Mika Ylianttila

Mika Ylianttila
University of Oulu · Centre for Wireless Communications (CWC)

Professor

About

287
Publications
395,846
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,903
Citations
Introduction
Mika Ylianttila (M. Sc, Dr.Sc, eMBA) is full professor at the Centre for Wireless Communications - Networks and Systems research unit, University of Oulu, Finland. He leads NetSEC (Network security, trust and privacy) research group which studies and develops secure, scalable and resource-efficient techniques for 5G and beyond 5G and IoT systems. He has co-authored more than 200 international peer-reviewed articles. He is a Senior Member of IEEE and associate editor in IEEE TIFS.
Additional affiliations
September 2005 - December 2011
University of Oulu
Position
  • Professor
Description
  • Professor (pro tem), Department of Electrical and Information Engineering, University of Oulu (full-time 1.9.2005- 31.12.2009, half-time 1.1.2010 – 17.12.2011). Scientific discipline: Computer Science, especially Information Networks.
February 2012 - December 2015
University of Oulu
Position
  • Managing Director

Publications

Publications (287)
Conference Paper
Full-text available
The shift from 5G to 6G networks is anticipated to significantly advance network slicing. This progress is driven by the growing demand for next-generation applications and services. However, these advancements must be managed within the constraints of limited resources. This evolution opens up opportunities for resource sharing through emerging ma...
Conference Paper
Full-text available
As 6G networks introduce increasingly diverse and complex applications, network slicing is a key enabling technol- ogy for partitioning network resources to meet these dynamic de- mands. However, efficiently managing and allocating these finite resources has become vital. This necessity drives the adoption of an open marketplace model. To address t...
Article
Full-text available
Federated Learning (FL) is a privacy-preserving distributed Machine Learning (ML) technique. Hierarchical FL is a novel variant of FL applicable to networks with multiple layers. Instead of transmitting client models to the server, hierarchical FL performs aggregations in the layers between the devices and the server. This further reduces the traff...
Conference Paper
Full-text available
6G is envisioned with stringent performance requirements served using an open and hyper-dynamic architecture where intelligence is embedded across multiple logical layers. Artificial Intelligence (AI), a key enabling technology in implementing this vision, is often proposed in a centralized mode of operation that does not serve the scalability and...
Article
Full-text available
Industry 4.0 is moving towards deployment using 5G as one of the main underlying communication infrastructures. Thus, the vision of the Industry of the future is getting more attention in research. Industry X (InX) is a significant thrust beyond the state-of-the-art of current Industry 4.0, towards a mix of cyber and physical systems through novel...
Conference Paper
Full-text available
Private 5G Networks (P5GNs) are a newly emerg- ing paradigm that the telecommunication sector and indus- try verticals are about to witness. The concept of P5GN is to build a 5G network with just enough infrastructure, which is required to fulfill the specific and local needs of an industry vertical. Broadly, P5GNs offer two-fold benefits. First, it c...
Conference Paper
Full-text available
Many forms of machine learning (ML) and artificial intelligence (AI) techniques are adopted in communication networks to perform all types of optimizations, security management, and decision making tasks. Instead of using conventional black-box models the tendency is moving towards using explainable ML models that provide transparency and accountab...
Conference Paper
Full-text available
Open radio access network (O-RAN) has been recognized as a revolutionized architecture to support the multi-class wireless services required in fifth-generation (5G) and beyond 5G networks. The openness and the distributed nature of the O-RAN architecture have created new forms of threat surfaces than the conventional RAN architecture and require c...
Conference Paper
Full-text available
The metaverse, which consists of several universes called verses, is predicted to be the Internet of the future. Recently, this idea has received a lot of discussions, but not enough attention has been paid to the security concerns of these virtual worlds. Primarily when the user and platform server communicate with each other and share sensitive i...
Conference Paper
Full-text available
With the proliferation of networking technologies and the advancements of the 5th Generation (5G) and beyond paradigms, Service Level Agreements (SLAs) play a prominent role in guaranteeing the quality of service (QoS) between customers and service providers (SPs). Due to the support for distributed nature, most of the existing SLA management frame...
Conference Paper
Full-text available
The future vision of automated industries strongly relies on the intelligence of the Industrial Internet of Things(IoT). The 5th Generation(5G) and beyond networks ensure high-end connectivity with future IoT networks that support scalability, virtualization, and softwarziation. In addition, an enormous amount of smart wearable devices, such as sma...
