default search action
Pawani Porambage
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Anshuman Kalla, Chamitha de Alwis, Sarada Prasad Gochhayat, Gürkan Gür, Madhusanka Liyanage, Pawani Porambage:
Emerging Directions for Blockchainized 6G. IEEE Consumer Electron. Mag. 13(2): 42-51 (2024) - [j24]Chamitha de Alwis, Pawani Porambage, Kapal Dev, Thippa Reddy Gadekallu, Madhusanka Liyanage:
A Survey on Network Slicing Security: Attacks, Challenges, Solutions and Research Directions. IEEE Commun. Surv. Tutorials 26(1): 534-570 (2024) - [j23]Sylvaine Kerboeuf, Pawani Porambage, Akshay Jain, Patrik Rugeland, Gustav Wikström, Mårten Ericson, Dinh Thai Bui, Abdelkader Outtagarts, Heikki Karvonen, Pol Alemany, Raul Muñoz, Ricard Vilalta, Panagiotis Botsinis, Aurora Ramos, Josué Castañeda Cisneros, Mehmet Karaca, Christina Karousatou, Sokratis Barmpounakis, Panagiotis Demestichas, Anastasios Zafeiropoulos, Ioannis Tzanettis, Symeon Papavassiliou, Pietro G. Giardina, Giada Landi, Bin Han, Ahmad Nimr, Mikko A. Uusitalo:
Design Methodology for 6G End-to-End System: Hexa-X-II Perspective. IEEE Open J. Commun. Soc. 5: 3368-3394 (2024) - [c35]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Samuel Marchal, Mika Ylianttila:
Robust Aggregation Technique Against Poisoning Attacks in Multi-Stage Federated Learning Applications. CCNC 2024: 956-962 - [c34]Rafael Pires, Henry Blue, Jere Malinen, Michael De Angelis, Pietro G. Giardina, Giada Landi, Matti Laukkanen, Kimmo Ahola, Pawani Porambage:
Closed-Loop Automation in 6G for Minimum Downtime Task Continuity in Surveillance Cobots. EuCNC/6G Summit 2024: 860-865 - [c33]Pol Alemany, Raul Muñoz, Jose Antonio Ordonez-Lucena, Ricard Vilalta, Diego R. López, Mathieu Boussard, Huy Q. Tran, Pawani Porambage, Rafael Pires, Henry Blue, Jere Malinen, Mikko A. Uusitalo, Mohammed Elbamby, Mohamed Abdelaziz, Patrik Rugeland, Josué Castañeda Cisneros, Flávio Brito, Elham Dehghan Biyar, Mehmet Karaca, Anastasios Zafeiropoulos, Ioannis Tzanettis, Pietro G. Giardina, Giada Landi, Xose R. Sousa, Sylvaine Kerboeuf:
Multi-Stakeholder Intent-based Service Management Automation for 6G Networks. EuCNC/6G Summit 2024: 866-871 - [c32]Yasintha Rumesh, Dinaj Attanayaka, Pawani Porambage, Jarno Pinola, Joshua Groen, Kaushik R. Chowdhury:
Federated Learning for Anomaly Detection in Open RAN: Security Architecture Within a Digital Twin. EuCNC/6G Summit 2024: 877-882 - [c31]Dinaj Attanayaka, Yasintha Rumesh, Jarno Pinola, Pawani Porambage:
Security Framework in Digital Twin for O-RAN. EuCNC/6G Summit 2024: 889-894 - [c30]Madhusanka Liyanage, Pawani Porambage, Engin Zeydan, Thulitha Senavirathne, Yushan Siriwardhana, Awaneesh Kumar Yadav, Bartlomiej Siniarski:
Advancing Security for 6G Smart Networks and Services. EuCNC/6G Summit 2024: 1169-1174 - 2023
- [j22]Tharaka Hewa, Pawani Porambage, Anshuman Kalla, Diana Pamela Moya Osorio, Madhusanka Liyanage, Mika Ylianttila:
Blockchain and Game Theory Convergence for Network Slice Brokering. Computer 56(3): 80-91 (2023) - [j21]Tharaka Hewa, Pawani Porambage, Ivana Kovacevic, Nisita Weerasinghe, Erkki Harjula, Madhusanka Liyanage, Mika Ylianttila:
Blockchain-Based Network Slice Broker to Facilitate Factory-As-a-Service. IEEE Trans. Ind. Informatics 19(1): 519-530 (2023) - [j20]Nisita Weerasinghe, Raaj Anand Mishra, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Proof-of-Monitoring (PoM): A Novel Consensus Mechanism for Blockchain-Based Secure Service Level Agreement Management. IEEE Trans. Netw. Serv. Manag. 20(3): 2783-2803 (2023) - [c29]Ijaz Ahmad, Jere Malinen, Filippos Christou, Pawani Porambage, Andreas Kirstädter, Jani Suomalainen:
Security in Intent-Based Networking: Challenges and Solutions. CSCN 2023: 296-301 - [c28]Pawani Porambage, Jarno Pinola, Yasintha Rumesh, Chen Tao, Jyrki Huusko:
XcARet: XAI based Green Security Architecture for Resilient Open Radio Access Networks in 6G. EuCNC/6G Summit 2023: 699-704 - [c27]Yasintha Rumesh, Thulitha Senevirathna, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Comprehensive Analysis Over Centralized and Federated Learning-Based Anomaly Detection in Networks with Explainable AI (XAI). ICC 2023: 4853-4859 - [c26]Dinaj Attanayaka, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Peer-to-Peer Federated Learning Based Anomaly Detection for Open Radio Access Networks. ICC 2023: 5464-5470 - 2022
- [j19]Ijaz Ahmad, Jani Suomalainen, Pawani Porambage, Andrei V. Gurtov, Jyrki Huusko, Marko Höyhtyä:
Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions. IEEE Access 10: 96038-96052 (2022) - [j18]Anshuman Kalla, Chamitha de Alwis, Pawani Porambage, Gürkan Gür, Madhusanka Liyanage:
A survey on the use of blockchain for future 6G: Technical aspects, use cases, challenges and research directions. J. Ind. Inf. Integr. 30: 100404 (2022) - [j17]Diana Pamela Moya Osorio, Ijaz Ahmad, José David Vega Sánchez, Andrei V. Gurtov, Johan Scholliers, Matti Kutila, Pawani Porambage:
Towards 6G-Enabled Internet of Vehicles: Security and Privacy. IEEE Open J. Commun. Soc. 3: 82-105 (2022) - [j16]Gürkan Gür, Anshuman Kalla, Chamitha de Alwis, Quoc-Viet Pham, Khac-Hoang Ngo, Madhusanka Liyanage, Pawani Porambage:
Integration of ICN and MEC in 5G and Beyond Networks: Mutual Benefits, Use Cases, Challenges, Standardization, and Future Research. IEEE Open J. Commun. Soc. 3: 1382-1412 (2022) - [c25]Shalitha Wijethilaka, Pawani Porambage, Chamitha de Alwis, Madhusanka Liyanage:
A Comprehensive Analysis on Network Slicing for Smart Hospital Applications. CCNC 2022: 276-279 - [c24]Suwani Jayasinghe, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Federated Learning based Anomaly Detection as an Enabler for Securing Network and Service Management Automation in Beyond 5G Networks. EuCNC 2022: 345-350 - [c23]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Robust and Resilient Federated Learning for Securing Future Networks. EuCNC 2022: 351-356 - [c22]Tharaka Hewa, Nisita Weerasinghe, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Demo: Blockchain-based Secured and Federated Slice Broker (SFSBroker). NOMS 2022: 1-3 - [d1]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. IEEE DataPort, 2022 - [i5]Sehan Samarakoon, Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Sang-Yoon Chang, Jinoh Kim, Jonghyun Kim, Mika Ylianttila:
5G-NIDD: A Comprehensive Network Intrusion Detection Dataset Generated over 5G Wireless Network. CoRR abs/2212.01298 (2022) - 2021
- [j15]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
A Survey on Mobile Augmented Reality With 5G Mobile Edge Computing: Architectures, Applications, and Technical Aspects. IEEE Commun. Surv. Tutorials 23(2): 1160-1192 (2021) - [j14]Madhusanka Liyanage, Pawani Porambage, Aaron Yi Ding, Anshuman Kalla:
Driving forces for Multi-Access Edge Computing (MEC) IoT integration in 5G. ICT Express 7(2): 127-137 (2021) - [j13]Pawani Porambage, Gürkan Gür, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei V. Gurtov, Mika Ylianttila:
The Roadmap to 6G Security and Privacy. IEEE Open J. Commun. Soc. 2: 1094-1122 (2021) - [c21]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
Performance Analysis of Softwarized Local Mobile Networks. CCNC 2021: 1-2 - [c20]Thisuri Umagiliya, Shalitha Wijethilaka, Chamitha de Alwis, Pawani Porambage, Madhusanka Liyanage:
Network Slicing Strategies for Smart Industry Applications. CSCN 2021: 30-35 - [c19]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
AI and 6G Security: Opportunities and Challenges. EuCNC/6G Summit 2021: 616-621 - [c18]Pawani Porambage, Gürkan Gür, Diana Pamela Moya Osorio, Madhusanka Liyanage, Mika Ylianttila:
6G Security Challenges and Potential Solutions. EuCNC/6G Summit 2021: 622-627 - [c17]Tharaka Hewa, Anshuman Kalla, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila:
How DoS attacks can be mounted on Network Slice Broker and can they be mitigated using blockchain? PIMRC 2021: 1525-1531 - [c16]Pasan Samarakkody, Sachith Guruge, Dulaj Samaradeera, Eranda Harshanath Jayatunga, Pawani Porambage:
Enhance Data Collection Process of a UAV-aided Low Power IoT Wireless Sensor Network. WCNC Workshops 2021: 1-6 - 2020
- [j12]Tanesh Kumar, Erkki Harjula, Muneeb Ejaz, Ahsan Manzoor, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, An Braeken, Mika Ylianttila:
BlockEdge: Blockchain-Edge Framework for Industrial IoT Networks. IEEE Access 8: 154166-154185 (2020) - [j11]Gürkan Gür, Pawani Porambage, Madhusanka Liyanage:
Convergence of ICN and MEC for 5G: Opportunities and Challenges. IEEE Commun. Stand. Mag. 4(4): 64-71 (2020) - [j10]Yushan Siriwardhana, Pawani Porambage, Mika Ylianttila, Madhusanka Liyanage:
Performance Analysis of Local 5G Operator Architectures for Industrial Internet. IEEE Internet Things J. 7(12): 11559-11575 (2020) - [c15]An Braeken, Pawani Porambage, Amirthan Puvaneswaran, Madhusanka Liyanage:
ESSMAR: Edge Supportive Secure Mobile Augmented Reality Architecture for Healthcare. Cloudtech 2020: 1-7
2010 – 2019
- 2019
- [c14]Pawani Porambage, Ahsan Manzoor, Madhusanka Liyanage, Andrei V. Gurtov, Mika Ylianttila:
Managing Mobile Relays for Secure E2E Connectivity of Low-Power IoT Devices. CCNC 2019: 1-7 - [c13]Pawani Porambage, Yoan Miche, Aapo Kalliola, Madhusanka Liyanage, Mika Ylianttila:
Secure Keying Scheme for Network Slicing in 5G Architecture. CSCN 2019: 1-6 - [c12]Archana Rajakaruna, Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Enabling End-to-End Secure Connectivity for Low-Power IoT Devices with UAVs. WCNC Workshops 2019: 1-6 - [c11]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Jaspreet Singh Walia, Marja Matinmikko-Blue, Mika Ylianttila:
Micro-Operator driven Local 5G Network Architecture for Industrial Internet. WCNC 2019: 1-8 - 2018
- [j9]Tanesh Kumar, Pawani Porambage, Ijaz Ahmad, Madhusanka Liyanage, Erkki Harjula, Mika Ylianttila:
Securing Gadget-Free Digital Services. Computer 51(11): 66-77 (2018) - [j8]Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, Tarik Taleb:
Survey on Multi-Access Edge Computing for Internet of Things Realization. IEEE Commun. Surv. Tutorials 20(4): 2961-2991 (2018) - [c10]Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
DEMO: Mobile Relay Architecture for Low-Power IoT Devices. WOWMOM 2018: 14-16 - [p1]Erkki Harjula, Tenager Mekonnen, Miika Komu, Pawani Porambage, Tero Kauppinen, Jimmy Kjällman, Mika Ylianttila:
Energy Efficiency in Wireless Multimedia Sensor Networking: Architecture, Management and Security. Greening Video Distribution Networks 2018: 133-157 - [i4]Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, Tarik Taleb:
Survey on Multi-Access Edge Computing for Internet of Things Realization. CoRR abs/1805.06695 (2018) - [i3]Madhusanka Liyanage, Pawani Porambage, Aaron Yi Ding:
Five Driving Forces of Multi-Access Edge Computing. CoRR abs/1810.00827 (2018) - [i2]Archana Rajakaruna, Ahsan Manzoor, Pawani Porambage, Madhusanka Liyanage, Mika Ylianttila, Andrei V. Gurtov:
