scispace - formally typeset
Search or ask a question
Author

Nicklas Beijar

Bio: Nicklas Beijar is an academic researcher from Ericsson. The author has contributed to research in topics: The Internet & Cellular network. The author has an hindex of 12, co-authored 51 publications receiving 570 citations. Previous affiliations of Nicklas Beijar include Aalto University & Helsinki University of Technology.


Papers
More filters
Journal ArticleDOI
TL;DR: An in-depth analysis on the requirements of edge computing from the perspective of three selected use cases that are particularly interesting for harnessing the power of the Internet of Things and the applicability of two LV technologies, containers and unikernels, as platforms for enabling the scalability, security, and manageability required.
Abstract: Lightweight virtualization (LV) technologies have refashioned the world of software development by introducing flexibility and new ways of managing and distributing software. Edge computing complements today's powerful centralized data centers with a large number of distributed nodes that provide virtualization close to the data source and end users. This emerging paradigm offers ubiquitous processing capabilities on a wide range of heterogeneous hardware characterized by different processing power and energy availability. The scope of this article is to present an in-depth analysis on the requirements of edge computing from the perspective of three selected use cases that are particularly interesting for harnessing the power of the Internet of Things. We discuss and compare the applicability of two LV technologies, containers and unikernels, as platforms for enabling the scalability, security, and manageability required by such pervasive applications that soon may be part of our everyday lives. To inspire further research, we identify open problems and highlight future directions to serve as a road map for both industry and academia.

239 citations

Proceedings ArticleDOI
Oscar Novo1, Nicklas Beijar1, Mert Ocak1, Jimmy Kjällman1, Miika Komu1, Tero Kauppinen1 
14 Dec 2015
TL;DR: This paper introduces a new Capillary Network Platform and describes the rich set of functionalities that this platform enables and illustrates how this work can be used to enhance the existing IoT networks and tackle their problems.
Abstract: The Internet of Things (IoT) represents a new revolutionary era of computing technology that enables a wide variety of devices to interoperate through the existing Internet infrastructure. The potential of this era is boundless, bringing in new communication opportunities in which ubiquitous devices blend seamlessly with the environment and embrace every aspect of our lives. Capillary networks will be a fundamental part of the IoT development, enabling local wireless sensor networks to connect to and efficiently use the capabilities of cellular networks through gateways. As a result, a vast range of constrained devices equipped with only short-range radio can utilize the cellular network capabilities to gain global connectivity, supported with the security, management and virtualization services of the cellular network. This paper introduces a new Capillary Network Platform and describes the rich set of functionalities that this platform enables. To show their practical value, the functionalities are applied to a set of typical scenarios. The aim of this paper is to give the reader insight about the Capillary Network Platform and illustrate how this work can be used to enhance the existing IoT networks and tackle their problems.

69 citations

Proceedings ArticleDOI
01 Jun 2016
TL;DR: The design of a multifunctional IoT gateway that, making use of lightweight virtualization technologies such as Docker containers, allows managing different services, including data processing services, so as to enable the migration towards the edge based approach.
Abstract: Cloud computing plays a crucial role in making Internet of Things (IoT) becoming a central part of future industries, society and people's life. However, the increase of the number of devices connected to the different networks, the huge amount of data produced by them, and the advanced requirements of many IoT applications, has resulted in new technical challenges. This has lead to the introduction of an edge-computing approach, which is intended to make the management of such networks more efficient. The paradigm aims to move part of the data processing operations close to the data sources. Such operations are performed by means of network entities - like IoT gateways or local servers - near the IoT device. In this paper, we describe the design of a multifunctional IoT gateway that, making use of lightweight virtualization technologies such as Docker containers, allows managing different services, including data processing services, so as to enable the migration towards the edge based approach. Furthermore, we show how the introduction of container-based technologies can bring several benefits without impacting the gateway performance.

