Pawani Porambage
Pawani Porambage
Researcher, Centre for Wireless Communication, University of Oulu, Finland
Verified email at oulu.fi - Homepage
Title
Cited by
Cited by
Year
Survey on Multi-Access Edge Computing for Internet of Things Realization
P Porambage, J Okwuibe, M Liyanage, M Ylianttila, T Taleb
IEEE Communications Surveys & Tutorials, 2018
3082018
Two-phase authentication protocol for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
2014 IEEE Wireless Communications and Networking Conference (WCNC), 2728-2733, 2014
1942014
The quest for privacy in the internet of things
P Porambage, M Ylianttila, C Schmitt, P Kumar, A Gurtov, AV Vasilakos
IEEE Cloud Computing 3 (2), 36-45, 2016
1582016
PAuthKey: A pervasive authentication protocol and key establishment scheme for wireless sensor networks in distributed IoT applications
P Porambage, C Schmitt, P Kumar, A Gurtov, M Ylianttila
International Journal of Distributed Sensor Networks 10 (7), 357430, 2014
1312014
Group key establishment for enabling secure multicast communication in wireless sensor networks deployed for IoT applications
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
IEEE Access 3, 1503-1511, 2015
922015
Energy consumption analysis of high quality multi-tier wireless multimedia sensor network
T Mekonnen, P Porambage, E Harjula, M Ylianttila
IEEE Access 5, 15848-15858, 2017
412017
EdgeAI: A Vision for Distributed, Edge-native Artificial Intelligence in Future 6G Networks
L Lovén, T Leppänen, E Peltonen, J Partala, E Harjula, P Porambage, ...
352019
Secure end-to-end communication for constrained devices in IoT-enabled Ambient Assisted Living systems
P Porambage, A Braeken, A Gurtov, M Ylianttila, S Spinsante
2015 IEEE 2nd World Forum on Internet of Things (WF-IoT), 711-714, 2015
352015
Micro-operator driven local 5G network architecture for industrial internet
Y Siriwardhana, P Porambage, M Liyanage, JS Walia, M Matinmikko-Blue, ...
2019 IEEE Wireless Communications and Networking Conference (WCNC), 1-8, 2019
262019
Proxy-based end-to-end key establishment protocol for the internet of things
P Porambage, A Braeken, P Kumar, A Gurtov, M Ylianttila
2015 IEEE International Conference on Communication Workshop (ICCW), 2677-2682, 2015
232015
Securing gadget-free digital services
T Kumar, P Porambage, I Ahmad, M Liyanage, E Harjula, M Ylianttila
Computer 51 (11), 66-77, 2018
222018
Quantitative power consumption analysis of a multi-tier wireless multimedia sensor network
P Porambage, A Heikkinen, E Harjula, A Gurtov, M Ylianttila
European Wireless 2016; 22th European Wireless Conference, 1-6, 2016
202016
Certificate-based pairwise key establishment protocol for wireless sensor networks
P Porambage, P Kumar, C Schmitt, A Gurtov, M Ylianttila
2013 IEEE 16th International Conference on Computational Science and …, 2013
202013
eDAAAS: Efficient distributed anonymous authentication and access in smart homes
A Braeken, P Porambage, M Stojmenovic, L Lambrinos
International Journal of Distributed Sensor Networks 12 (12), 1550147716682037, 2016
182016
Mobile relay architecture for low-power IoT devices
A Manzoor, P Porambage, M Liyanage, M Ylianttila, A Gurtov
2018 IEEE 19th International Symposium on" A World of Wireless, Mobile and …, 2018
162018
Secure and efficient reactive video surveillance for patient monitoring
A Braeken, P Porambage, A Gurtov, M Ylianttila
Sensors 16 (1), 32, 2016
162016
BlockEdge: blockchain-edge framework for industrial IoT networks
T Kumar, E Harjula, M Ejaz, A Manzoor, P Porambage, I Ahmad, ...
IEEE Access 8, 154166-154185, 2020
152020
Secure keying scheme for network slicing in 5G architecture
P Porambage, Y Miche, A Kalliola, M Liyanage, M Ylianttila
2019 IEEE Conference on Standards for Communications and Networking (CSCN), 1-6, 2019
122019
Group key establishment for secure multicasting in IoT-enabled Wireless Sensor Networks
P Porambage, A Braeken, C Schmitt, A Gurtov, M Ylianttila, B Stiller
2015 IEEE 40th Conference on Local Computer Networks (LCN), 482-485, 2015
122015
ASEC: anonym signcryption scheme based on EC operations
A Braeken, P Porambage
International Journal of Computer Applications 5 (7), 90-96, 2015
112015
The system can't perform the operation now. Try again later.
Articles 1–20