Lightweight Dew Computing Paradigm to Manage Heterogeneous Wireless Sensor Networks with UAVs. CoRR abs/1811.04283 (2018) - [i1]Yushan Siriwardhana, Pawani Porambage, Madhusanka Liyanage, Jaspreet Singh Walia, Marja Matinmikko-Blue, Mika Ylianttila:
Micro-Operator driven Local 5G Network Architecture for Industrial Internet. CoRR abs/1811.04299 (2018) - 2017
- [j7]Tenager Mekonnen, Pawani Porambage, Erkki Harjula, Mika Ylianttila:
Energy Consumption Analysis of High Quality Multi-Tier Wireless Multimedia Sensor Network. IEEE Access 5: 15848-15858 (2017) - [j6]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
CHIP: Collaborative Host Identity Protocol with Efficient Key Establishment for Constrained Devices in Internet of Things. Wirel. Pers. Commun. 96(1): 421-440 (2017) - 2016
- [j5]Pawani Porambage, Mika Ylianttila, Corinna Schmitt, Pardeep Kumar, Andrei V. Gurtov, Athanasios V. Vasilakos:
The Quest for Privacy in the Internet of Things. IEEE Cloud Comput. 3(2): 36-45 (2016) - [j4]An Braeken, Pawani Porambage, Milos Stojmenovic, Lambros Lambrinos:
eDAAAS: Efficient distributed anonymous authentication and access in smart homes. Int. J. Distributed Sens. Networks 12(12) (2016) - [j3]An Braeken, Pawani Porambage, Andrei V. Gurtov, Mika Ylianttila:
Secure and Efficient Reactive Video Surveillance for Patient Monitoring. Sensors 16(1): 32 (2016) - 2015
- [j2]Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group Key Establishment for Enabling Secure Multicast Communication in Wireless Sensor Networks Deployed for IoT Applications. IEEE Access 3: 1503-1511 (2015) - [c9]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Efficient Key Establishment for Constrained IoT Devices with Collaborative HIP-Based Approach. GLOBECOM 2015: 1-6 - [c8]Pawani Porambage, An Braeken, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Proxy-based end-to-end key establishment protocol for the Internet of Things. ICC Workshops 2015: 2677-2682 - [c7]Pawani Porambage, An Braeken, Matthias Carlier, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Secure and Efficient Automatic Ruling in Three-Level Network Architecture. ICT Innovations 2015: 185-194 - [c6]Pawani Porambage, An Braeken, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila, Burkhard Stiller:
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks. LCN 2015: 482-485 - [c5]Pawani Porambage, An Braeken, Andrei V. Gurtov, Mika Ylianttila, Susanna Spinsante:
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems. WF-IoT 2015: 711-714 - 2014
- [j1]Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
PAuthKey: A Pervasive Authentication Protocol and Key Establishment Scheme for Wireless Sensor Networks in Distributed IoT Applications. Int. J. Distributed Sens. Networks 10 (2014) - [c4]Andrei V. Gurtov, Pawani Porambage, Ilya Nikolaevskiy:
Secure lightweight protocols for medical device monitoring. FRUCT 2014: 46-51 - [c3]Pawani Porambage, Corinna Schmitt, Pardeep Kumar, Andrei V. Gurtov, Mika Ylianttila:
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications. WCNC 2014: 2728-2733 - 2013
- [c2]Pawani Porambage, Pardeep Kumar, Corinna Schmitt, Andrei V. Gurtov, Mika Ylianttila:
Certificate-Based Pairwise Key Establishment Protocol for Wireless Sensor Networks. CSE 2013: 667-674 - [c1]Pardeep Kumar, Pawani Porambage, Mika Ylianttila, Andrei V. Gurtov:
A Mobile Object-Based Secret Key Distribution Scheme for Wireless Sensor Networks. UIC/ATC 2013: 656-661
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint