Andrei Gurtov

Andrei Gurtov
Linköping University | LiU · Department of Computer and Information Science (IDA)

PhD, Professor

About

330
Publications
218,883
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
8,057
Citations
Introduction
Andrei Gurtov received his M.Sc (2000) and Ph.D. (2004) degrees in Computer Science from the University of Helsinki/ICSI at Berkeley. He is presently a Professor in Linköping University, Sweden. He is also an adjunct professor at Aalto University, University of Helsinki and University of Oulu. He is an ACM Distinguished Scientist, IEEE ComSoc Distinguished Lecturer and Vice Chair of IEEE Sweden section.
Additional affiliations
August 2016 - present
Linköping University
Position
  • Professor (Full)
January 2013 - July 2013
University of California, Berkeley
Position
  • Researcher
January 2010 - December 2012
University of Oulu
Position
  • Professor (Full)
Education
January 2000 - May 2004
University of Helsinki
Field of study
  • Computer Science
January 1998 - May 2000
University of Helsinki
Field of study
  • Computer Science

Publications

Publications (330)
Article
Full-text available
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number of innovative applications. Particularly, 6G will be a prominent supporter for the evolution towards a truly Intelligent Transportation System and...
Preprint
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In t...
Article
Full-text available
Smart grid systems enhanced the capability of traditional power networks while being vulnerable to different types of cyber‐attacks. These vulnerabilities could cause attackers to crash into the network breaching the integrity and confidentiality of the smart grid systems. Therefore, an intrusion detection system (IDS) becomes an important way to p...
Article
Full-text available
Virtual Private LAN services (VPLS) is a Layer 2 Virtual Private Network (L2VPN) service that has gained immense popularity due to a number of its features, such as protocol independence, multipoint-to-multipoint mesh connectivity, robust security, low operational cost (in terms of optimal resource utilization), and high scalability. In addition to...
Article
Full-text available
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible...
Chapter
Dual Connectivity (DC) is an important lower-layer feature accelerating the transition from 4G to 5G that also is expected to play an important role in standalone 5G. However, even though the packet reordering introduced by DC can significantly impact the performance of upper-layer protocols, no prior work has studied the impact of DC on QUIC. In t...
Article
Today’s vehicles are examples of Cyber-Physical Systems (CPS) controlled by a large number of electronic control units (ECUs), which manage everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU to be able to ensure the integrity of the firmware runni...
Article
Full-text available
The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future comm...
Article
Fifth generation (5G) technologies have become the center of attention in managing and monitoring high-speed transportation system effectively with the intelligent and self-adaptive sensing capabilities. Besides, the boom in portable devices has witnessed a huge breakthrough in the data driven vehicular platform. However, sensor-based Internet of T...
Article
The convergence of Artificial Intelligence (AI) and Internet of Things (IoT) promotes the energy efficient communication in smart homes. Quality of Service (QoS) optimization during video streaming through wireless micro medical devices (WMMD) in smart healthcare homes is the main purpose of this research. This paper contributes in four distinct wa...
Chapter
Full-text available
Driven by the requirement of increasing performance and flexibility, networks are being softwarized by paradigms such as software-defined networking (SDN) and network function virtualization (NFV). These solutions reduce the complexity and the specialization of hardware devices, by extracting the inherently distributed control plane of forwarding n...
Article
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G involve multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas: Tru...
Article
Full-text available
The goal of this paper is to develop, deploy, test, and evaluatea a lightweight portable intrusion detection system (LPIDS) over wireless networks by adopting two different string matching algorithms: Aho‐Corasick algorithm and Knuth‐Morris‐Pratt algorithm (KMP). Thus, this research contributes in three ways. First, an efficient and lightweight IDS...
Preprint
Full-text available
6G White paper: Research challenges for Trust, Security and Privacy
Preprint
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust:...
Technical Report
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust:...
Article
The paper presents an approach and case study of a distributed driver monitoring system. The system utilizes smartphone sensors for detecting dangerous states for a driver in a vehicle. We use a mounted smartphone on a vehicle windshield directed towards the driver’s face tracked by the front-facing camera. Using information from camera video frame...
Article
Key sharing has always been a complex issue. It became even more challenging for the Internet of Things (IoT), where a trusted third party for global management rarely exists. With authentication and confidentiality lacking, things resort to a leap of faith (LoF) paradigm where it is assumed that no attacker is present during the initial configurat...
