Pawani Porambage

Orcid: 0000-0001-6365-9804

According to our database1, Pawani Porambage authored at least 66 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Emerging Directions for Blockchainized 6G.
IEEE Consumer Electron. Mag., March, 2024

Design Methodology for 6G End-to-End System: Hexa-X-II Perspective.
IEEE Open J. Commun. Soc., 2024

Resilient-By-Design: A Resiliency Framework for Future Wireless Networks.
CoRR, 2024

A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions.
IEEE Commun. Surv. Tutorials, 2024

Federated Learning for Anomaly Detection in Open RAN: Security Architecture Within a Digital Twin.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024

Closed-Loop Automation in 6G for Minimum Downtime Task Continuity in Surveillance Cobots.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024

Advancing Security for 6G Smart Networks and Services.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024

Security Framework in Digital Twin for O-RAN.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2024


Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

2023
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management.
IEEE Trans. Netw. Serv. Manag., September, 2023

Blockchain and Game Theory Convergence for Network Slice Brokering.
Computer, March, 2023

Blockchain-Based Network Slice Broker to Facilitate Factory-As-a-Service.
IEEE Trans. Ind. Informatics, 2023

Comprehensive Analysis Over Centralized and Federated Learning-Based Anomaly Detection in Networks with Explainable AI (XAI).
Proceedings of the IEEE International Conference on Communications, 2023

Peer-to-Peer Federated Learning Based Anomaly Detection for Open Radio Access Networks.
Proceedings of the IEEE International Conference on Communications, 2023

XcARet: XAI based Green Security Architecture for Resilient Open Radio Access Networks in 6G.
Proceedings of the 2023 Joint European Conference on Networks and Communications & 6G Summit, 2023

Security in Intent-Based Networking: Challenges and Solutions.
Proceedings of the IEEE Conference on Standards for Communications and Networking, 2023

2022
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network.
Dataset, December, 2022

Towards 6G-Enabled Internet of Vehicles: Security and Privacy.
IEEE Open J. Commun. Soc., 2022

Integration of ICN and MEC in 5G and Beyond Networks: Mutual Benefits, Use Cases, Challenges, Standardization, and Future Research.
IEEE Open J. Commun. Soc., 2022

A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions.
J. Ind. Inf. Integr., 2022

5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network.
CoRR, 2022

Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions.
IEEE Access, 2022

Demo: Blockchain-based Secured and Federated Slice Broker (SFSBroker).
Proceedings of the 2022 IEEE/IFIP Network Operations and Management Symposium, 2022

Robust and Resilient Federated Learning for Securing Future Networks.
Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit, 2022

Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks.
Proceedings of the 2022 Joint European Conference on Networks and Communications & 6G Summit, 2022

A Comprehensive Analysis on Network Slicing for Smart Hospital Applications.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
The Roadmap to 6G Security and Privacy.
IEEE Open J. Commun. Soc., 2021

Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G.
ICT Express, 2021

A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects.
IEEE Commun. Surv. Tutorials, 2021

Enhance Data Collection Process of a UAV-aided Low Power IoT Wireless Sensor Network.
Proceedings of the IEEE Wireless Communications and Networking Conference Workshops, 2021

How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain?
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

AI and 6G Security: Opportunities and Challenges.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

6G Security Challenges and Potential Solutions.
Proceedings of the Joint European Conference on Networks and Communications & 6G Summit, 2021

Network Slicing Strategies for Smart Industry Applications.
Proceedings of the 2021 IEEE Conference on Standards for Communications and Networking, 2021

Performance Analysis of Softwarized Local Mobile Networks.
Proceedings of the 18th IEEE Annual Consumer Communications & Networking Conference, 2021

2020
Performance Analysis of Local 5G Operator Architectures for Industrial Internet.
IEEE Internet Things J., 2020

Convergence of ICN and MEC for 5G: Opportunities and Challenges.
IEEE Commun. Stand. Mag., 2020

BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks.
IEEE Access, 2020

ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare.
Proceedings of the 5th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications, 2020

2019
Micro-Operator driven Local 5G Network Architecture for Industrial Internet.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019

Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs.
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference Workshop, 2019

Secure Keying Scheme for Network Slicing in 5G Architecture.
Proceedings of the 2019 IEEE Conference on Standards for Communications and Networking, 2019

Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices.
Proceedings of the 16th IEEE Annual Consumer Communications & Networking Conference, 2019

2018
Energy Efficiency in Wireless Multimedia Sensor Networking: Architecture, Management and Security.
Proceedings of the Greening Video Distribution Networks, 2018

Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs.
CoRR, 2018

Five Driving Forces of Multi-Access Edge Computing.
CoRR, 2018

Survey on Multi-Access Edge Computing for Internet of Things Realization.
IEEE Commun. Surv. Tutorials, 2018

Securing Gadget-Free Digital Services.
Computer, 2018

DEMO: Mobile Relay Architecture for Low-Power IoT Devices.
Proceedings of the 19th IEEE International Symposium on "A World of Wireless, 2018

2017
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things.
Wirel. Pers. Commun., 2017

Energy Consumption Analysis of High Quality Multi-Tier Wireless Multimedia Sensor Network.
IEEE Access, 2017

2016
Secure and Efficient Reactive Video Surveillance for Patient Monitoring.
Sensors, 2016

eDAAAS: Efficient distributed anonymous authentication and access in smart homes.
Int. J. Distributed Sens. Networks, 2016

The Quest for Privacy in the Internet of Things.
IEEE Cloud Comput., 2016

2015
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications.
IEEE Access, 2015

Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems.
Proceedings of the 2nd IEEE World Forum on Internet of Things, 2015

Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

Secure and Efficient Automatic Ruling in Three-Level Network Architecture.
Proceedings of the ICT Innovations 2015, 2015

Proxy-based end-to-end key establishment protocol for the Internet of Things.
Proceedings of the IEEE International Conference on Communication, 2015

Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications.
Int. J. Distributed Sens. Networks, 2014

Two-phase authentication protocol for wireless sensor networks in distributed IoT applications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Secure lightweight protocols for medical device monitoring.
Proceedings of 15th Conference of Open Innovations Association FRUCT, 2014

2013
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013


  Loading...