About
47
Publications
6,360
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
409
Citations
Introduction
Publications
Publications (47)
With the advent of 5G mobile networks enabling connectivity to billions of devices it is essential to model and analyze threat on mobile threats. To model sophisticated threats such as Advanced Persistent Threats (APT) the MITRE ATT&CK is one of the best threat modelling framework. Unfortunately, it does not address sufficiently mobile networks. Th...
The new fifth generation (5G) mobile cellular network brings enhanced mobile broadband, massive machine type communication (e.g. IoT), critical machine type communication and fixed wireless access and will accommodate new services and applications such as augmented reality, and seamless streaming to all. 5G will boost security with encrypted data,...
The world population is ageing at a fast pace and to enable elderly to age at home can become a viable solution both economically and socially speaking, leading also to the overall improvement of the elderly’s well-being and comfort. There are currently a few AAL (Ambient Assisted Living) systems which although operational are not yet optimal in te...
The number of Internet of Things (IoT) devices used in eldercare are increasing day by day and bringing big security challenges especially for health care organizations, IoT service providers and most seriously for the elderly users. Attackers launch many attacks using compromised IoT devices such as Distributed Denial of Services (DDoS), among oth...
Alongside enabling connectivity for people and societies, the fifth-Generation networks (5G) aimed towards establishing an all-inclusive ecosystem for Internet of Things to sustain variety of industrial verticals such as e-health, smart home, smart city, etc. With the successful implementation of 5G infrastructure, it is understood that the traditi...
The world is ageing fast and the need of efficient digital solution enabling elderlies to age at home is getting urgent. Unfortunately there is so far no such a solution which is sufficiently efficient, customizable, secure and reliable. This paper presents a solution called Ageing@home which is efficient, easy to deploy, privacy preserving, unobtr...
Network slicing is the crucial prerogative that allows end users and industries to thrive from 5G infrastructures, however, such a logical network component can deteriorate from security vulnerabilities that prevail within cloud environments and datacenters. The Quality of Experience in 5G is a metric that takes into consideration sets of factors,...
While the research and advancements in 5G progresses, the focus of its application is shifting towards the industry and different verticals. The healthcare sector is also where 5G directs its promise to accomplish the requirements for smart hospitals, assisted living, elderly care etc. In sequence of fulfilling that capability, the healthcare needs...
As we notice the increasing adoption of Cellular IoT solutions (smart-home, e-health, among others), there are still some security aspects that can be improved as these devices can suffer various types of attacks that can have a high-impact over our daily lives. In order to avoid this, we present a multi-front security solution that consists on a f...
As the concept of virtualized SDN-enabled cloud radio access networks (C-RANs) paves the way towards the emerging 5G platforms, in parallel, the current available technologies can supplement the progression and open new doors towards establishing a cost-efficient and highly robust 5G infrastructure. According to that, in this work we propose a solu...
This paper presents a Cellular Identity Federation solution which both strengthens and simplifies the authentication of Internet of Things (IoT) devices and applications by providing single sign-on between the network layer and IoT applications. They are hence relieved of the burden of authentication and identity management, which could be both tec...
In the time of an ageing world, aging at home is both an economically and socially viable and sustainable solution which may also improve the elderly’s well-being. There are currently a few Home-based Elderly Care systems which although operational are not yet optimal in terms of efficiency and security. The paper propose a Home-based Elderly Care...
Upon the new paradigm of Cellular Internet of Things, through the usage of technologies such as Narrowband IoT (NB-IoT), a massive amount of IoT devices will be able to use the mobile network infrastructure to perform their communications. However, it would be beneficial for these devices to use the same security mechanisms that are present in the...
Cloud-Radio Access Networks are one of the main enablers for driving the 5G technology. They allow creation and utilization of core network components in a precise flexible manner that implies of the possibility for resource redistribution across different geographical regions, with reduced operator costs. With virtualization and frontend RF functi...
In addition to mobile phones 5G mobile networks will have to support billion IoT devices and applications. To achieve this objective 5G relies in the network slicing concept which is not yet fully understood. This paper describes how 5G network slicing can accommodate Smart Home, a popular IoT application. The state of the art of Smart Home is thor...
Software-Defined Networking (SDN) has been one of the most discussed areas in computer networking over the last years. The field has raised an extensive amount of research, and led to a transformation of traditional network architectures. The architecture of SDN enables the separation of the control and data planes and centralizes the network intel...
Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes of the requests are varied to investigate the impact on the computer system. A challenge with such an approach is that we do not k...
Designing and implementing efficient firewall strategies in the age of the internet of things is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed, and controlled on the internet. Additionally, an ever‐increasingly amount of sensitive information will be stored on various networks. A go...
So far the 5G mobile systems are mostly known for their superiority in terms of performance, flexibility and cost efficiency but are less known for their social benefit. In this paper, the huge social benefit of 5G is demonstrated through the realization of the Internet Light. The Internet Light is aiming at providing free access to Internet inform...
The upcoming 5G mobile networks will not only bring high data rates but also deliver flexibility and adaptability, which is conveyed by the virtualization of the mobile network. Unfortunately, virtualization of mobile networks is not well understood, and the work described in this paper aims at investigating and elucidating the particular matter. A...