Chapter
Full-text available
The popularity of new cyber-physical systems(CPS) such as Industrial Internet or Industrial Internet of Things (IIoT) in new applications is creating new requirements such as high security, enhanced scalability, and optimal utilization of network resources, efficient energy management and low operational cost. Specifically, the increasing number of...
Article
Full-text available
The search engine Shodan crawls the Internet for, among other things, Industrial Control Systems (ICS). ICS are devices used to operate and automate industrial processes. Due to the increasing popularity of the Internet, these devices are getting more and more connected to the Internet. These devices will, if not hidden, be shown on Shodan. This st...
Conference Paper
Today's vehicles are equipped with a large number of Electronic Control Units (ECUs), which control everything from heating to steering and braking. Due to the increasing complexity and inter-dependency of these units, it has become essential for an ECU to be able to ensure the integrity of the firmware running on other ECU's to guarantee its own c...
Article
This paper presents a methodology and mobile application for driver monitoring, analysis, and recommendations based on detected unsafe driving behavior for accident prevention using a personal smartphone. For the driver behavior monitoring, the smartphone's cameras and built-in sensors (accelerometer, gyroscope, GPS, and microphone) are used. A dev...
Preprint
Full-text available
The development of the Fifth Generation (5G) wireless networks is gaining momentum to connect almost all aspects of life through the network with much higher speed, very low latency and ubiquitous connectivity. Due to its crucial role in our lives, the network must secure its users, components, and services. The security threat landscape of 5G has...
Conference Paper
Full-text available
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-site processing and managing the capabilities of sensor networks. In this paper,...
Article
Full-text available
The Constrained Application Protocol (CoAP) is a specialized web transfer protocol which is intended to be used for the constrained networks and devices. CoAP and its extensions (e.g., CoAP observe and group communication) provide the potential for developing novel applications in the Internet of Things (IoT). However, a full-fledged CoAP-based app...
Conference Paper
Full-text available
The widespread Internet of Things (IoT) ecosystems empower the deployment of various Bluetooth Low Energy (BLE) sensor nodes in many ambient assisted living (AAL) type applications. Regardless of their limitations, these low-power IoT sensor nodes need pervasive and secure connections to transfer the aggregated data to the central servers located i...
Article
Emerging revolution in the healthcare has caught the attention of both the industry and academia due to the rapid proliferation in the wearable devices and innovative techniques. In the mean-time, Body Sensor Networks (BSNs) have become the potential candidate in transforming the entire landscape of the medical world. However, large battery lifetim...
Preprint
Full-text available
The proliferation of the Internet of Things (IoT) technologies have strengthen the self-monitoring and autonomous characteristics of the sensor networks deployed in numerous application areas. The recent developments of the edge computing paradigms have also enabled on-sight processing and managing capabilities of sensor networks. In this paper we...
Article
Full-text available
In this paper, we propose a game-theoretic model of the mobile network market. The market is presented by three sides: primary mobile network operators (MNO), mobile virtual network operators (MVNO) and consumers of the services. MVNO are mobile operators without their own infrastructure. They buy resources from MNO and compete with other MVNO for...
Article
Smart meters are considered as foundational part of the smart metering infrastructure (SMI) in smart energy networks. Smart meter is a digital device that makes use of two-way communication between consumer and utility to exchange, manage and control energy consumptions within a home. However, despite all the features, a smart meter raises several...
Conference Paper
Full-text available
Internet of Things(IoT) devices need pervasive and secure connections to transfer the aggregated data to the central servers located in remote clouds where the collected data further processed and stored. However, most of low-power IoT devices can not transmit the collected the data directly to such servers due the limited transmission power and ra...
Article
Full-text available
Nowadays it is highly important for any organization to manage its resources effectively because of an unstable economy. There are two main resources of an organization: human resources and knowledge, which humans have. One of the ways for knowledge management is formalization of the competence management process by means of information systems. Th...
Article
Full-text available
The increased utilization of the new types of cockpit communications, including controller⁻pilot data link communications (CPDLC), puts the airplane at higher risk of hacking or interference than ever before. We review the technological characteristics and properties of the CPDLC and construct the corresponding threat model. Based on the limitation...
Article
Full-text available
