Joint Publications
2025
Weerasinghe, Nisita, Pawani Porambage, An Braeken, Madhusanka Liyanage, and Mika Ylianttila. “TokenNet: A Novel Tokenized Resource Marketplace for 6 G Network Slicing.” IEEE Transactions on Network Science and Engineering (2025).
Abstract
The transition from fifth-generation (5G) to sixth-generation (6G) networks is driving significant advancements in network slicing, fueled by the growing demand for next-generation applications and services. However, managing these advancements within the constraints of finite resources creates the opportunity for open resource marketplaces, which introduces technical and business challenges. To address these, we propose TokenNet, the first blockchain-based architecture that represents network resources as non-fungible tokens (NFTs) in the context of network slicing. TokenNet facilitates secure, decentralized resource trading, ownership traceability, and management, optimizing resource allocation through auctioning, brokering, and trust mechanisms. It offers more granular, flexible, and trustworthy control over network resources compared to existing state-of-the-art systems. Our prototype implementation demonstrates its effectiveness, outperforming baseline models in cost efficiency, reducing delays, and improving minting performance. These advantages position TokenNet as a promising solution for future network management.
2025
Zeydan, Engin, Josep Mangues, Suayb S. Arslan, Yekta Turk, Tharaka Hewa, Madhusanka Liyanage, and Aidan O’Mahony. “Reconfigurable Production Lines for Industrial 5.0 Automation: An Intent-based Approach.” IEEE Open Journal of the Computer Society (2025). doi: 10.1109/OJCS.2025.3599219
Abstract
Reconfigurable production lines empowered by an intent-based approach and next-generation wireless networks can be a cornerstone of the transformative Industry 5.0 paradigm. This article presents a novel framework for developing an intent-based reconfigurable production line enriched with blockchain technology. By using blockchain as an enabler for decentralization, the proposed approach aims to integrate security and efficiency into the fabric of industrial automation. Experimental evaluations confirm the effectiveness of the proposed approach (in terms of scalability and latency) and highlight its strengths and potential for improvement. To be more precise, the blockchain systems are 85 to 95 seconds faster than the cloud service for 50 simultaneous transactions and offer around 69% lower latency at maximum utilization with 10 000 events. Important challenges such as integration into the existing infrastructure, security, standardization and energy efficiency are highlighted and recommendations for overcoming these hurdles are also given at the end of the article.
2025
Zeydan, Engin, Chamitha De Alwis, Rabia Khan, Yekta Turk, Abdullah Aydeger, Thippa Reddy Gadekallu, and Madhusanka Liyanage. “Quantum Technologies for Beyond 5G and 6G Networks: Applications, Opportunities, and Challenges.” arXiv preprint arXiv:2504.17133 (2025).
Abstract
As the world prepares for the advent of 6G networks, quantum technologies are becoming critical enablers of the next generation of communication systems. This survey paper investigates the convergence of quantum technologies and 6G networks, focusing on their applications, opportunities and challenges. We begin with an examination of the motivations for integrating quantum technologies into 6G, investigating the potential to overcome the limits of classical computing and cryptography. We then highlight key research gaps, particularly in quantum communication, quantum computing integration and security enhancement. A comprehensive overview of quantum technologies relevant to 6G, including quantum communication devices, quantum computing paradigms, and hybrid quantum-classical approaches is provided. A particular focus is on the role of quantum technologies in enhancing 6G Radio Access Networks (RAN), 6G core and edge network optimization, and 6G security. The survey paper also explores the application of quantum cryptography with a focus on Quantum Key Distribution (QKD), Quantum Secure Direct Communication (QSDC) and quantum-resistant cryptographic algorithms and assesses their implementation challenges and potential impact on 6G networks. We also discuss the significant challenges associated with integrating quantum technologies into existing communications infrastructures, including issues of technological maturity, standardization, and economic considerations. Finally, we summarize the lessons learned from current research and outline future research directions to guide the ongoing development of quantum-enabled 6G networks.
2025
N. Weerasinghe, P. Porambage, A. Braeken, M. Liyanage and M. Ylianttila, “Non-Fungible Token Enabled Resource Trading Marketplace for 6G Network Slicing,” 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2025, pp. 1-6, doi: 10.1109/CCNC54725.2025.10975970.