Article
As a distributed ledger technology, blockchain has received significant attention in revolutionizing telecommunication and networking domains. This article proposes a blockchain-based network slice brokering mechanism for multioperator and multitenant environments of the envisioned 6G networks.
Preprint
Full-text available
p>In this article, the emerging security challenges in communications of technologies of Industry X are identified, discussed, and evaluated to motivate future research in this direction.</p
Preprint
Full-text available
p>In this article, the emerging security challenges in communications of technologies of Industry X are identified, discussed, and evaluated to motivate future research in this direction.</p
Preprint
Full-text available
With a plethora of new connections, features, and services introduced, the 5th generation (5G) wireless technology reflects the development of mobile communication networks and is here to stay for the next decade. The multitude of services and technologies that 5G incorporates have made modern communication networks very complex and sophisticated i...
Article
Full-text available
In the current 5th Generation (5G) networking paradigm, the enforcement of Service Level Agreements (SLAs) is a non-trivial measure to assure the scope and the quality of services and standards between tenants and service providers (SPs). On top of this, Secure Service Level Agreements (SSLA) are introduced to ensure whether SPs deliver the most cr...
Conference Paper
Full-text available
Network automation is a necessity in order to meet the unprecedented demand in the future networks and zero touch network architecture is proposed to cater such requirements. Closed-loop and artificial intelligence are key enablers in this proposed architecture in critical elements such as security. Apart from the arising privacy concerns, machine...
Conference Paper
Full-text available
Machine Learning (ML) and Artificial Intelligence (AI) techniques are widely adopted in the telecommunication industry, especially to automate beyond 5G networks. Federated Learning (FL) recently emerged as a distributed ML approach that enables localized model training to keep data decentralized to ensure data privacy. In this paper, we identify t...
Conference Paper
Full-text available
Secure and intelligent environments are crucial for fostering future IoT applications such as digital healthcare and Industry 4.0. Such smart environments must enable needed digital services to the respective users ubiquitously and fulfill critical requirements such as ensuring security, privacy, and low latency. This paper summarizes the dissertat...
Conference Paper
Full-text available
Network slicing is a versatile and distinguishing capability of the 5th and 6th Generation (5G & 6G) mobile networks. Network slicing enables the consumers to deliver individualized and customized telecommunication services on the commonly shared infrastructure. Slice brokering is the dedicated service to facilitate the tenants and resource provide...
Conference Paper
Full-text available
Network slicing enables the creation of multiple logical independent networks on physical networking infrastructure. Network slice deployment in a Fifth Generation (5G) mobile network can be classified as vertical and horizontal slicing. The paper compares the performance of the two slicing methods through solving two convex optimization problems,...
Article
Full-text available
Recent evolution of the Industrial Internet of Things (IIoT) empowers the classical manufacturing model with cloud computing integration for Industry 4.0. Cloud integration advances the capabilities of manufacturing systems with cloud-based controlling and real-time process monitoring, which is renowned as Cloud Manufacturing (CM). However, cloud i...
Article
Full-text available
Effective, long-lasting Industrial IoT (IIoT) solutions start with short-term gains and progressively mature with added capabilities and value. The heterogeneous nature of IIoT devices and services suggests frequent changes in resource requirements for different services, applications, and use cases. With such unpredictability, resource orchestrati...
Conference Paper
Full-text available
Several recent works talk about the potential use of network slice brokering mechanism to facilitate the resource allocation of network slicing in next generation networks. This involves network tenants on the one hand and resource/infrastructure providers on the other hand. However, the potential downside of deploying Network Slice Broker (NSB) is...
Conference Paper
Full-text available
Although the fifth generation wireless networks are yet to be fully investigated, the vision and key elements of the 6th generation (6G) ecosystem have already come into discussion. In order to contribute to these efforts and delineate the security and privacy aspects of 6G networks, we survey how security may impact the envisioned 6G wireless syst...
Conference Paper
Full-text available
While 5G is well-known for network cloudification with micro-service based architecture, the next generation networks or the 6G era is closely coupled with intelligent network orchestration and management. Hence, the role of Artificial Intelligence (AI) is immense in the envisioned 6G paradigm. However, the alliance between 6G and AI may also be a...
Conference Paper
Full-text available
In order to provide specialized network services for different use cases, network slicing was introduced as the key technological element in the fifth generation (5G) wireless networks. It is foreseen that the trend will continue even to the beyond 5G networks to support multi-tenant multi-operator scenarios that show advanced consumer connectivity...