50 citations

Journal ArticleDOI
TL;DR: This paper proposes a system controlled by policy that overcomes the classical weaknesses in the Internet, namely source address spoofing and denial of service attacks and proposes to improve the mobile device experience by new methods of network address translator traversal suitable for battery-powered mobile devices.
Abstract: Besides more capacity and faster connections, 5G is expected to provide ultra-reliable services, for example, for machine-to-machine communications. In this paper, we advocate that 5G must do its best to eliminate malicious traffic as a cause of failure of legitimate services. This paper proposes that all communications in 5G should be controlled by policy. The policies facilitate cooperation of customer networks against misbehaving actors and collecting evidence of malicious activity. Dynamic policies can react to hosts that are used in attacks. We propose a system controlled by policy that overcomes the classical weaknesses in the Internet, namely source address spoofing and denial of service attacks. We propose to improve the mobile device experience by new methods of network address translator traversal suitable for battery-powered mobile devices. We believe that 5G will be the major driver for the future Internet, which is why we relate our approach to other proposals for future Internet architecture. Our approach can be deployed one network at a time as it limits the changes to edge nodes; no compulsory changes are proposed to hosts. The paper reports the experience from experimentation and evaluates scalability and security including initial results on performance. © 2015 The Authors. Security and Communication Networks published by John Wiley & Sons, Ltd.

26 citations

Proceedings ArticleDOI
25 May 2007
TL;DR: Results from a survey conducted among potential mobile peer-to-peer (P2P) content sharing services users in Finland are presented and examples of P2P services that have chances to achieve end-user acceptance are elaborated on.
Abstract: This paper studies attitudes towards mobile peer-to-peer content sharing services. It presents results from a survey conducted among potential mobile peer-to-peer (P2P) content sharing services users in Finland. The paper does not try to assess technical feasibility of deployment of P2P services in mobile networks. It answers elementary questions about the willingness of mobile phone users to share content stored in their mobile phones as well as their interest in downloading content created by the content industry and other mobile phone users. Thus, it examines feasibility of providing such services. The paper also presents respondents' opinions concerning mobile P2P content sharing services. It also elaborates on example mobile content services that have chances to achieve end-user acceptance.

21 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This research offers significant and timely insight to AI technology and its impact on the future of industry and society in general, whilst recognising the societal and industrial influence on pace and direction of AI development.

808 citations

Journal ArticleDOI
TL;DR: This paper provides a tutorial on fog computing and its related computing paradigms, including their similarities and differences, and provides a taxonomy of research topics in fog computing.

783 citations

Journal ArticleDOI
TL;DR: A surprise announcement by then prime minister Tony Blair in 1998 led to the creation of a new senior clinical role - the nurse consultant.
Abstract: A surprise announcement by then prime minister Tony Blair in 1998 led to the creation of a new senior clinical role - the nurse consultant.

462 citations

Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations

Journal ArticleDOI
TL;DR: This paper systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks, and sheds light on the gaps in these security solutions that call for ML and DL approaches.
Abstract: The future Internet of Things (IoT) will have a deep economical, commercial and social impact on our lives. The participating nodes in IoT networks are usually resource-constrained, which makes them luring targets for cyber attacks. In this regard, extensive efforts have been made to address the security and privacy issues in IoT networks primarily through traditional cryptographic approaches. However, the unique characteristics of IoT nodes render the existing solutions insufficient to encompass the entire security spectrum of the IoT networks. Machine Learning (ML) and Deep Learning (DL) techniques, which are able to provide embedded intelligence in the IoT devices and networks, can be leveraged to cope with different security problems. In this paper, we systematically review the security requirements, attack vectors, and the current security solutions for the IoT networks. We then shed light on the gaps in these security solutions that call for ML and DL approaches. Finally, we discuss in detail the existing ML and DL solutions for addressing different security problems in IoT networks. We also discuss several future research directions for ML- and DL-based IoT security.

407 citations