Andrei V. Gurtov

Orcid: 0000-0002-9829-9287

Affiliations:
  • Linköping University, Department of Computer and Information Science (IDA), Sweden
  • Aalto University, Helsinki Institute for Information Technology, Espoo, Finland


According to our database1, Andrei V. Gurtov authored at least 179 papers between 2001 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
AKAASH: A realizable authentication, key agreement, and secure handover approach for controller-pilot data link communications.
Int. J. Crit. Infrastructure Prot., September, 2023

Drone Remote Identification Protocol (DRIP) Architecture.
RFC, July, 2023

DRIP Entity Tag (DET) for Unmanned Aircraft System Remote ID (UAS RID).
RFC, March, 2023

An empirical assessment of ensemble methods and traditional machine learning techniques for web-based attack detection in industry 5.0.
J. King Saud Univ. Comput. Inf. Sci., March, 2023

Dew-Cloud-Based Hierarchical Federated Learning for Intrusion Detection in IoMT.
IEEE J. Biomed. Health Informatics, February, 2023

KDC Placement Problem in Secure VPLS Networks.
IEEE Trans. Inf. Forensics Secur., 2023

2022
Drone Remote Identification Protocol (DRIP) Requirements and Terminology.
RFC, February, 2022

Towards 6G-Enabled Internet of Vehicles: Security and Privacy.
IEEE Open J. Commun. Soc., 2022

A user-centric privacy-preserving authentication protocol for IoT-AmI environments.
Comput. Commun., 2022

QUIC Throughput and Fairness over Dual Connectivity.
Comput. Networks, 2022

Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions.
IEEE Access, 2022

Optimization of relay placement for scalable virtual private LAN services.
Proceedings of the FIRA@SIGCOMM 2022: Proceedings of the ACM SIGCOMM Workshop on Future of Internet Routing & Addressing, 2022

2021
IoT and HIP's Opportunistic Mode.
IEEE Trans. Mob. Comput., 2021

Towards 5G-Enabled Self Adaptive Green and Reliable Communication in Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2021

Decentralized Firmware Attestation for In-Vehicle Networks.
ACM Trans. Cyber Phys. Syst., 2021

The Roadmap to 6G Security and Privacy.
IEEE Open J. Commun. Soc., 2021

Toward Convergence of AI and IoT for Energy-Efficient Communication in Smart Homes.
IEEE Internet Things J., 2021

Intelligent intrusion detection system in smart grid using computational intelligence and machine learning.
Trans. Emerg. Telecommun. Technol., 2021

QUIC Throughput and Fairness over Dual Connectivity (extended).
CoRR, 2021

A Survey of Virtual Private LAN Services (VPLS): Past, Present and Future.
Comput. Networks, 2021

Secure Drone Identification with Hyperledger Iroha.
Proceedings of the DIVANet '21: Proceedings of the 11th ACM Symposium on Design and Analysis of Intelligent Vehicular Networks and Applications, Alicante, Spain, November 22, 2021

Detection of evil flies: securing air-ground aviation communication.
Proceedings of the ACM MobiCom '21: The 27th Annual International Conference on Mobile Computing and Networking, 2021

2020
Reliable Control and Data Planes for Softwarized Networks.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Secure and Resilient Communications in the Industrial Internet.
Proceedings of the Guide to Disaster-Resilient Communication Networks, 2020

Methodology and Mobile Application for Driver Behavior Analysis and Accident Prevention.
IEEE Trans. Intell. Transp. Syst., 2020

A lightweight portable intrusion detection communication system for auditing applications.
Int. J. Commun. Syst., 2020

6G White paper: Research challenges for Trust, Security and Privacy.
CoRR, 2020

Machine Learning Meets Communication Networks: Current Trends and Future Challenges.
IEEE Access, 2020

Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Lightweight Authentication and Key Agreement for Smart Metering in Smart Energy Networks.
IEEE Trans. Smart Grid, 2019

Transparent CoAP Services to IoT Endpoints through ICN Operator Networks.
Sensors, 2019

Location-Price Competition in Mobile Operator Market.
IGTR, 2019

Security for 5G and Beyond.
IEEE Commun. Surv. Tutorials, 2019

Trends and Detection Avoidance of Internet-Connected Industrial Control Systems.
IEEE Access, 2019

Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019

Watch Your Step! Detecting Stepping Stones in Programmable Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Controller-Pilot Data Link Communication Security.
Sensors, 2018

Cyclic ranking in single-resource peer-to-peer exchange.
Peer-to-Peer Netw. Appl., 2018

Overview of 5G Security Challenges and Solutions.
IEEE Commun. Stand. Mag., 2018

Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs.
CoRR, 2018

DEMO: Mobile Relay Architecture for Low-Power IoT Devices.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2017
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
Wirel. Pers. Commun., 2017

