
Pasika S RanaweeraUniversity College Dublin | UCD · School of Electrical and Electronic Engineering
Pasika S Ranaweera
Doctor of Philosophy
About
39
Publications
96,420
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,589
Citations
Introduction
An Assitant Professor and a Researcher with over 12 year of experience in research over various domains. Current research focus extends to the areas of security implications, performance analysis and optimization, of automated services associated with 5G and beyond 5G technologies, with a special emphasis on Open RAN. He is also interested in security implications of distributed learning scenarios. Open for collaborations.
Additional affiliations
August 2013 - July 2014
Education
September 2018 - August 2022
September 2011 - August 2013
August 2006 - July 2010
University of Ruhuna
Field of study
- Electrical and Information Engineering
Publications
Publications (39)
Dynamic Spectrum Sharing (DSS) is a pivotal technology for optimizing spectrum utilization and fostering efficient sharing among diverse users. However, existing DSS approaches face significant challenges related to security and privacy vulnerabilities, leading to fraudulent practices within spectrum marketplaces. In this paper, we introduce Spect-...
In the era of 6G, securing the computing continuum, which includes cloud, edge and IoT infrastructures, is a major challenge. This paper addresses these challenges by presenting a secure framework to develop advanced cybersecurity solutions tailored to this complex environment. The proposed security architecture is designed to comprehensively addre...
The rise of mobile users, IoT devices, and data-intensive applications has led to an unprecedented surge in spectrum demand. However, current Spectrum Sharing (SS) methods, characterized by centralized control and inflexible architectures, fall short of meeting this escalating challenge. The solutions of Dynamic Spectrum Access (DSA) and Dynamic Sp...
The plethora of Internet of Things (IoT) devices and their diversified requirements have opted to design security mechanisms that cover all major security requirements. Wireless Local Area Networks (WLANs) is the most common network domains where IoT devices are launched, particularly because of its easy availability. Security, in other words authe...
The role of artificial intelligence (AI) in cybersecu-rity has grown due to increasing threats from malicious actors. It aids in threat detection, behavioral analysis, malware detection, phishing identification, and enhancing security measures. However, AI can also be weaponized for cyberattacks, as malicious actors use AI-based tools for sophistic...
The rapid increase in mobile users, the IoT, and data-hungry applications have brought forth unprecedented demand on the spectrum, which is scarce; on top of that, the existing static spectrum allocation schemes have resulted in a heavily underutilized spectrum which can be mitigated with a Dynamic Spectrum Access (DSA) scheme with unlicensed users...
Edge computing paradigms were an expedient innovation for elevating the contemporary standards of mobile and Internet networks. As specified in Multi-Access Edge Computing (MEC) standardization, edge computing serviceable infrastructures are running on virtualization technologies to provide dynamic and flexible service instances. Since the inceptio...
Metaverse is the latest technological hype in the modern world due to its potential for revolutionizing the digital visual perspective. With the Covid-19 pandemic, most industries have moved towards digitization, and the metaverse is identified as one of the most promising platforms for such a transition, as it provides a three-dimensional (3D) imm...
Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN (Radio Access Network), which defines interfaces that support inter-operation between vendors' equipment and offer network flexibility at a lower cost. Open RAN integrates the benefits and advancements of network softwarization and Artificial Intelligence to enhance the opera...
Since Facebook officially changed its name to Meta in Oct. 2021, the metaverse has become a new norm of social networks and three-dimensional (3D) virtual worlds. The metaverse aims to bring 3D immersive and personalized experiences to users by leveraging many pertinent technologies. Despite great attention and benefits, a natural question in the m...
Open RAN (ORAN, O-RAN) represents a novel industry-level standard for RAN (Radio Access Network), which defines interfaces that support inter-operation between vendors' equipment and offer network flexibility at a lower cost. Open RAN integrates the benefits and advancements of network softwarization and Artificial Intelligence to enhance the opera...
Multi-Access Edge Computing (MEC) is a novel edge computing paradigm that enhances the access level capacity of mobile networks by shifting the serviceable Data center infrastructure proximate to the end devices. With this proximate placement and service provisioning, migration of a service from one edge enabled gNodeB (gNB) to another is intrinsic...
The internet of things (IoT) is paving a path for connecting a plethora of smart devices together that emerges from the novel 5G-based applications. This evident heterogeneity invites the integration of diverse technologies such as wireless sensor networks (WSNs), software-defined networks (SDNs), cognitive radio networks (CRNs), delay tolerant net...
Multi-Access Edge Computing (MEC) is a cloud computing evolution that delivers end-user services at the mobile network's edge. As a result, MEC guarantees that users will benefit from ultra-low latency and increased bandwidth when using the services. The orchestration process is the holistic management and control of the edge computing platforms. H...
Since Facebook officially changed its name to Metaverse in Oct. 2021, the metaverse has become a new norm of social networks and three-dimensional (3D) virtual worlds. The metaverse aims to bring 3D immersive and personalized experiences to users by leveraging many pertinent technologies. Despite great attention and benefits, a natural question in...
The entire world progression has ceased with the unexpected outbreak of the COVID-19 pandemic, and urges the requirement for contact-less and autonomous services and applications. Realizing these predominantly Internet of Things (IoT) based applications demands a holistic pervasive computing infrastructure. In this paper, we conduct a survey to det...
Multi-access Edge Computing (MEC) is envisaging a storage and processing infrastructure at the edge of the mobile network to guarantee ultra-low latency and higher bandwidths for the provisioning services emanated by Internet of Things (IoT) devices. To achieve these dynamic requirements, MEC is adopting virtualization technologies that form a cost...
To realize the 5G mobile technology evolution, MEC provides emerging support. Bringing cloud services to the mobile network end-user creates ultra-low latency and higher bandwidths for the mobile network. As a result, IoT domain devices can dynamically meet the running service's dynamic requirements. Virtualization enhances edge computing by reduci...
Fog computing is an edge computing strategy which fuels adaptation of Internet of Things (IoT) in many domains. The decentralized and dynamically deployable features of the fog nodes are useful to satisfy the service requisites of IoT nodes. However, security is a prime concern for both fog, and IoT deployments; where their inhibited limited resour...
The future of mobile and internet technologies are manifesting advancements beyond the existing scope of science. The concepts of
automated driving, augmented-reality, and machine-type-communication are quite sophisticated; and requires an elevation of the current mobile infrastructure for launching. The 5G mobile technology serves as the solution;...
Edge computing is a novel concept proposed to overcome the limitations of the prevailing cloud-based telecommunication networks. Various concepts have emerged with edge computing that requires proper investigation prior to deployment. Migration of services within the edge computing nodes/ base stations is an imminent aspect of the envisaged paradig...
The European Telecommunications Standards Institute (ETSI) has introduced the paradigm of Multi-Access Edge Computing (MEC) to enable efficient and fast data processing in mobile networks. Among other technological requirements, security and privacy are significant factors in the realization of MEC deployments. In this paper, we analyse the securit...
The internet of things (IoT) is paving a path for connecting a plethora of smart devices together that emerges from the novel 5G-based applications. This evident heterogeneity invites the integration of diverse technologies such as wireless sensor networks (WSNs), software-defined networks (SDNs), cognitive radio networks (CRNs), delay tolerant net...
COVID-19 or Corona virus has thrilled the entire world population with uncertainty over their survival and well-being. The impact this pathogen has caused over the globe has been profound due to its unique transmission features; that urges for contact-less strategies to interact and treat the infected. The impending 5G mobile technology is immersin...
Interconnecting "things" and devices that take the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These internetworked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-everyt...
Interconnecting “things” and devices that takes the form of wearables, sensors, actuators, mobiles, computers, meters, or even vehicles is a critical requirement for the current era. These inter-networked connections are serving the emerging applications home and building automation, smart cities and infrastructure, smart industries, and smart-ever...
The mobile service platform envisaged by emerging IoT and 5G is guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribers. In spite of the variety of applications plausible with the envisaged technologies, security is a demanding objective that should be applied beyond the design stages. Thus, Sec...
Fog Computing is one of the edge computing paradigms that envisages being the proximate processing and storage infrastructure for a multitude of IoT appliances. With its dynamic deployability as a medium level cloud service, fog nodes are enabling heterogeneous service provisioning infrastructure that features scalability, interoperability, and ada...
In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart‐everything, the Internet of Things (IoT) security plays a central role with no margin for error or shortage on supply. Securing, including authentication of these d...
In a world with “things” and devices interconnected at every level, from wearables to home and building automation, to smart cities and infrastructure, to smart industries, and to smart‐everything, the Internet of Things (IoT) security plays a central role with no margin for error or shortage on supply. Securing, including authentication of these d...
Internet of Things (IoT) and 5G are emerging technologies that envisage a mobile service platform capable of provisioning billions of communication devices which enable ubiquitous computing and ambient intelligence. These novel approaches are guaranteeing gigabit-level bandwidth, ultra-low latency and ultra-high storage capacity for their subscribe...
Secure multi-party computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. Cloud computing is a next generation computing solution which allows its users to use high speed infrastructure and services provided by cloud service providers (CSP) in a cost effe...
This research discusses a way to identify electrical devices in real time using intelligent techniques through data analysis. The electrical device identification process is initiated by collecting information related to power consumption of electrical appliances which are used in domestic life. A prototype data acquisition system was implemented t...
Increase of the usage of domestic electrical devices causes higher electricity bills. Detecting power consumption patterns can be used to minimize the electricity bill. This paper discusses how to detect electricity consumption patterns of domestic power usage via data mining and clustering using machine learning techniques and detect the device. A...
This research discusses a way to identify electrical devices in real time using intelligent techniques through data analysis. The electrical device identification process is initiated by collecting information related to power consumption of electrical appliances which are used in domestic life. In this the main attention is paid to identify an ele...
High Voltage Transmission line inspection and maintenance is an extremely dangerous employment due to the reason that such tasks are performed at high altitudes around high magnitude voltages. In countries like Sri Lanka, this employment has caused the demise of experienced technicians over the years. As a solution to this timely matter on power di...
Programmable Logic Controllers (PLCs) are the most important components embedded in Industrial Control Systems (ICSs). ICSs have achieved highest standards in terms of efficiency and performance. As a result of that, higher portion of infrastructure in industries has been automated for the comfort of human beings. Therefore, protection of such syst...
Questions
Question (1)
Container technologies such as Docker, or Kubernetes are widely used in the industry for virtualization deployments. Edge computing paradigms such as MEC and Fog are intending to leverage such infrastructure for their feasible deployments. My intention is to simulate and emulate the service migration process of such an edge computing scenario (migration from one edge computing node to another) to understand the security aspects of them. Thus, I have the two questions;
- What is the best simulator I can use to implement a migration model (preferably MDP)?
- In order to emulate, should I use existing tools like Openshift, Kubernetes...etc. ; Do they have the migration function? or do I have to implement such a platform from the scratch using docker engine?