Article
Full-text available
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the visionaries of the 6th generation (6G) echo systems have already come into the discussion. Therefore, in order to consolidate and solidify the security and privacy in 6G networks, we survey how security may impact the envisioned 6G wireless systems, possible...
Article
Full-text available
Multi-access Edge Computing (MEC) is recognised as a solution in future networks to offload computation and data storage from mobile and IoT devices to the servers at the edge of mobile networks. It reduces the network traffic and service latency compared to passing all data to cloud data centers while offering greater processing power than handlin...
Article
Full-text available
The rapid evolution of technology allows the healthcare sector to adopt intelligent, context-aware, secure, and ubiquitous healthcare services. Together with the global trend of an aging population, it has become highly important to propose value-creating, yet cost-efficient digital solutions for healthcare systems. These solutions should provide e...
Article
Full-text available
The deployment of edge computing infrastructure requires a careful placement of the edge servers, with an aim to improve application latencies and reduce data transfer load in opportunistic Internet of Things systems. In the edge server placement, it is important to consider computing capacity, available deployment budget, and hardware requirements...
Preprint
Full-text available
The rapid technology evolution allows the healthcare sector to adopt intelligent, context-aware, secure and ubiquitous healthcare services. Together with the global trend of aging population, it has become highly important to propose value-creating yet cost-efficient digital solutions to healthcare systems. These solutions should provide effective...
Article
Full-text available
The industrial and computing research context revolutionized in various directions during the last decades. The blockchain-based smart contract embraced as a significant research interest due to its distinguishing features such as decentralized storage of transactions, autonomous execution of contract codes, and decentralized establishment of the t...
Article
Full-text available
5G is a promising technology that has the potential to support verticals and applications such as Industrial Internet of Things IoT (IIoT), smart cities, autonomous vehicles, remote surgeries, virtual and augmented realities, and so on. These verticals have a diverse set of network connectivity requirements, and it is challenging to deliver customi...
Article
Full-text available
The Augmented Reality (AR) technology enhances the human perception of the world by combining the real environment with the virtual space. With the explosive growth of powerful, less expensive mobile devices, and the emergence of sophisticated communication infrastructure, Mobile Augmented Reality (MAR) applications are gaining increased popularity...
Conference Paper
Full-text available
Local 5G Operator (L5GO) concept is one of the most prominent versatile applications of the 5G in the near future. The popularity of L5GOs will trigger a greater number of roaming and offloading event between mobile operators. However, existing static and the operator-assisted roaming and offloading procedures are inefficient for L5GO ecosystem due...
Conference Paper
Full-text available
The ever growing and revolutionizing demands in telecommunication industry to facilitate numerous business verticals are pushing towards more softwarized mobile communication technologies. Utilizing the capabilities of network softwarization, a novel telecommunication concept of local mobile network has been developed. The local mobile networks are...
Article
Full-text available
With the rise of the Industrial Internet of Things (IIoT), there is an intense pressure on resource and performance optimization leveraging on existing technologies, such as Software Defined Networking (SDN), edge computing, and container orchestration. Industry 4.0 emphasizes the importance of lean and efficient operations for sustainable manufact...
Conference Paper
Full-text available
There is a global hype in the development of digital healthcare infrastructure to cater the massive elderly population and infectious diseases. The digital facilitation is expected to ensure the patient privacy, scalability, and data integrity on the sensitive life critical healthcare data, while aligning to the global healthcare data protection st...
Article
Full-text available
The growing network density and unprecedented increase in network traffic, caused by the massively expanding number of connected devices and online services, require intelligent network operations. Machine Learning (ML) has been applied in this regard in different types of networks and networking technologies to meet the requirements of future comm...
Article
Full-text available
Distributed Ledger Technology, has been gaining enormous attention in areas beyond cryptocurrency. Industries such as energy, transportation, and healthcare are already integrating DLTs into their operations. On the other hand, recent advances and the increasing popularity of the Internet of Things(IoT) technologies are also enabling new and exciti...
Article
Full-text available
Data is central to the Internet of Things (IoT) ecosystem. With billions of devices connected, most of the current IoT systems are using centralized cloud-based data sharing systems, which will be difficult to scale up to meet the demands of future IoT systems. The involvement of such a third-party service provider requires also trust from both the...
Article
Full-text available
COVID-19 pandemic caused a massive impact on healthcare, social life, and economies on a global scale. Apparently, technology has a vital role to enable ubiquitous and accessible digital health services in pandemic conditions as well as against "re-emergence" of COVID-19 disease in a post-pandemic era. Accordingly, 5G systems and 5G-enabled e-healt...
