Pawani Porambage
YOU?
Author Swipe
View article: Energy-Aware Adaptive Federated Learning for IoT Security in 6G
Energy-Aware Adaptive Federated Learning for IoT Security in 6G Open
View article: 6G Resilience -- White Paper
6G Resilience -- White Paper Open
6G must be designed to withstand, adapt to, and evolve amid prolonged, complex disruptions. Mobile networks' shift from efficiency-first to sustainability-aware has motivated this white paper to assert that resilience is a primary design g…
View article: Security, Privacy, and Resilience Controls for the 6G End-to-End System Developed in Hexa-X-II
Security, Privacy, and Resilience Controls for the 6G End-to-End System Developed in Hexa-X-II Open
not available
View article: TokenNet: A Novel Tokenized Resource Marketplace for 6G Network Slicing
TokenNet: A Novel Tokenized Resource Marketplace for 6G Network Slicing Open
View article: Descriptor: 5G Wireless Network Intrusion Detection Dataset (5G-NIDD)
Descriptor: 5G Wireless Network Intrusion Detection Dataset (5G-NIDD) Open
View article: On Environmental Sustainability of 6G Security
On Environmental Sustainability of 6G Security Open
View article: Resilient-By-Design: A Resiliency Framework for Future Wireless Networks
Resilient-By-Design: A Resiliency Framework for Future Wireless Networks Open
Our future society will be increasingly digitalized, hyper-connected and globally data driven. The sixth generation (6G) and beyond 6G wireless networks are expected to bridge the digital and physical worlds by providing wireless connectiv…
View article: SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning
SHIELD - Secure Aggregation Against Poisoning in Hierarchical Federated Learning Open
View article: Closed-Loop Automation in 6G for Minimum Downtime Task Continuity in Surveillance Cobots
Closed-Loop Automation in 6G for Minimum Downtime Task Continuity in Surveillance Cobots Open
Accepted for publishing in EuCNC & 6G Summit 2024
View article: Multi-Stakeholder Intent-based Service Management Automation for 6G Networks
Multi-Stakeholder Intent-based Service Management Automation for 6G Networks Open
View article: Advancing Security for 6G Smart Networks and Services
Advancing Security for 6G Smart Networks and Services Open
not available
View article: Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications
Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications Open
Federated Learning (FL) is a distributed Machine Learning (ML) technique that allows model training without sharing data. FL is vulnerable to poisoning attacks where an adversary manipulates the learning process by providing false informat…
View article: 6G Security Vision - A Concise Update
6G Security Vision - A Concise Update Open
The vision and key elements of the 6th generation (6G) ecosystem are being discussed very actively in academic and industrial circles. In this work, we provide a timely update to the 6G security vision presented in our previous publication…
View article: Security in Intent-Based Networking: Challenges and Solutions
Security in Intent-Based Networking: Challenges and Solutions Open
Accepted and presented at IEEE Conference on Standards for Communications and Networking 2023
View article: Security in Intent-Based Networking: Challenges and Solutions
Security in Intent-Based Networking: Challenges and Solutions Open
This article studies the security gains and challenges in IBN from the aspect of enabling concepts and technologies. Furthermore, the article highlights potential solutions to existing challenges, outlines the standardization efforts, and …
View article: Security in Intent-Based Networking: Challenges and Solutions
Security in Intent-Based Networking: Challenges and Solutions Open
This article studies the security gains and challenges in IBN from the aspect of enabling concepts and technologies. Furthermore, the article highlights potential solutions to existing challenges, outlines the standardization efforts, and …
View article: A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions
A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions Open
The dawn of softwarized networks enables Network Slicing (NS) as an important technology towards allocating end-to-end logical networks to facilitate diverse requirements of emerging applications in fifth-generation (5G) mobile networks. H…
View article: Open RAN and RAN‐Core Convergence
Open RAN and RAN‐Core Convergence Open
In this chapter, the focus is on the security and privacy challenges and opportunities related to the Open RAN (O-RAN), a novel industry-level standard for Radio Access Network. By the end of this chapter, readers will have gained an under…
View article: Index
Index Open
a access points (AP) 315 address resolution protocol (ARP) cache poisoning 93 spoofing attack 299 advanced driving 159 advanced encryption standard (AES) 28, 309, 329 AI/machine learning (ML)-based solutions 105 algorithmic transparency 26…
View article: Role of Explainable AI in 6G Security
Role of Explainable AI in 6G Security Open
Accountability and resilience of AI/ML based 6G services is paramount now more than ever. In this chapter we are going to discuss the potential of Explainable AI (XAI) to address the resilience of 6G services and technologies and thereby i…
View article: XcARet: XAI based Green Security Architecture for Resilient Open Radio Access Networks in 6G
XcARet: XAI based Green Security Architecture for Resilient Open Radio Access Networks in 6G Open
Published in: 2023 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit)
View article: Table of Contents
Table of Contents Open
View article: Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management Open
In the current 5th Generation (5G) networking paradigm, the enforcement of Service Level Agreements (SLAs) is a non-trivial measure to ensure the scope and the quality of services and standards between tenants and service providers (SPs). …
View article: 5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network Open
With a plethora of new connections, features, and services introduced, the 5th generation (5G) wireless technology reflects the development of mobile communication networks and is here to stay for the next decade. The multitude of services…
View article: Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions Open
The integration of satellite and terrestrial networks have become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical in…
View article: Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions Open
The integration of satellite and terrestrial networks have become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical in…
View article: Blockchain-Based Network Slice Broker to Facilitate Factory-As-a-Service
Blockchain-Based Network Slice Broker to Facilitate Factory-As-a-Service Open
The novel concept of Factory-as-a-Service~(FaaS) allows the agility of adapting the manufacturing process by identifying the industry's supply chain and user requirements. To cater to FaaS, flexibility in networking and cloud services is a…
View article: Emerging Directions for Blockchainized 6G
Emerging Directions for Blockchainized 6G Open
The next generation of mobile networks, i.e., sixth generation (6G), is expected by 2030, with already burgeoning research efforts towards this goal. Along with various other candidate technologies, blockchain is envisioned to enable and e…
View article: Towards 6G-Enabled Internet of Vehicles: Security and Privacy
Towards 6G-Enabled Internet of Vehicles: Security and Privacy Open
The conceptualisation of the sixth generation of mobile wireless networks (6G) has already started with some potential disruptive technologies resonating as enablers for driving the emergence of a number of innovative applications. Particu…
View article: Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions Open
The integration of satellite and terrestrial networks has become inevitable in the next generations of communications networks due to emerging needs of ubiquitous connectivity of remote locations. New and existing services and critical inf…