Abstract
The shift from fifth generation (5G) to sixth generation (6G) networks is anticipated to significantly advance network slicing. This progress is driven by the growing demand for next-generation applications and services. However, these advancements must be managed within the constraints of limited resources. This evolution opens up opportunities for resource sharing through emerging marketplaces, yet it introduces various business and technical complexities that need to be addressed. Additionally, finding cost-effective solutions is also essential for the future of networks. In this paper, we propose a blockchain-based architecture that utilizes non-fungible tokens (NFTs) for the trading of network resources within the 6G network slicing. To the best of our knowledge, this is the first study to represent network resources as NFTs within the context of network slicing. The architecture employs NFTs to authenticate and manage various network resources, providing a decentralized platform for their secure creation, management, and exchange. Using resource NFTs, our system ensures more granular and flexible control over network resources than existing state-of-the-art systems, where NFTs are tied to network slices. We implemented a prototype of this system to validate its viability. Our performance evaluation confirms that the proposed approach is efficient and cost-effective compared to baseline models in managing network resources within network slicing. These findings highlight the potential of our system to transform network management practices and effectively meet the demands of future networks.
2025
N. Weerasinghe, P. Porambage, A. Braeken, M. Liyanage and M. Ylianttila, “Demo: Blockchain-Based NFT Resource Marketplace for Efficient 6G Network Slicing,” 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2025, pp. 1-2, doi: 10.1109/CCNC54725.2025.10976071.
Abstract
As 6G networks introduce increasingly diverse and complex applications, network slicing is a key enabling technology for partitioning network resources to meet these dynamic demands. However, efficiently managing and allocating these finite resources has become vital. This necessity drives the adoption of an open marketplace model. To address the business and technical complexities associated with such open marketplaces, this paper presents the demonstration of a non-fungible token (NFT)-enabled resource trading marketplace tailored for 6G network slicing. The proposed solution is implemented on an Ethereum-based blockchain system to assess its viability.
2025
Zeydan, Engin, Suayb S. Arslan, Yekta Turk, Tharaka Hewa, and Madhusanka Liyanage. “The Role of Mobile Communications for Industrial Automation: Architecture, Applications and Challenges.” IEEE Open Journal of the Communications Society (2025).
Abstract
Industrial automation is expected to benefit from the capabilities of Beyond 5G (B5G)/6G, particularly in improving real-time decision making and control in information-driven scenarios, supporting improved efficiency, precision and safety in connected manufacturing environments. While not all aspects of industrial automation are equally affected, certain areas such as real-time monitoring, wireless control and predictive maintenance can benefit significantly from the high reliability, ultra-low latency and scalability of next-generation wireless systems. Motivated by the increasing convergence between operational technology (OT) and advanced communication infrastructures, this paper surveys how B5G/6G can serve as an enabler for data-centric industrial ecosystems. The main contribution lies in analysing evolving industrial architectures, the integration of OT systems and application domains including digital twins, cloud robotics and smart devices. At the end of the paper, we also offer strategic insights into enabling technologies and future challenges, providing a comprehensive overview of how B5G/6G can support the evolution of Industry 5.0.
2025
Pramitha Fernando, Pawani Porambage, Madhusanka Liyanage, An Braeken, “Securing xApps in Open RAN: A Hierarchical Approach to Authentication and Authorisation” in Proc. of 2025 IEEE Conference on Communications and Network Security (CNS), Avignon, France, September 2025 – Received the Best Paper Award
Abstract
The Open Radio Access Network (RAN) represents a significant advancement in the ongoing evolution of mobile networks, transitioning from proprietary physical hardware to virtualised network functions. Open RAN advocates for a disaggregated RAN utilising commercial off-the-shelf (COTS) hardware. The O-RAN Alliance is the preeminent organisation in the Open RAN initiative, guiding the industry towards a vendor-neutral radio access network characterised by open interfaces and protocols. The introduction of RAN Intelligent Controllers (RICs) and the ability to deploy third-party services on these RICs expedite the innovation within the RAN. The two RICs, non-real-time RIC and near-real-time RIC, enhance the operation of RAN by facilitating the deployment of third-party services, either as an rApp for non-real-time RIC or as an xApp for near-real-time RIC. However, this new disaggregated and open RAN expands the threat surface and introduces novel security and privacy challenges that were previously absent, and these issues remain unaddressed. The introduction of new stakeholders, such as third-party application providers and cloud service providers, into the RAN ecosystem presents potential vulnerabilities. This paper proposes a hierarchical management strategy to tackle security challenges in Open RAN, enabling authorisation, authentication, and monitoring for third-party applications. Experimental evaluations across multiple configurations demonstrate that the proposed framework is scalable and imposes minimal overhead, making it a practical solution for securing next-generation RAN deployments.
