Boning Feng

Boning Feng
OsloMet – Oslo Metropolitan University · Department of Industrial Development

About

47
Publications
6,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
409
Citations

Publications

Publications (47)
Chapter
With the advent of 5G mobile networks enabling connectivity to billions of devices it is essential to model and analyze threat on mobile threats. To model sophisticated threats such as Advanced Persistent Threats (APT) the MITRE ATT&CK is one of the best threat modelling framework. Unfortunately, it does not address sufficiently mobile networks. Th...
Conference Paper
The new fifth generation (5G) mobile cellular network brings enhanced mobile broadband, massive machine type communication (e.g. IoT), critical machine type communication and fixed wireless access and will accommodate new services and applications such as augmented reality, and seamless streaming to all. 5G will boost security with encrypted data,...
Chapter
The world population is ageing at a fast pace and to enable elderly to age at home can become a viable solution both economically and socially speaking, leading also to the overall improvement of the elderly’s well-being and comfort. There are currently a few AAL (Ambient Assisted Living) systems which although operational are not yet optimal in te...
Chapter
The number of Internet of Things (IoT) devices used in eldercare are increasing day by day and bringing big security challenges especially for health care organizations, IoT service providers and most seriously for the elderly users. Attackers launch many attacks using compromised IoT devices such as Distributed Denial of Services (DDoS), among oth...
Chapter
Alongside enabling connectivity for people and societies, the fifth-Generation networks (5G) aimed towards establishing an all-inclusive ecosystem for Internet of Things to sustain variety of industrial verticals such as e-health, smart home, smart city, etc. With the successful implementation of 5G infrastructure, it is understood that the traditi...
Chapter
The world is ageing fast and the need of efficient digital solution enabling elderlies to age at home is getting urgent. Unfortunately there is so far no such a solution which is sufficiently efficient, customizable, secure and reliable. This paper presents a solution called Ageing@home which is efficient, easy to deploy, privacy preserving, unobtr...
Chapter
Network slicing is the crucial prerogative that allows end users and industries to thrive from 5G infrastructures, however, such a logical network component can deteriorate from security vulnerabilities that prevail within cloud environments and datacenters. The Quality of Experience in 5G is a metric that takes into consideration sets of factors,...
Conference Paper
While the research and advancements in 5G progresses, the focus of its application is shifting towards the industry and different verticals. The healthcare sector is also where 5G directs its promise to accomplish the requirements for smart hospitals, assisted living, elderly care etc. In sequence of fulfilling that capability, the healthcare needs...
Conference Paper
As we notice the increasing adoption of Cellular IoT solutions (smart-home, e-health, among others), there are still some security aspects that can be improved as these devices can suffer various types of attacks that can have a high-impact over our daily lives. In order to avoid this, we present a multi-front security solution that consists on a f...
Conference Paper
As the concept of virtualized SDN-enabled cloud radio access networks (C-RANs) paves the way towards the emerging 5G platforms, in parallel, the current available technologies can supplement the progression and open new doors towards establishing a cost-efficient and highly robust 5G infrastructure. According to that, in this work we propose a solu...
Chapter
This paper presents a Cellular Identity Federation solution which both strengthens and simplifies the authentication of Internet of Things (IoT) devices and applications by providing single sign-on between the network layer and IoT applications. They are hence relieved of the burden of authentication and identity management, which could be both tec...
Chapter
Full-text available
In the time of an ageing world, aging at home is both an economically and socially viable and sustainable solution which may also improve the elderly’s well-being. There are currently a few Home-based Elderly Care systems which although operational are not yet optimal in terms of efficiency and security. The paper propose a Home-based Elderly Care...
Conference Paper
Upon the new paradigm of Cellular Internet of Things, through the usage of technologies such as Narrowband IoT (NB-IoT), a massive amount of IoT devices will be able to use the mobile network infrastructure to perform their communications. However, it would be beneficial for these devices to use the same security mechanisms that are present in the...
Conference Paper
Cloud-Radio Access Networks are one of the main enablers for driving the 5G technology. They allow creation and utilization of core network components in a precise flexible manner that implies of the possibility for resource redistribution across different geographical regions, with reduced operator costs. With virtualization and frontend RF functi...
Conference Paper
In addition to mobile phones 5G mobile networks will have to support billion IoT devices and applications. To achieve this objective 5G relies in the network slicing concept which is not yet fully understood. This paper describes how 5G network slicing can accommodate Smart Home, a popular IoT application. The state of the art of Smart Home is thor...
Conference Paper
Software-Defined Networking (SDN) has been one of the most discussed areas in computer networking over the last years. The field has raised an extensive amount of research, and led to a transformation of traditional network architectures. The architecture of SDN enables the separation of the control and data planes and centralizes the network intel...
Article
Full-text available
Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes of the requests are varied to investigate the impact on the computer system. A challenge with such an approach is that we do not k...
Article
Designing and implementing efficient firewall strategies in the age of the internet of things is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed, and controlled on the internet. Additionally, an ever‐increasingly amount of sensitive information will be stored on various networks. A go...
Conference Paper
So far the 5G mobile systems are mostly known for their superiority in terms of performance, flexibility and cost efficiency but are less known for their social benefit. In this paper, the huge social benefit of 5G is demonstrated through the realization of the Internet Light. The Internet Light is aiming at providing free access to Internet inform...
Conference Paper
