy aware load balancing in Peer-to-Peer (P2P) systems. P2P is a scalable and self-organizing technology for utilizing computational resources of the end-user devices for the benefit of a computing system. In P2P systems, the need for fair balance of load is crucial since the end-users need to be incentivized to participate in the system. The short battery life, caused by additional strain on the computational resources of the end-user devices, is a significant negative incentive factor for mobile end-users of current P2P systems. The e-Mon model, proposed in this article, enables moving load from energy-critical to less energy-critical nodes in P2P systems. This is done by including the energy status of a peer node as one of the factors defining a nodes load. The model helps saving the energy of mobile P2P nodes, particularly in cases when the remaining battery capacity is low. The article provides a thorough energy efficiency evaluation demonstrating that e-Mon can significantly improve the battery life of mobile nodes by improving the quality and fairness of load balance between heterogeneous nodes. With a proper selection of a load balancing model for the application scenario, e-Mon is shown to achieve up to 470% battery life extension compared to the case with traditional load balancing with no battery monitoring. (C) 2016 Elsevier Inc. All rights reserved.
  •  
8.
  • Howie, Douglas, et al. (författare)
  • Harnessing SIP for Autonomous Mobile Peer-to-Peer Networking
  • 2005
  • Ingår i: Proc. IEEE Global Communications Conference. - 0780394143 ; , s. 879-883
  • Konferensbidrag (refereegranskat)abstract
    • There are several non-interoperable peer-to-peer (P2P) protocols available today with different functionalities. In order to exploit this functional diversity on mobile devices, we have developed a plug-and-play application platform (PnPAP). PnPAP provides autonomous, dynamic selection between multiple P2P protocols while ensuring the best available network connectivity. In this paper, we introduce methods for utilizing session initiation protocol (SIP) in inter-PnPAP communications. This communication may include downloads of distributed P2P resources such as polymorphic protocol libraries or dynamic state-machine control modules. These components are then used to optimize connectivity management between heterogeneous wireless access networks. In addition, context information may be exchanged between mobile nodes in order to facilitate extended service availability, operability and quality. We analyze the feasibility of merged P2P and All-IP (including SIP) architecture through the novel use of a specialized SIP server and the leveraging of the emerging instant messaging capabilities of SIP. Preliminary measurement results from the prototype implementation on a Symbian platform and test-bed, with overhead and latency analysis, illustrate the feasibility of this approach.
  •  
9.
  • Howie, Douglas, et al. (författare)
  • State-of-the-art SIP for mobile application supernetworking
  • 2004
  • Ingår i: Proceedings of the Nordic Radio Symposium.
  • Konferensbidrag (refereegranskat)abstract
    • This paper introduces the current state-of-the-art of SIP (Session Initiation Protocol) and the use of SIP in supporting P2P (peer-to-peer) applications on mobile phones. The use of SIP in All-IP mobile phones is a step toward achieving supernetworking, providing the user with powerful yet conceptually simple tools for sending and receiving multimedia content over a wireless network. The analysis includes an introduction of the application supernetworking concept in detail, with insight into the role of SIP in the current and future implementations.
  •  
10.
  • Liyanage, Madhusanka, et al. (författare)
  • Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services
  • 2017
  • Ingår i: 2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT). - : IEEE. - 9781538609583 ; , s. 286-291
  • Konferensbidrag (refereegranskat)abstract
    • Ethernet based VPLS (Virtual Private LAN Service) networks are now becoming attractive in many enterprise applications due to simple, protocol-independent and cost efficient operation. However, new VPLS applications demand additional requirements, such as elevated security, enhanced scalability and improved flexibility. This paper summarized the results of a thesis which focused to increase the scalability, flexibility and compatibility of secure VPLS networks. First, we propose a scalable secure flat-VPLS architecture based on Host Identity Protocol (HIP) to increase the forwarding and security plane scalability. Then, a secure hierarchical-VPLS architecture has been proposed by extending the previous proposal to achieve control plane scalability as well. To solve the compatibility issues of Spanning Tree Protocol (STP) in VPLS networks, a novel Distributed STP (DSTP) is proposed. Lastly, we propose a novel SDN (Software Defined Networking) based VPLS (SoftVPLS) architecture to overcome tunnel management limitations in legacy secure VPLS architectures. Simulation models and testbed implementations are used to verify the performance of proposed solutions.
  •  
Skapa referenser, mejla, bekava och länka
  • Resultat 1-10 av 21

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy