Andrei Gurtov

Andrei Gurtov
Linköping University | LiU · Department of Computer and Information Science (IDA)

PhD, Professor

About

358
Publications
282,601
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,488
Citations
Introduction
Andrei Gurtov received his M.Sc (2000) and Ph.D. (2004) degrees in Computer Science from the University of Helsinki/ICSI at Berkeley. He is presently a Professor in Linköping University, Sweden. He is also an adjunct professor at Aalto University, University of Helsinki and University of Oulu. He is an ACM Distinguished Scientist, IEEE ComSoc Distinguished Lecturer and Chair of IEEE Sweden section.
Additional affiliations
August 2016 - present
Linköping University
Position
  • Professor (Full)
January 2013 - July 2013
University of California, Berkeley
Position
  • Researcher
May 2000 - August 2004
Teliasonera
Position
  • Senior Researcher
Education
January 2000 - May 2004
University of Helsinki
Field of study
  • Computer Science
January 1998 - May 2000
University of Helsinki
Field of study
  • Computer Science

Publications

Publications (358)
Article
Full-text available
The Host Identity Protocol (HIP) is an inter-networking architecture and an associated set of protocols, developed at the IETF since 1999 and reaching their first stable version in 2007. HIP enhances the original Internet architecture by adding a name space used between the IP layer and the transport protocols. This new name space consists of crypt...
Article
Full-text available
The Host Identity Indirection Infrastructure (Hi3) is a networking architecture for mobile hosts, derived from the Internet Indirection Infrastructure (i3) and the Host Identity Protocol (HIP). Hi3 has efficient support for secure mobility and multihoming, which both are crucial for future Internet applications. In this paper, we describe and analy...
Conference Paper
Full-text available
Delays on Internet paths, especially including wireless links, can be highly variable. On the other hand, a current trend for modern TCPs is to deploy a fine-grain retransmission timer with a lower minimum timeout value than 1 s suggested by RFC2988. Spurious TCP timeouts cause unnecessary retransmissions and congestion control back-off. The Eifel...
Article
Full-text available
Wireless links have intrinsic characteristics that affect the performance of transport protocols; these include variable bandwidth, corruption, channel allocation delays, and asymmetry. In this paper we review simulation models for cellular, WLAN and satellite links used in the design of transport protocols, and consider the interplay between wirel...
Conference Paper
Full-text available
Digitalisation offers many benefits to Air Traffic Management. Yet, with technological innovations come challenges in managing new cyber security threats and risks. This paper presents a comprehensive review over challenges faced in ATM when protecting critical assets, and outlines how the newly established exploratory research project SEC-AIRSPACE...
Preprint
Full-text available
Deep learning has been proven to be a powerful tool for addressing the most significant issues in cognitive radio networks, such as spectrum sensing, spectrum sharing, resource allocation, and security attacks. The utilization of deep learning techniques in cognitive radio networks can significantly enhance the network's capability to adapt to chan...
Article
The L-band Digital Aeronautical Communications System (LDACS) is a key advancement for next-generation aviation networks, enhancing Communication, Navigation, and Surveillance (CNS) capabilities. It operates with VHF Datalink mode 2 (VDLm2) and features a seamless handover mechanism to maintain uninterrupted communication between aircraft and groun...
Article
Full-text available
Industrial device scanners allow anyone to scan devices on private networks and the Internet. They were intended as network security tools, but they are commonly exploited as attack tools, as scanning can reveal vulnerable devices. However, from a defensive perspective, this vulnerability disclosure could be used to secure devices if characteristic...
Article
Full-text available
Cybersecurity assessments are critical for ensuring that security measures in organizational infrastructures, systems, and applications meet necessary requirements. Given the significant HTTPS vulnerabilities exposed in recent years, assessing HTTPS deployments is increasingly important. However, there has been no systematic literature review (SLR)...
Article
Full-text available
Generative adversarial networks (GANs), a category of deep learning models, have become a cybersecurity concern for wireless communication systems. These networks enable potential attackers to deceive receivers that rely on convolutional neural networks (CNNs) by transmitting deceptive wireless signals that are statistically indistinguishable from...
Conference Paper
The integration of technologies like the Internet of Things (IoT), Big data, and Artificial Intelligence (AI) has empowered modern vehicles with the ability to communicate with one another for better cooperation on the roads. However, the communication between vehicles exposes the whole intelligent transportation system to new attack vectors. Malic...
Conference Paper
The aviation industry faces significant challenges due to rising global air travel demand. Frequency saturation in Air Traffic Management (ATM) leads to communication problems, necessitating the enhancement of traditional systems. The Single European Sky ATM Research (SESAR) initiative, backed by the European Commission, aims to digitize ATM, with...
Article
Controller-Pilot Data Link Communications (CPDLC) are rapidly replacing voice-based Air Traffic Control (ATC) communications worldwide. Being digital, CPDLC is highly resilient and bandwidth efficient, which makes it the best choice for traffic-congested airports. Although CPDLC initially seems to be a perfect solution for modern-day ATC operations...
Article
Full-text available
Cybersecurity attacks that target software have become profitable and popular targets for cybercriminals who consciously take advantage of web-based vulnerabilities and execute attacks that might jeopardize essential industry 5.0 features. Several machine learning-based techniques have been developed in the literature to identify these types of ass...
Article
Full-text available
Virtual Private LAN Service (VPLS) is a VPN technology that connects remote client sites with provider networks in a transparent manner. Session key-based HIPLS (S-HIPLS) is a VPLS architecture based on the Host Identity Protocol (HIP) that provides a secure VPLS architecture using a Key Distribution Center (KDC) to implement security mechanisms su...
Article
Full-text available
This paper explores the potential use of blockchain technology to register drones. Using blockchain, a unique and tamper-proof identifier can be assigned to each drone, enabling real-time tracking, secure data exchange, and improved compliance with regulations and laws. This paper argues that integrating blockchain into drone registration can incre...
Article
Full-text available
Ambient Intelligence (AmI) in Internet of Things (IoT) has empowered healthcare professionals to monitor, diagnose, and treat patients remotely. Besides, the AmI-IoT has improved patient engagement and gratification as doctors’ interactions have become more comfortable and efficient. However, the benefits of the AmI-IoT-based healthcare application...
Article
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G radio networks. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of D...
Conference Paper
Full-text available
The safety of the passengers and goods in airplanes depends upon a number of combined factors. An airplane’s condition and the pilot’s experience are pivotal but another very crucial element is the synchronization among the pilots and the air traffic controller (ATC). The communication link between the two carries many uncertain aspects. The aviati...
Conference Paper
Full-text available
Virtual Private LAN Services are becoming popular for securely connecting geographically dispersed devices to a common protected LAN network isolated from the rest of the Internet. Traditional IP routing protocols cannot provide such connectivity; thus an overlay network of encrypted HIP/IPsec tunnels can be used instead. However, the number of ful...
Article
Full-text available
The coronavirus pandemic has overburdened medical institutions, forcing physicians to diagnose and treat their patients remotely. Moreover, COVID-19 has made humans more conscious about their health, resulting in the extensive purchase of IoT-enabled medical devices. The rapid boom in the market worth of the internet of medical things (IoMT) captur...
Preprint
Full-text available
p>The integration of satellite and terrestrial networks have become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical infrastructures in remote locations in sea, land and space will be seamlessly connected through a diverse set o...
Preprint
Full-text available
p>The integration of satellite and terrestrial networks have become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical infrastructures in remote locations in sea, land and space will be seamlessly connected through a diverse set o...
Article
Full-text available
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number of innovative applications. Particularly, 6G will be a prominent supporter for the evolution towards a truly Intelligent Transportation System and...
Article
Full-text available
The integration of satellite and terrestrial networks has become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical infrastructures in remote locations in sea, on land and in space will be seamlessly connected through a diverse se...
Preprint
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In t...
Article
Full-text available
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to different types of cyber‐attacks. These vulnerabilities could cause attackers to crash into the network breaching the integrity and confidentiality of the smart grid systems. Therefore, an intrusion detection system (IDS) becomes an important way to p...
Article
Full-text available
Virtual Private LAN services (VPLS) is a Layer 2 Virtual Private Network (L2VPN) service that has gained immense popularity due to a number of its features, such as protocol independence, multipoint-to-multipoint mesh connectivity, robust security, low operational cost (in terms of optimal resource utilization), and high scalability. In addition to...
Article
Full-text available
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible...
Chapter
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In t...
Article
Today’s vehicles are examples of Cyber-Physical Systems (CPS) controlled by a large number of electronic control units (ECUs), which manage everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU to be able to ensure the integrity of the firmware runni...
Article
Full-text available
The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future comm...
Article
Fifth generation (5G) technologies have become the center of attention in managing and monitoring high-speed transportation system effectively with the intelligent and self-adaptive sensing capabilities. Besides, the boom in portable devices has witnessed a huge breakthrough in the data driven vehicular platform. However, sensor-based Internet of T...
Article
The convergence of Artificial Intelligence (AI) and Internet of Things (IoT) promotes the energy efficient communication in smart homes. Quality of Service (QoS) optimization during video streaming through wireless micro medical devices (WMMD) in smart healthcare homes is the main purpose of this research. This paper contributes in four distinct wa...
Chapter
Full-text available