2025
S. R. Teli, C. Guerra-Yanez, Z. Ghassemlooy and S. Zvanovec, “Performance Analysis of an SDR-Based Testbed for All-Optical Wireless Hybrid IoT Networks,” 2025 IEEE 22nd Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, 2025, pp. 1-5, doi: 10.1109/CCNC54725.2025.10975919.
Abstract
In this paper, we experimentally demonstrate and analyze the performance of software-defined radio (SDR)-based hybrid optical wireless communication (OWC) links for indoor Internet-of-Things (IoT) networks. We propose all-optical hybrid visible light communication (VLC) and optical camera communication (OCC) using a single light emitting diode (LED) as a transmitter and photodiode (PD) and image sensor (IS) based receivers for simultaneous high-and low-speed data transmission. We present a testbed using an SDR platform, i.e., the ADALM-PLUTO, to transmit and receive high-and low-speed signals in the very-high frequency band and a media converter as part of an OWC link. We evaluate the performance of the proposed hybrid system employing a chip LED modulated with quadrature phase shift keying signal in terms of the bit error rate and the reception success rate Rrs. We show that the proposed scheme can provide an independent link performance, irrespective of the significant differences between the operating data rates of VLC and OCC links. The results show that for a link span of 1 m, we achieve (i) error-free detection for high-speed PD-based VLC; and (ii) 100 % Rrs at varying modulation frequencies for low-speed IS-based OCC.
2025
K. Eollos-Jarosıkova, C. Guerra-Yanez, O. Gomez-Cardenes, R. Perez-Jimenez, Z. Ghassemlooy, S. Zvanovec, M. Komanec, Wearable Shaped Side-Emitting Fiber Transmitters for Optical Camera Communication, IEEE Journal of Lightwave Technology, vol. 43, issue 7, pp. 3183-3193, 2025. doi: 10.1109/JLT.2024.3512602.
Abstract
Wearable communication is one of the key drivers in the Internet of Things (IoT) and body area networks for transmitting vital sensory data. Wearable devices must be lightweight, flexible, and have low energy consumption. In this context, optical wireless communication offers several significant advantages, such as immunity to the radio frequency-induced electromagnetic interference, broad unlicensed spectrum, and enhanced physical layer security. Wearable devices employing light-emitting diodes coupled to side-emitting optical fibers form energy-efficient, lightweight, flexible, and omnidirectional distributed optical transmitters, which are ideal for IoT applications. In this paper, we propose an optical camera communication (OCC)–based wearable system with a unique image processing algorithm capable of detecting and recovering data from distributed transmitters of arbitrary shapes. Experimental results demonstrate the feasibility of the proposed system, where for distances up to 4 m, the bit error rate (BER) performance is well below the forward error correction BER limit with values as low as 5.5×10−5. The presented results demonstrate the potential of OCC-based systems using side-emitting fibers for IoT applications.
2025
Sodhro, A.H., Mughal, M.I.Y., Iqbal, M.J. (2025). 5G Beyond for Healthcare: Leveraging AI/ML and Diverse Datasets for Cybersecurity. In: Abie, H., Gkioulos, V., Katsikas, S., Pirbhulal, S. (eds) Secure and Resilient Digital Transformation of Healthcare. SUNRISE 2024. Communications in Computer and Information Science, vol 2404. Springer, Cham. https://doi.org/10.1007/978-3-031-85558-0_3
Abstract
The rapid adoption of 5G networks, space networks, and Internet of Things (IoT) technologies in healthcare has significantly expanded the attack surface for cybersecurity threats. This evolving landscape demands robust defense mechanisms that can anticipate and neutralize sophisticated cyber-attacks. Artificial Intelligence (AI), Machine Learning (ML), and Deep Learning (DL) technologies are pivotal in developing such advanced cybersecurity solutions. A critical factor influencing the effectiveness of these AI/ML models is the quality and diversity of the datasets used in their training. This paper presents a systematic review of various datasets used for AI/ML-based cybersecurity model training across multiple domains, with a focus on 5G networks, IoT healthcare, and space networks. By employing a structured Goal-Question-Metric (GQM) methodology and Quasi-Gold Standard (QGS) validation, we assessed the characteristics, applications, and limitations of real, synthetic, and hybrid datasets in enhancing cybersecurity measures. The review identifies key trends, gaps, and future research directions, highlighting the need for more diverse datasets, standardized benchmarks, and privacy-preserving techniques. Our findings offer insights into improving the resilience of AI/ML models for cybersecurity, guiding the development of more effective and adaptable defense strategies across emerging network technologies.
2024
E. Zeydan, S. S. Arslan and M. Liyanage, “Managing Distributed Machine Learning Lifecycle for Healthcare Data in the Cloud,” in IEEE Access, vol. 12, pp. 115750-115774, 2024, doi: 10.1109/ACCESS.2024.3443520.
Abstract
The main objective of this paper is to highlight the research directions and explain the main roles of current Artificial Intelligence (AI)/Machine Learning (ML) frameworks and available cloud infrastructures in building end-to-end ML lifecycle management for healthcare systems and sensitive biomedical data. We identify and explore the versatility of many genuine techniques from distributed computing and current state-of-the-art ML research, such as building cognition-inspired learning pipelines and federated learning (FL) ecosystem. Additionally, we outline the advantages and highlight the main obstacles of our methodology utilizing contemporary distributed secure ML techniques, such as FL, and tools designed for managing data throughout its lifecycle. For a robust system design, we present key architectural decisions essential for optimal healthcare data management, focusing on security, privacy and interoperability. Finally, we discuss ongoing efforts and future research directions to overcome existing challenges and improve the effectiveness of AI/ML applications in the healthcare domain.
2024
S. Wijethilaka, A. Kumar Yadav, A. Braeken and M. Liyanage, “Blockchain-Based Secure Authentication and Authorization Framework for Robust 5G Network Slicing,” in IEEE Transactions on Network and Service Management, vol. 21, no. 4, pp. 3988-4005, Aug. 2024, doi: 10.1109/TNSM.2024.3416418.
Abstract
The rapid evolution of heterogeneous applications signifies the requirement for network slicing to cater to diverse network requirements. Network Functions (NFs), which are the essential elements of network slices, are required to communicate with each other securely to facilitate network services. Certificates are the established method to authenticate each other. However, dynamic certificate management while allowing NFs to communicate in a multi-operator environment is arduous. Also, sharing NFs between network slices originates authorization-related security challenges such as unauthorized service utilization, deceptive Denial of Service attacks, and data leakages from network slices. In this paper, we develop a novel framework to address the security challenges related to authentication and authorization in 5G network slicing systems. A blockchain-based multi-party distributed certificate management framework with secure communication protocols is developed using elliptic curve cryptography to facilitate certificate services for multi-operator environments. Also, we propose a blockchain-based NF authorization framework to mitigate the security vulnerabilities in NF sharing between network slices. We implement the proposed framework using Hyperledger Fabric blockchain with Java chain codes and perform comprehensive experiments to show the significance of our framework.The Ability to mitigate the single point of failure with respect to state-of-the-art, including traditional certificate authorities and blockchain-based certificate authorities, time analysis for certificate generation, and the potential to eliminate the mentioned authorization attacks are some of the experiments conducted.Also, we have shown that our framework is secure using informal and formal (using Real-Or-Random (ROR) logic and Scyther Validation tool) security verification mechanisms.
2024
L. I. Isin, Y. Dalveren, E. Leka and A. Kara, “Securing the Internet of Things: Challenges and Complementary Overview of Machine Learning-Based Intrusion Detection,” 2024 Innovations in Intelligent Systems and Applications Conference (ASYU), Ankara, Turkiye, 2024, pp. 1-4, doi: 10.1109/ASYU62119.2024.10757068.
Abstract
The significant increase in the number of IoT devices has also brought with it various security concerns. The ability of these devices to collect a lot of data, including personal information, is one of the important reasons for these concerns. The integration of machine learning into systems that can detect security vulnerabilities has been presented as an effective solution in the face of these concerns. In this review, it is aimed to examine the machine learning algorithms used in the current studies in the literature for IoT network security. Based on the authors’ previous research in physical layer security, this research also aims to investigate the intersecting lines between upper layers of security and physical layer security. To achieve this, the current state of the area is presented. Then, relevant studies are examined to identify the key challenges and research directions as an initial overview within the authors’ ongoing project.