Conference Paper
Full-text available
Software Defined Networking (SDN) has emerged as the most viable programmable network architecture to solve many challenges in legacy networks. SDN separates the network control plane from the data forwarding plane and logically centralizes the network control plane. The logically centralized control improves network management through global visib...
Article
Full-text available
Blockchain is one of the disruptive technical innovation in the recent computing paradigm. Many applications already notoriously hard and complex are fortunate to ameliorate the service with the blessings of blockchain and smart contracts. The decentralized and autonomous execution with in-built transparency of blockchain based smart contracts revo...
Conference Paper
Full-text available
Network softwarization enables the novel concept of Local 5G Operator (L5GO) networks, for deploying localized 5G solutions to serve case and location specific communication needs. This paper proposes a L5GO network architecture for delay critical future telehealth services, considering two use cases on augmented reality assisted and robotic aided...
Article
Full-text available
5G calls for a network architecture that ensures ultra-responsive and ultra-reliable communication links, in addition to the high degree of flexibility and customization required by different vertical sectors. The novel concept called local 5G networks enables a versatile set of stakeholders to operate 5G networks within their premises with guarant...
Article
Full-text available
Industry 4.0 has promised to bring new digital ecosystem for various key industrial applications in terms of providing secure, intelligent, autonomous and self-adaptive industrial IoT (IIoT) networks. Such industrial systems will be relatively more complex because of the involvement of the vast number of the heterogeneous sensors/devices and divers...
Article
Full-text available
The COVID-19 pandemic has adversely affected almost all aspects of human life, various sectors of business, and regions of the world. The flow of human activities halted for several months, and are now being carefully redefined to align with guidelines and recommendations to avoid the spread of the novel coronavirus. In contrast to other pandemics...
Article
Full-text available
The COVID-19 pandemic has affected the world in an unexpected manner. The human race is battling against the pandemic while schools, universities, industries, hospitals and governments are seeking new methods and technologies to seamlessly continue their usual operations. In response, this paper presents how 5G and IoT (Internet of Things) related...
Preprint
The Internet of Things (IoT), hailed as the enabler of the next industrial revolution, will require ubiquitous connectivity, context-aware and dynamic service mobility, and extreme security through the wireless network infrastructure. Artificial Intelligence (AI), thus, will play a major role in the underlying network infrastructure. However, a num...
Article
Full-text available
Mobile and sensor related technologies are significantly revolutionizing the medical and healthcare sectors. In current healthcare systems, gadgets are the prominent way of acquiring medical services. However, the recent technological advancements in smart and ambient environments are offering users new ways to access the healthcare services withou...
Conference Paper
Full-text available
Internet of Things(IoT) is a key topic of interest in modern communication context. The IoT interconnects millions and billions of devices through wireless communication. The wireless communication exposes the devices to massive security risks in different dimensions. The Public Key Infrastructure(PKI) is one of the promising solutions to eliminate...
Article
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G involve multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas: Tru...
Preprint
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust:...
Article
Full-text available
The Internet of Things (IoT), hailed as the enabler of the next industrial revolution, will require ubiquitous connec-tivity, context-aware and dynamic service mobility, and extreme security through the wireless network infrastructure. Artificial Intelligence (AI), thus, will play a major role in the underlying network infrastructure. However, a nu...
Technical Report
Full-text available
The roles of trust, security and privacy are somewhat interconnected, but different facets of next generation networks. The challenges in creating a trustworthy 6G are multidisciplinary spanning technology, regulation, techno-economics, politics and ethics. This white paper addresses their fundamental research challenges in three key areas. Trust:...
Conference Paper
Full-text available
The recent IoT applications set strict requirements in terms of latency, scalability, security and privacy. The current IoT systems, where computation is done at data centers, provide typically very high computational and storage capacity but long routes between computational capacity and sensors/actuators make them unsuitable for latency-critical...
Conference Paper
Full-text available
Hitherto, the evolution of mobile networks havefulfilled the increasing demands for enhanced performance,availability, portability, elasticity, and energy efficiency posed bythe ever growing network services. In line with the progression,5G depicts the next generation of mobile networks that furtherpromises remarkable performance improvements as we...
Conference Paper
Full-text available
The world transforms towards the intelligent information era by 2030. The key domains linked with human life such as healthcare, transport, entertainment, and smart cities are expected to elevate the quality of service with high-end user experience. Therefore, the telecommunication infrastructure has to meet unprecedented service level requirements...