Driven by the requirement of increasing performance and flexibility, networks are being softwarized by paradigms such as software-defined networking (SDN) and network function virtualization (NFV). These solutions reduce the complexity and the specialization of hardware devices, by extracting the inherently distributed control plane of forwarding n...
Article
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G involve multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas: Tru...
Preprint
Full-text available
6G White paper: Research challenges for Trust, Security and Privacy
Preprint
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust:...
Technical Report
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust:...
Article
The paper presents an approach and case study of a distributed driver monitoring system. The system utilizes smartphone sensors for detecting dangerous states for a driver in a vehicle. We use a mounted smartphone on a vehicle windshield directed towards the driver’s face tracked by the front-facing camera. Using information from camera video frame...
Chapter
Full-text available
The popularity of new cyber-physical systems(CPS) such as Industrial Internet or Industrial Internet of Things (IIoT) in new applications is creating new requirements such as high security, enhanced scalability, and optimal utilization of network resources, efficient energy management and low operational cost. Specifically, the increasing number of...
Article
Full-text available
The goal of this paper is to develop, deploy, test, and evaluatea a lightweight portable intrusion detection system (LPIDS) over wireless networks by adopting two different string matching algorithms: Aho‐Corasick algorithm and Knuth‐Morris‐Pratt algorithm (KMP). Thus, this research contributes in three ways. First, an efficient and lightweight IDS...
Article
Key sharing has always been a complex issue. It became even more challenging for the Internet of Things (IoT), where a trusted third party for global management rarely exists. With authentication and confidentiality lacking, things resort to a leap of faith (LoF) paradigm where it is assumed that no attacker is present during the initial configurat...
Article
Full-text available
The search engine Shodan crawls the Internet for, among other things, Industrial Control Systems (ICS). ICS are devices used to operate and automate industrial processes. Due to the increasing popularity of the Internet, these devices are getting more and more connected to the Internet. These devices will, if not hidden, be shown on Shodan. This st...
Conference Paper
Today's vehicles are equipped with a large number of Electronic Control Units (ECUs), which control everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU to be able to ensure the integrity of the firmware running on other ECU's to guarantee its own c...
Article
This paper presents a methodology and mobile application for driver monitoring, analysis, and recommendations based on detected unsafe driving behavior for accident prevention using a personal smartphone. For the driver behavior monitoring, the smartphone's cameras and built-in sensors (accelerometer, gyroscope, GPS, and microphone) are used. A dev...
Preprint
Full-text available
The development of the Fifth Generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has...
Conference Paper
Full-text available
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing the capabilities of sensor networks. In this paper,...
Article
Full-text available
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for the constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet of Things (IoT). However, a full-fledged CoAP-based app...
Conference Paper
Full-text available
The widespread Internet of Things (IoT) ecosystems empower the deployment of various Bluetooth Low Energy (BLE) sensor nodes in many ambient assisted living (AAL) type applications. Regardless of their limitations, these low-power IoT sensor nodes need pervasive and secure connections to transfer the aggregated data to the central servers located i...
Article
Emerging revolution in the healthcare has caught the attention of both the industry and academia due to the rapid proliferation in the wearable devices and innovative techniques. In the mean-time, Body Sensor Networks (BSNs) have become the potential candidate in transforming the entire landscape of the medical world. However, large battery lifetim...
Preprint
Full-text available
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-sight processing and managing capabilities of sensor networks. In this paper we...
Article
Full-text available
In this paper, we propose a game-theoretic model of the mobile network market. The market is presented by three sides: primary mobile network operators (MNO), mobile virtual network operators (MVNO) and consumers of the services. MVNO are mobile operators without their own infrastructure. They buy resources from MNO and compete with other MVNO for...
Article
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart energy networks. Smart meter is a digital device that makes use of two-way communication between consumer and utility to exchange, manage and control energy consumptions within a home. However, despite all the features, a smart meter raises several...
Conference Paper
Full-text available
Internet of Things(IoT) devices need pervasive and secure connections to transfer the aggregated data to the central servers located in remote clouds where the collected data further processed and stored. However, most of low-power IoT devices can not transmit the collected the data directly to such servers due the limited transmission power and ra...
Article
Full-text available
Nowadays it is highly important for any organization to manage its resources effectively because of an unstable economy. There are two main resources of an organization: human resources and knowledge, which humans have. One of the ways for knowledge management is formalization of the competence management process by means of information systems. Th...