On the Resiliency of Static Forwarding Tables.
IEEE/ACM Trans. Netw., 2017

Anonymous Secure Framework in Connected Smart Home Environments.
IEEE Trans. Inf. Forensics Secur., 2017

Smart Spaces-Based Application Development: M3 Architecture, Design Principles, Use Cases, and Evaluation.
Int. J. Embed. Real Time Commun. Syst., 2017

Nash Bargaining Solution Allocation is Not Suitable for Datacenter Jobs.
IGTR, 2017

Secure communication channel architecture for Software Defined Mobile Networks.
Comput. Networks, 2017

CIDOR: Content distribution and retrieval in disaster networks for public protection.
Proceedings of the 13th IEEE International Conference on Wireless and Mobile Computing, 2017

Software defined VPLS architectures: Opportunities and challenges.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Hardening Opportunistic HIP.
Proceedings of the 20th ACM International Conference on Modelling, 2017

Analysis of the state of information security on the basis of surious emission electronic components.
Proceedings of the 20th Conference of Open Innovations Association, 2017

Analysis of deployment challenges of Host Identity Protocol.
Proceedings of the 2017 European Conference on Networks and Communications, 2017

5G security: Analysis of threats and solutions.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2017

Enhancing Security, Scalability and Flexibility of Virtual Private LAN Services.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

Fast Transmission Mechanism for Secure VPLS Architectures.
Proceedings of the 2017 IEEE International Conference on Computer and Information Technology, 2017

2016
Implementation of OpenFlow based cognitive radio network architecture: SDN&R.
Wirel. Networks, 2016

Energy-aware load monitoring for improving battery life of mobile peer-to-peer nodes.
Sustain. Comput. Informatics Syst., 2016

Secure and Efficient Reactive Video Surveillance for Patient Monitoring.
Sensors, 2016

Novel secure VPN architectures for LTE backhaul networks.
Secur. Commun. Networks, 2016

Opportunities and Challenges of Software-Defined Mobile Networks in Network Security.
IEEE Secur. Priv., 2016

The Quest for Privacy in the Internet of Things.
IEEE Cloud Comput., 2016

Secure Communication and Data Processing Challenges in the Industrial Internet.
Balt. J. Mod. Comput., 2016

New concepts for traffic, resource and mobility management in software-defined mobile networks.
Proceedings of the 12th Annual Conference on Wireless On-demand Network Systems and Services, 2016

NFV security considerations for cloud-based mobile virtual network operators.
Proceedings of the 24th International Conference on Software, 2016

Detecting the Origin of DDoS Attacks in OpenStack Cloud Platform Using Data Mining Techniques.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2016

Poster Abstract: An Efficient Authentication Model in Smart Grid Networks.
Proceedings of the 15th ACM/IEEE International Conference on Information Processing in Sensor Networks, 2016

The quest for resilient (static) forwarding tables.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Performance and security evaluation of intra-vehicular communication architecture.
Proceedings of the IEEE International Conference on Communication, 2016

On the Resiliency of Randomized Routing Against Multiple Edge Failures.
Proceedings of the 43rd International Colloquium on Automata, Languages, and Programming, 2016

Improving the tunnel management performance of secure VPLS architectures with SDN.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

2015
Service Intelligence and Communication Security for Ambient Assisted Living.
Int. J. Embed. Real Time Commun. Syst., 2015

Security in Software Defined Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2015

isBF: Scalable in-packet bloom filter based multicast.
Comput. Commun., 2015

Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications.
IEEE Access, 2015

Secure Hierarchical VPLS Architecture for Provider Provisioned Networks.
IEEE Access, 2015

Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Towards software defined cognitive networking.
Proceedings of the 7th International Conference on New Technologies, Mobility and Security, 2015

Service Intelligence Support for Medical Sensor Networks in Personalized Mobile Health Systems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

STEM+: Allocating bandwidth fairly to tasks.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

Secure and Efficient Automatic Ruling in Three-Level Network Architecture.
Proceedings of the ICT Innovations 2015, 2015

Leveraging LTE security with SDN and NFV.
Proceedings of the 10th IEEE International Conference on Industrial and Information Systems, 2015

Proxy-based end-to-end key establishment protocol for the Internet of Things.
Proceedings of the IEEE International Conference on Communication, 2015

Secure Virtual Private LAN Services: An overview with performance evaluation.
Proceedings of the IEEE International Conference on Communication, 2015

Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

A Simulation Study of the Stochastic Compensation Effect for Packet Reordering in Multipath Data Streaming.
Proceedings of the 2015 IEEE European Modelling Symposium, 2015

