Department of Communications and Networking

Network Security and Trust

The group is focused on creating new networking paradigms, protocols, algorithms, systems and functions for a trustworthy Internet. The group studies both trustworthy distributed solutions and classical and Software Defined Networks. The latter includes for example 5G.
Aalto University, Aki-Pekka Sinikoski

For the Internet context, the new solution should look at:

  1. the interactions between entities, helping to establish a level of trust between the entities such as client hosts, servers, ISPs, applications
  2. the solutions should also help to trace back, block attacks and contain the attacker and, in the long term, make network hacking, spamming and fraud financially less attractive "businesses”. Among the trustworthy distributed solutions a prominent topic is the blockchain.
Department of Communications and Networking / Network Security and Trust

We work on network wide and distributed systems of security and trust, such as cooperative firewalling, distributed ledger applications, including experimentation, applications to use cases, releases of open source software as well as the development of new network algorithms.

For the Internet, 5G and 6G, we have created the technology of Customer Edge Switching that provides cooperative firewalls for customer networks. These firewalls manage all communication based on policy and would dissolve the boundary between open and closed networks. Such firewalls can collect and attribute evidence of network attacks providing an end to end solution for wide area trust management.

We study the feasibility of such a network wide trust management system in terms of technology and economies of adoption. We have created a Proof-of-Concept level communications security policy management system and shown that it is feasible to largely automate policy creation and allow personification of the policies.

We classify our work in terms of deployability – a typical requirement is that an adoption decision of a solution should make sense for a single selfish investor irrespective of what anyone else is doing. We argue that making significant progress on the issues of trust and security is increasing in importance with the advent of 5G and Beyond 5G era when Information technology is used to read the real world and program events it. In this era physical safety will depend on IT and as a result networks are pushed to the forefront of national security.

Visit the group's web page

Contact

The research group is led by Professor Raimo Kantola.

Latest publications

Privacy Paradox in Social Media

Ektor Arzoglou, Yki Kortesniemi, Sampsa Ruutu, Tommi Elo 2022 Computational Science - ICCS 2022, 22nd International Conference, Proceedings

Expert‐Guided Security Risk Assessment of Evolving Power Grids

Seppo Borenius, Pavithra Gopalakrishnan, Lina Bertling Tjernberg, Raimo Kantola 2022 Energies

Mobile network multicast supported maintenance of frequency stability in low inertia power grids

Seppo Borenius, Petri Tuomainen, Jose Costa Requena, Matti Lehtonen, Petri Hovila, Heli Kokkoniemi-Tarkkanen 2022 CIRED 2021 - The 26th International Conference and Exhibition on Electricity Distribution

Scenarios on the Impact of Electric Vehicles on Distribution Grids

Seppo Borenius, Petri Tuomainen, Jyri Tompuri, Jesse Mansikkamäki, Matti Lehtonen, Heikki Hämmäinen, Raimo Kantola 2022 Energies

Capabilities-based access control for IoT devices using Verifiable Credentials

Nikos Fotiou, Vasilios A. Siris, George C. Polyzos, Yki Kortesniemi, Dmitrij Lagutin 2022 Proceedings - 43rd IEEE Symposium on Security and Privacy Workshops, SPW 2022

Applications of sketches in network traffic measurement

Hui Han, Zheng Yan, Xuyang Jing, Witold Pedrycz 2022 Information Fusion

Federated Transfer Learning Based Cross-Domain Prediction for Smart Manufacturing

Kevin I-Kai Wang, Xiaokang Zhou, Wei Liang, Zheng Yan, Jinhua She 2022 IEEE Transactions on Industrial Informatics

CroApp: A CNN-Based Resource Optimization Approach in Edge Computing Environment

Yongzhe Jia, Bowen Liu, Wanchun Dou, Xiaolong Xu, Xiaokang Zhou, Lianyong Qi, Zheng Yan 2022 IEEE Transactions on Industrial Informatics

Privacy Management in eHealth Using Contextual Consenting

Yki Kortesniemi, Päivi Pöyry-Lassila 2022 AI in eHealth

Adversarial attacks and defenses in Speaker Recognition Systems

Jiahe Lan, Rui Zhang, Zheng Yan, Jie Wang, Yu Chen, Ronghui Hou 2022 Journal of Systems Architecture
More information on our research in the Research database.
Research database
  • Published:
  • Updated:
Share
URL copied!