The upcoming 5G mobile networks will not only bring high data rates but also deliver flexibility and adaptability, which is conveyed by the virtualization of the mobile network. Unfortunately, virtualization of mobile networks is not well understood, and the work described in this paper aims at investigating and elucidating the particular matter. A...
Conference Paper
Although the vision of 5G is to accommodate billions IoT devices and applications, its success depends very much on its ability to provide enhanced and affordable security. This paper introduces an Identity Federation solution which reuses the SIM authentication for cellular IoT devices enabling single-sign-on. The proposed solution alleviates the...
Conference Paper
Lately, costly and threatening DNS tunnels on the mobile networks bypassing the mobile operator’s Policy and Charging Enforcement Function (PCEF), has shown the vulnerability of the mobile networks caused by the Domain Name System (DNS) which calls for protection solutions. Unfortunately there is currently no really adequate solution. This paper pr...
Conference Paper
Lately, mobile operators experience threats from SMS grey routes which are used by fraudsters to evade SMS fees and to deny them millions in revenues. But more serious are the threats to the user's security and privacy and consequently the operator's reputation. Therefore, it is crucial for operators to have adequate solutions to protect both their...
Conference Paper
Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes of the requests are varied to investigate the impact on the computer system. A challenge with such an approach is that we do not k...
Conference Paper
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet. Additionally, an ever-increasingly amount of sensitive information will be stored on various networks....
Conference Paper
In internet of things (IoT) paradigm, crowdsourcing is the process of obtaining and analyzing information or input to a particular task or project generated by a number of sources such as sensors, mobile devices, vehicles and human. Cloud computing is widely used for the services such as analyzing crowdsourced data and application implementation ov...
Conference Paper
To increase the low birth registration rate in Pakistan a Mobile Identity concept is proposed and used in a pilot project in Punjab and Sindh provinces in Pakistan. This paper explains thoroughly the Mobile Identity concept, which makes use of mobile technology, i.e. mobile networks, mobile handsets and mobile application in the birth registration...
Conference Paper
Lately, several episodes of tapping and tracking of mobile phones in Europe including Norway have been revealed, showing the vulnerabilities of both the mobile network and mobile phones. A better protection of the user’s confidentiality and privacy is urgently required. This paper will present an innovative mobile network security system using mach...
Conference Paper
Mobile communication, as its name says, is intended primarily for human to human communication e.g. telephony, SMS, IM, etc. but could be used as a direct active tool in the development of the society. In developing countries, especially in rural areas, where there is still very limited or non- existent administration infrastructure mobile communic...
Conference Paper
Full-text available
Started with some definitions of Telecom 2.0 and a brief discussion of business models, this paper then asked if there still are opportunities for start-ups in the Telecom 2.0 world. The authors proposed a user-centric approach for a telecom start-up. The business model is centred on multiple identity support, holistic Internet customer care, and s...
Article
Access to Internet services and home services demand proper authentication due to the increase of threats in the Internet. Passwords are not sufficiently strong while stronger authentication schemes are quite often expensive and complicated. This paper proposes a strong authentication scheme called Dual SIM authentication which makes use of two ide...
Article
Full-text available
The objectives of the study were to find ways to enhance IPTV. The trend now is with context-aware personalised services. The study first explained the basics of IPTV, and then discussed the concerns and issues with current implementations. Next definitions of contexts, identity, profiles, roles and personalisation were introduced and the concept o...
Conference Paper
Full-text available
The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. This paper presents the authentication schemes dedicated for fixed IMS clients. Such schemes are necessary in order to extend the usage of IMS to fixed environments. Authenticat...
Conference Paper
Full-text available
This paper describes thoroughly an authentication solution that is adequately strong, user-friendly and cost efficient. The idea is to use the mobile phone and its SIM (subscriber identity module) as an authentication token in the authentication of the user for all Internet applications. The proposed solution is generic and offers authentication fo...
Conference Paper
We present a techno-economic comparison of an optical burst switched network with optical circuit switching and IP/MPLS. Our results reveal the conditions under which optical packet/ burst switching becomes a viable solution and may outcompete currently commercial technologies.
Conference Paper
An optical burst-switched slotted mesh network has been studied by simulation. Focus is on loss performance for a realistic mix of application sources. Service performance is strongly application dependent. Longer bursts result in lower loss.
Conference Paper
This paper evaluates the performance of a mesh optical burst switched (OBS) network that implements tunable lasers and tunable wavelength converters to realize the optical label setting and optical label swapping functions. We define a realistic service evolution scenario and based on that create a realistic future traffic input scenario for the OB...
Conference Paper
We study the effect of ATM ABR control on the throughput and fairness of running large unidirectional file transfer applications on TCP-Tahoe and TCP-Reno with a single bottleneck ATM link. The various ATM ABR control are characterized by different switch queue threshold (Qth) values which define when the bottleneck link declares congestion and sta...
Conference Paper
The extended packet reservation multiple access (EPRMA) is a multiple access protocol developed from the original PRMA technique. Multi-bit-rate reservation is supported for broadband services. An innovative method utilizing a Markov chain model is used to conduct a precise performance analysis of the EPRMA for voice traffic. The average number of...
Article
Full-text available
This paper presents a so far "unexplored" feature of IMS with high potential, namely service continuity. With service continuity, the user will have the possibility to move and continue the usage of a service without abruptness from one device to another. For example, a user arriving to office may want to move a conversation from the mobile phone t...

Network

Cited By