2014
Delegation-based robust authentication model for wireless roaming using portable communication devices.
IEEE Trans. Consumer Electron., 2014

An Efficient and Adaptive Mutual Authentication Framework for Heterogeneous Wireless Sensor Network-Based Applications.
Sensors, 2014

Securing virtual private LAN service by efficient key management.
Secur. Commun. Networks, 2014

Hierarchical architectures in structured peer-to-peer overlay networks.
Peer-to-Peer Netw. Appl., 2014

PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications.
Int. J. Distributed Sens. Networks, 2014

Exploring the Limits of Static Failover Routing.
CoRR, 2014

How penalty leads to improvement: A measurement study of wireless backoff in IEEE 802.11 networks.
Comput. Networks, 2014

Performance evaluation of current and emerging authentication schemes for future 3GPP network architectures.
Comput. Networks, 2014

Security for medical sensor networks in mobile health systems.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Securing the control channel of software-defined mobile networks.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Access Point selection game for mobile wireless users.
Proceedings of the Proceeding of IEEE International Symposium on a World of Wireless, 2014

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

SDN Core for Mobility between Cognitive Radio and 802.11 Networks.
Proceedings of the Eighth International Conference on Next Generation Mobile Apps, 2014

Trust and Reputation Mechanisms for Multi-agent Robotic Systems.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2014

An efficient and simple key distribution scheme for smart environments.
Proceedings of the IEEE International Conference on Consumer Electronics, 2014

A novel distributed spanning tree protocol for provider provisioned VPLS networks.
Proceedings of the IEEE International Conference on Communications, 2014

Secure lightweight protocols for medical device monitoring.
Proceedings of 15th Conference of Open Innovations Association FRUCT, 2014

2013
Realization of Mobile Femtocells: Operational and Protocol Requirements.
Wirel. Pers. Commun., 2013

A layered encryption mechanism for networked critical infrastructures.
IEEE Netw., 2013

Cooperative security in distributed networks.
Comput. Commun., 2013

Suitability analysis of existing and new authentication methods for future 3GPP Evolved Packet Core.
Comput. Networks, 2013

Lightweight authentication and key management on 802.11 with Elliptic Curve Cryptography.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A scalable and secure VPLS architecture for provider provisioned networks.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Enabling Secure Mobility with OpenFlow.
Proceedings of the IEEE SDN for Future Networks and Services, 2013

SDN Based Inter-Technology Load Balancing Leveraged by Flow Admission Control.
Proceedings of the IEEE SDN for Future Networks and Services, 2013

A novel demand-aware fairness metric for IEEE 802.11 wireless networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Deployment of Smart Spaces in Internet of Things: Overview of the Design Challenges.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

Computing the Retransmission Timeout in CoAP.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2013

Security of Wi-Fi on-board intra-vehicular communication: Field trials of tunnel scenario.
Proceedings of the 13th International Conference on ITS Telecommunications, 2013

Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Secure hierarchical Virtual Private LAN Services for provider provisioned networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
The NewReno Modification to TCP's Fast Recovery Algorithm.
RFC, April, 2012

The Host Identity Protocol (HIP) Experiment Report.
RFC, March, 2012

An Adaptive Backoff Protocol with Markovian Contention Window Control.
Commun. Stat. Simul. Comput., 2012

How Penalty Leads to Improvement: a Measurement Study of Wireless Backoff
CoRR, 2012

Scalable architecture for multimedia multicast Internet applications.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Lightweight host and user authentication protocol for All-IP telecom networks.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Inter Technology Load Balancing Algorithm for Evolved Packet System.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Secure and Multihomed Vehicular Femtocells.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Secured VPN Models for LTE Backhaul Networks.
Proceedings of the 76th IEEE Vehicular Technology Conference, 2012

Survey on Congestion Control Mechanisms for Wireless Sensor Networks.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networking, 2012

Mediating Multimedia Traffic with Strict Delivery Constraints.
Proceedings of the 2012 IEEE International Symposium on Multimedia, 2012

Demand-aware flow allocation in data center networks.
Proceedings of the 2012 ACM workshop on Capacity sharing, 2012

2011
Survey on hierarchical routing schemes in "flat" distributed hash tables.
Peer-to-Peer Netw. Appl., 2011

CR-Chord: Improving lookup availability in the presence of malicious DHT nodes.
Comput. Networks, 2011

Comparison and Analysis of Secure Mobile Architecture (SMA) and Evolved Packet System.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Performance analysis of HIP diet exchange for WSN security establishment.
Proceedings of the Q2SWinet'11, Proceedings of the Seventh ACM Symposium on QoS and Security for Wireless and Mobile Networks, Miami, FL, USA, October 31, 2011

Securing Medical Sensor Network with HIP.
Proceedings of the Wireless Mobile Communication and Healthcare, 2011

DISPUTE: Distributed puzzle tussle.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Secure Resolution of End-Host Identifiers for Mobile Clients.
Proceedings of the Global Communications Conference, 2011

Securing the backhaul for mobile and multi-homed femtocells.
Proceedings of the 2011 Future Network & Mobile Summit, Warsaw, Poland, June 15-17, 2011, 2011

2010
Host Identity Protocol (HIP): Connectivity, Mobility, Multi-Homing, Security, and Privacy over IPv4 and IPv6 Networks.
IEEE Commun. Surv. Tutorials, 2010

A secure peer-to-peer web framework.
Proceedings of the 11th IEEE International Symposium on a World of Wireless, 2010

Brief announcement: distributed trust management and revocation.
Proceedings of the 29th Annual ACM Symposium on Principles of Distributed Computing, 2010

A Preliminary Analysis of TCP Performance in an Enterprise Network.
Proceedings of the 2010 Internet Network Management Workshop / Workshop on Research on Enterprise Networking, 2010

Secure and usable P2P VoIP for mobile devices.
Proceedings of the 12th Conference on Human-Computer Interaction with Mobile Devices and Services, 2010

On application of Host Identity Protocol in wireless sensor networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Playing Defense by Offense: Equilibrium in the DoS-attack problem.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Improving TCP-Friendliness for mHIP.
Proceedings of the Access Networks - 5th International ICST Conference on Access Networks, 2010

2009
Poster abstract: a secure P2P SIP system with SPAM prevention.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2009

A local equilibrium model for P2P resource ranking.
SIGMETRICS Perform. Evaluation Rev., 2009

Distributed user authentication in wireless LANs.
Proceedings of the 10th IEEE International Symposium on a World of Wireless, 2009

SAVAH: Source Address Validation with Host Identity Protocol .
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Filtering SPAM in P2PSIP Communities with Web of Trust.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

On calibrating enterprise switch measurements.
Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, 2009

Performance of Host Identity Protocol on Symbian OS.
Proceedings of IEEE International Conference on Communications, 2009

Towards behavioral control in multi-player network games.
Proceedings of the 1st International Conference on Game Theory for Networks, 2009

Collaborative Reputation-based Voice Spam Filtering.
Proceedings of the Database and Expert Systems Applications, 2009

Securing web content.
Proceedings of the 2009 workshop on Re-architecting the internet, ReArch@CoNEXT 2009, 2009

Secure multipath transport for legacy Internet applications.
Proceedings of the 6th International ICST Conference on Broadband Communications, 2009

Cyclic routing: Generalizing look-ahead in peer-to-peer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Usable security management with host identity protocol.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
A Diophantine model of routes in structured P2P overlays.
SIGMETRICS Perform. Evaluation Rev., 2008

Hi3: An efficient and secure networking architecture for mobile hosts.
Comput. Commun., 2008

2006
On scalability properties of the Hi3 control plane.
Comput. Commun., 2006

06441 Summary -- Naming and Addressing for Next Generation Internetworks.
Proceedings of the Naming and Addressing for Next-Generation Internetworks, 29.10., 2006

06441 Abstracts Collection -- Naming and Addressing for Next Generation Internetworks.
Proceedings of the Naming and Addressing for Next-Generation Internetworks, 29.10., 2006

2005
The Eifel Response Algorithm for TCP.
RFC, February, 2005

Applying a cryptographic namespace to applications.
Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, 2005

Traversing Middleboxes with the Host Identity Protocol.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

Analysis of the HIP Base Exchange Protocol.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
The NewReno Modification to TCP's Fast Recovery Algorithm.
RFC, April, 2004

Effect of vertical handovers on performance of TCP-friendly rate control.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2004

Modeling wireless links for transport protocols.
Comput. Commun. Rev., 2004

2003
TCP over Second (2.5G) and Third (3G) Generation Wireless Networks.
RFC, February, 2003

Lifetime packet discard for efficient real-time transport over cellular links.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Eliminating aborted data delivery over cellular links.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003

Responding to Spurious Timeouts in TCP.
Proceedings of the Proceedings IEEE INFOCOM 2003, The 22nd Annual Joint Conference of the IEEE Computer and Communications Societies, San Franciso, CA, USA, March 30, 2003

2001
Seawind: a Wireless Network Emulator .
Proceedings of the Proceedings 11th GI/ITG Conference on Measuring, 2001

Effect of Delays on TCP Performance.
Proceedings of the Emerging Personal Wireless Communications, 2001

Measured performance of GSM, HSCSD and GPRS.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...