Network communications and the Internet pervade our daily activities so deeply that we strongly depend on the availability and quality of the services they provide. For this reason, natural and technological disasters, by affecting network and service availability, have a potentially huge impact on our daily lives. Ensuring adequate levels of resil...
Article
Full-text available
Peer-to-peer (P2P) sharing systems use incentives for resource exchange to encourage cooperation and ensure fairness. In bilateral strategies, such as BitTorrent Tit-for-Tat or deficit-based FairTorrent, individual decisions of peers utilize direct observations. It may result in low performance and unfair treatment. In this paper, we study a novel...
Conference Paper
The search engine Shodan crawls the Internet to collect banners from Internet connected devices. When making this information publicly available, anyone can search and find these devices. Results from Shodan show that it is not only web or mail servers that are connected, but also industrial Control Systems (ICS) and Internet of Things (IoT) device...
Book
Full-text available
The book provides a reference material to a comprehensive study of 5G security. It offers an insight into the current and future threats to mobile networks and mechanisms to protect it. It covers the critical lifecycle functions and stages of 5G security, and how to build an effective security architecture for 5G based mobile networks. This is the...
Book
The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices. Security models for 3G and 4G networks based on Universal SIM cards worked very well. But they are not fully applicable to the unique security requirements of 5G networks. 5G will face additional challenges due to increased user privacy c...
Chapter
Full-text available
In this chapter, overview of the security challenges and requirements, and their possible solutions, are discussed. Starting from the recommendations and security challenges that will face 5G networks, the chapter goes in depth into the possible security technologies. Also provided are new technological concepts that are highly important in 5G with...
Conference Paper
As mobile and multi-homed devices are becoming ubiquitous, the need for a dynamic, yet secure communication protocol is unavoidable. The Host Identity Protocol (HIP) was constructed to meet this requirement; to provide significantly more secure mobility and multi-homing capabilities. HIP opportunistic mode, which is to be used when other, more trus...
Conference Paper
Full-text available
Information-Centric Networking (ICN) introduces a paradigm shift from a host centric communication model for Future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Emergency network in a disaster scenario or disruptive network presents a significant challenge to the ICN d...
Conference Paper
Full-text available
Virtual Private LAN Services (VPLS) is an Ethernet based VPN (Virtual Private Network) service which provides protocol independent and high speed multipoint-to-multipoint connectivity. In the article, we discuss the possibility to use emerging networks concepts such as Software Defined Networking (SDN) and Network Function Virtualization (NFV) to i...
Article
Full-text available
The Internet of Things (IoT) is the next evolutionary paradigm of networking technologies that interconnects almost all the smart objects and intelligent sensors related to human activities, machineries, and environment. IoT technologies and Internet Protocol connectivity enable wide ranges of network devices to communicate irrespective of their re...
Conference Paper
Full-text available
5G will provide broadband access everywhere, entertain higher user mobility, and enable connectivity of massive number of devices (e.g. Internet of Things (IoT)) in an ultrareliable and affordable way. The main technological enablers such as cloud computing, Software Defined Networking (SDN) and Network Function Virtualization (NFV) are maturing to...
Conference Paper
Full-text available
Ethernet based secure VPLS (Virtual Private LAN Services) networks require to establish full mesh of VPLS tunnels between the customer sites. However, the tunnel establishment between geographically distant customer sites introduces a significantly high delay to the user traffic transportation. In this article, we propose a novel fast transmissio...
Conference Paper
Full-text available
Ethernet based VPLS (Virtual Private LAN Service) networks are now becoming attractive in many enterprise applications due to simple, protocol-independent and cost efficient operation. However, new VPLS applications demand additional requirements, such as elevated security, enhanced scalability and improved flexibility. This paper summarized the re...
Conference Paper
Full-text available
Host Identity Protocol (HIP), a novel internetworking technology proposes separation of the identity-location roles of the Internet Protocol (IP). HIP has been successful from the technological perspectives for network security and mobility, however, it has very limited deployment. In this paper we assess HIP to find the reasons behind its limited...
Article
Full-text available
Smart spaces form now an emerging paradigm for application development in the various domains of ubiquitous, pervasive, mobile, embedded, and edge-centric computing. The smart space-based development still lacks matured methodologies appropriate for a wide range of application domains. The authors consider a particular class of smart spaces where i...