Although the vision of 5G is to accommodate billions IoT devices and applications, its success depends very much on its ability to provide enhanced and affordable security. This paper introduces an Identity Federation solution which reuses the SIM authentication for cellular IoT devices enabling single-sign-on. The proposed solution alleviates the...
Lately, costly and threatening DNS tunnels on the mobile networks bypassing the mobile operator’s Policy and Charging Enforcement Function (PCEF), has shown the vulnerability of the mobile networks caused by the Domain Name System (DNS) which calls for protection solutions. Unfortunately there is currently no really adequate solution. This paper pr...
Lately, mobile operators experience threats from SMS grey routes which are used by fraudsters to evade SMS fees and to deny them millions in revenues. But more serious are the threats to the user's security and privacy and consequently the operator's reputation. Therefore, it is crucial for operators to have adequate solutions to protect both their...
Statistical queuing models are popular to analyze a computer systems ability to process different types requests. A common strategy is to run stress tests by sending artificial requests to the system. The rate and sizes of the requests are varied to investigate the impact on the computer system. A challenge with such an approach is that we do not k...
Designing and implementing efficient firewall strategies in the age of the Internet of Things (IoT) is far from trivial. This is because, as time proceeds, an increasing number of devices will be connected, accessed and controlled on the Internet. Additionally, an ever-increasingly amount of sensitive information will be stored on various networks....
In internet of things (IoT) paradigm, crowdsourcing is the process of obtaining and analyzing information or input to a particular task or project generated by a number of sources such as sensors, mobile devices, vehicles and human. Cloud computing is widely used for the services such as analyzing crowdsourced
data and application implementation ov...
To increase the low birth registration rate in Pakistan a Mobile Identity concept is proposed and used in a pilot project in Punjab and Sindh provinces in Pakistan. This paper explains thoroughly the Mobile Identity concept, which makes use of mobile technology, i.e. mobile networks, mobile handsets and mobile application in the birth registration...
Lately, several episodes of tapping and tracking of mobile phones in Europe including Norway have been revealed, showing the vulnerabilities of both the mobile network and mobile phones. A better protection of the user’s confidentiality and privacy is urgently required. This paper will present an innovative mobile network security system using mach...
Mobile communication, as its name says, is intended primarily for human to human communication e.g. telephony, SMS, IM, etc. but could be used as a direct active tool in the development of the society. In developing countries, especially in rural areas, where there is still very limited or non- existent administration infrastructure mobile communic...
Started with some definitions of Telecom 2.0 and a brief discussion of business models, this paper then asked if there still are opportunities for start-ups in the Telecom 2.0 world. The authors proposed a user-centric approach for a telecom start-up. The business model is centred on multiple identity support, holistic Internet customer care, and s...
Access to Internet services and home services demand proper authentication due to the increase of threats in the Internet. Passwords are not sufficiently strong while stronger authentication schemes are quite often expensive and complicated. This paper proposes a strong authentication scheme called Dual SIM authentication which makes use of two ide...
The objectives of the study were to find ways to enhance IPTV. The trend now is with context-aware personalised services. The study first explained the basics of IPTV, and then discussed the concerns and issues with current implementations. Next definitions of contexts, identity, profiles, roles and personalisation were introduced and the concept o...
The standard ISIM-based authentication mechanism of IMS is only intended for mobile phones and cannot be used for fixed IMS clients on stationary devices without SIM cards. This paper presents the authentication schemes dedicated for fixed IMS clients. Such schemes are necessary in order to extend the usage of IMS to fixed environments. Authenticat...
This paper describes thoroughly an authentication solution that is adequately strong, user-friendly and cost efficient. The idea is to use the mobile phone and its SIM (subscriber identity module) as an authentication token in the authentication of the user for all Internet applications. The proposed solution is generic and offers authentication fo...
We present a techno-economic comparison of an optical burst switched network with optical circuit switching and IP/MPLS. Our results reveal the conditions under which optical packet/ burst switching becomes a viable solution and may outcompete currently commercial technologies.
An optical burst-switched slotted mesh network has been studied by simulation. Focus is on loss performance for a realistic mix of application sources. Service performance is strongly application dependent. Longer bursts result in lower loss.
This paper evaluates the performance of a mesh optical burst switched (OBS) network that implements tunable lasers and tunable wavelength converters to realize the optical label setting and optical label swapping functions. We define a realistic service evolution scenario and based on that create a realistic future traffic input scenario for the OB...
We study the effect of ATM ABR control on the throughput and
fairness of running large unidirectional file transfer applications on
TCP-Tahoe and TCP-Reno with a single bottleneck ATM link. The various
ATM ABR control are characterized by different switch queue threshold
(Qth) values which define when the bottleneck link declares congestion
and sta...
The extended packet reservation multiple access (EPRMA) is a
multiple access protocol developed from the original PRMA technique.
Multi-bit-rate reservation is supported for broadband services. An
innovative method utilizing a Markov chain model is used to conduct a
precise performance analysis of the EPRMA for voice traffic. The average
number of...
This paper presents a so far "unexplored" feature of IMS with high potential, namely service continuity. With service continuity, the user will have the possibility to move and continue the usage of a service without abruptness from one device to another. For example, a user arriving to office may want to move a conversation from the mobile phone t...