Awaneesh kumar Yadav

Awaneesh kumar Yadav
Indian Institute of Technology Roorkee | University of Roorkee · Department of Electronics and Computer Engineering

Ph.D

About

27
Publications
9,179
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
129
Citations

Publications

Publications (27)
Conference Paper
Full-text available
Open Radio Access Network (ORAN) is considered the next-generation RAN, which enables several features such as network flexibility, interoperability, and cost efficiency. Leveraging Artificial Intelligence (AI) and Machine Learning (ML) techniques has become commonplace in ORAN applications. The modularized nature of the ORAN architecture and the l...
Conference Paper
Full-text available
The imminent emergence of quantum computers poses unprecedented challenges to the current cryptographic standards that secure vital digital communications and data worldwide. This paper addresses the vulnerabilities of existing cryptographic systems susceptible to quantum-based attacks and emphasizes a dedicated transition plan to post-quantum cryp...
Conference Paper
Full-text available
In the era of 6G, securing the computing continuum, which includes cloud, edge and IoT infrastructures, is a major challenge. This paper addresses these challenges by presenting a secure framework to develop advanced cybersecurity solutions tailored to this complex environment. The proposed security architecture is designed to comprehensively addre...
Article
Full-text available
Blockchain network (BCN)-based Self-Sovereign Identity (SSI) has emerged lately as an identity and access management framework that is based on Distributed Ledger Technology (DLT) and allows users to control their own data. Federated Learning (FL), on the other hand, provides a collaborative framework to update Machine Learning (ML) models without...
Conference Paper
Full-text available
6G Smart Networks and Services are poised to shape civilization's development of 2030's world, supporting the convergence of digital and physical worlds. The arrival of 6G networks brings unprecedented challenges and opportunities, requiring robust security measures to safeguard against emerging threats. Thus, several complementary issues must be a...
Article
Full-text available
The rapid evolution of heterogeneous applications signifies the requirement for network slicing to cater to diverse network requirements. Network Functions (NFs), which are the essential elements of network slices, are required to communicate with each other securely to facilitate network services. Certificates are the established method to authent...
Article
Full-text available
The plethora of Internet of Things (IoT) devices and their diversified requirements have opted to design security mechanisms that cover all major security requirements. Wireless Local Area Networks (WLANs) is the most common network domains where IoT devices are launched, particularly because of its easy availability. Security, in other words authe...
Article
Road condition monitoring schemes allow a severe reduction of traffic queues and drastically improve road safety. In these schemes, authorized vehicles communicate the current road condition via a Road Side Unit (RSU) or fog node. The reaction time for these schemes greatly improves in case the RSUs are capable of locally determining the validity o...
Conference Paper
Full-text available
The fifth generation (5G) is now widely used to access network services due to the emergence of the Internet of Things (IoT) and mobile devices. To secure 5G communication, the Third Generation Partnership Project (3GPP) organization created the 5G-Authentication and Key Agreement (AKA) protocol. Security evaluations have found a number of problems...
Article
Full-text available
Edge computing paradigms were an expedient innovation for elevating the contemporary standards of mobile and Internet networks. As specified in Multi-Access Edge Computing (MEC) standardization, edge computing serviceable infrastructures are running on virtualization technologies to provide dynamic and flexible service instances. Since the inceptio...
Conference Paper
Due to the constant influx of multiple security attacks into the next generation of mobile communication technologies, the Third Generation Partnership Project (3GPP) has established authentication and key agreement protocol, 5G-AKA, to securely access the 5G communication services while maintaining the integrity of the underlying network. However,...
Conference Paper
Full-text available
The metaverse, which consists of several universes called verses, is predicted to be the Internet of the future. Recently, this idea has received a lot of discussions, but not enough attention has been paid to the security concerns of these virtual worlds. Primarily when the user and platform server communicate with each other and share sensitive i...
Article
Full-text available
Network slicing is considered as one of the key technologies in future telecommunication networks as it can split the physical network into a number of logical networks tailored to diverse purposes that allow users to access a variety of services speedily. The fifth-generation (5G) mobile network can support variety of applications by using network...
Article
Full-text available
Fog and dew computing represent relatively new computing paradigms in the literature. The main idea is to offload the computation processes from the device to a more nearby fog or dew server, who further forwards it to the central server. In the case of dew computing, the dew server is considered to lose connection with the central server and shoul...
Conference Paper
Full-text available
The next generation of mobile communication systems must be secured because of the ongoing entrance of numerous security attacks. Thus, to secure the underlying network, the 3GPP has designed an authentication and key agreement protocol, 5G-AKA, to safely and stably access the mobile services. However, some recent observations indicate that 5G-AKA...
Conference Paper
Full-text available
Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic...
Article
Full-text available
One of the primary authentication mechanisms defined for the 5G system is the 5G-Authentication and Key Agreement (5G-AKA) protocol. It is set to be used in the next generation of mobile communications but has several serious flaws such as privacy issues, vulnerability to traceability attacks, and has de-synchronization problem. To deal with these...
Conference Paper
Full-text available
Due to the constant penetration of various security attacks, it is highly important to secure the underlying communication networks between the IoT, Fog and Cloud in the next generation of mobile communication system (5G). Thus, secure authentication and key agreement protocol, namely 5G-AKA, has been proposed in the literature to safely and stably...
Article
Full-text available
Several symmetric and asymmetric encryption based authentication protocols have been developed for the Wireless Local Area Networks (WLANs). However, recent findings reveal that these protocols are either vulnerable to numerous attacks or computationally expensive. Considering the demerits of these protocols and the necessity to provide enhanced se...
Conference Paper
Full-text available
The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant's identity who attempts to connect his wireless d...
Conference Paper
Full-text available
Wireless Local Area Networks (WLANs) have experienced significant growth in the last two decades due to the extensive use of wireless devices. Security (especially authenti-cation) is a staple concern as the wireless medium is accessible to everybody. Extensible Authentication Protocol (EAP) is the widely used authentication framework in WLANs to s...
Conference Paper
Full-text available
The centralized cloud radio access network (C-RAN), change the BS architecture to a large extent, in term of associated cost and coverage. The main limitations of C-RAN architecture is that it has a centralized processing unit, which increases the network latency by increasing the service waiting time. The proposed Heterogeneous Radio Access Networ...

Network

Cited By