Jani Suomalainen

About

Jani Suomalainen is a cybersecurity professional and researcher. He has a long experience and wide-background on different information security topics, including network security, intelligent security and security automation, platform and device security, security engineering and threat analysis. He has a special interest in security in the context of mobile and satellite communications. He has master's degree from Lappeenranta University of Technology and doctorate from Aalto University. Since 2000 he has worked in VTT Technical Research Centre of Finland in Espoo, currently as a senior scientist.

Work

VTT Technical Research Centre of Finland

Finland

VTT Technical Research Centre of Finland
|

Senior Scientist

Finland

Education

Aalto University
Finland

Doctor of Science (Technology)

Lappeenranta University of Technology
Finland

Master of Science

Publications

Security Associations in Personal Networks: A Comparative Analysis

Published by

Security and Privacy in Ad-hoc and Sensor Networks

Summary

other

On resource consumption of machine learning in communications network security

Published by

Computer Networks

Summary

journal-article

GAOR: Genetic Algorithm-Based Optimization for Machine Learning Robustness in Communication Networks

Published by

Network

Summary

journal-article

Cyber Threat Intelligence for Hybrid Attacks: Leveraging LLMs and Data Spaces

Summary

preprint

GAOR: Genetic Algorithm-Based Optimization for Machine Learning Robustness in Communication Networks

Published by

Network

Summary

journal-article

Mission-Critical Connectivity Over LEO Satellites: Performance Measurements Using OneWeb System

Published by

IEEE Aerospace and Electronic Systems Magazine

Summary

journal-article

On resource consumption of machine learning in communications network security

Published by

Computer Networks

Summary

journal-article

Mission-critical connectivity over LEO satellites

Published by

IEEE Aerospace and Electronic Systems Magazine

Summary

journal-article

Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence

Published by

Future Generation Computer Systems

Summary

journal-article

GAOR: Genetic Algorithm-Based Optimization for Machine Learning Robustness in Communication Networks

Published by

Network

Summary

journal-article

Cybersecurity for tactical 6G networks: Threats, architecture, and intelligence

Published by

Future Generation Computer Systems

Summary

journal-article

Cybersecurity for Machines in Satellite–Terrestrial Networks

Published by

Integration of MTC and Satellites for IoT toward 6G Era

Summary

book-chapter

Disruptive Technological Directions for 6G Security

Published by

2024 IEEE Conference on Standards for Communications and Networking (CSCN)

Summary

conference-paper

Communications Security in Industry X: A Survey

Published by

IEEE Open Journal of the Communications Society

Summary

journal-article

Communications Security in Industry X

Published by

IEEE Open Journal of the Communications Society

Summary

journal-article

Decentralizing 6G Security

Published by

2024 IEEE Future Networks World Forum, FNWF

Summary

conference-paper

On Environmental Sustainability of 6G Security

Published by

2024 IEEE Future Networks World Forum, FNWF

Summary

conference-paper

Tactical Orchestration

Published by

2024 Joint European Conference on Networks and Communications and 6G Summit (EuCNC/6G Summit 2024)

Summary

conference-paper

CyberRiskDELPHI: towards objective cyber risk assessment for complex systems

Published by

43rd Computers and Information in Engineering Conference (CIE)

Summary

conference-paper

Security in Intent-Based Networking: Challenges and Solutions

Published by

2023 IEEE Conference on Standards for Communications and Networking (CSCN)

Summary

conference-paper

Edge computing for critical environments

Published by

ITU journal on future and evolving technologies

Summary

journal-article

Security-driven prioritization for tactical mobile networks

Published by

Journal of Information Security and Applications

Summary

journal-article

Security-Driven Prioritization for Tactical Mobile Networks

Published by

Journal of Information Security and Applications

Summary

journal-article

Field trial with tactical bubbles for mission critical communications

Published by

Transactions on Emerging Telecommunications Technologies

Summary

journal-article

Field trial with tactical bubbles for mission critical communications

Published by

Transactions on Emerging Telecommunications Technologies

Summary

journal-article

Intelligent Security for 5G Networks and Beyond

Published by

Aalto University publication series: Doctoral theses

Summary

dissertation-thesis

Security of Satellite-Terrestrial Communications: Challenges and Potential Solutions

Published by

IEEE Access

Summary

journal-article

Security of Satellite-Terrestrial Communications

Published by

IEEE Access

Summary

journal-article

Software-defined payload concepts for smallsat communication constellations

Published by

27th Ka and Broadband Communications Conference

Summary

conference-paper

Securing Public Safety Communications on Commercial and Tactical 5G Networks

Published by

IEEE Open Journal of the Communications Society

Summary

journal-article

Unmanned Agricultural Tractors in Private Mobile Networks

Published by

Network

Summary

journal-article

Unmanned Agricultural Tractors in Private Mobile Networks

Published by

Network

Summary

journal-article

Unmanned Agricultural Tractors in Private Mobile Networks

Published by

Network

Summary

journal-article

Testbed for Local-Area Private Network with Satellite-Terrestrial Backhauling

Published by

3rd International Conference on Electrical, Communication and Computer Engineering, ICECCE 2021

Summary

conference-paper

An Overview of the Security Landscape of Virtual Mobile Networks

Published by

IEEE Access

Summary

journal-article

An Overview of the Security Landscape of Virtual Mobile Networks

Published by

IEEE Access

Summary

journal-article

Delegated Device Attestation for IoT

Published by

2021 8th International Conference on Internet of Things

Summary

conference-paper

Securing Public Safety Communications on Commercial and Tactical 5G Networks: A Survey and Future Research Directions

Published by

IEEE Open Journal of the Communications Society

Summary

journal-article

Machine learning in safety critical industry domains

Published by

VTT Research Report

Summary

report

Applicability of a Cryptographic Metric Taxonomy in Cryptosystem Procurement Process and in Evaluation of Open Standards

Published by

International Journal on Advances in Security

Summary

journal-article

Machine Learning Threatens 5G Security

Published by

IEEE Access

Summary

journal-article

Machine Learning Threatens 5G Security

Published by

IEEE Access

Summary

journal-article

5G-Core Network Security

Published by

Wiley 5G Ref

Summary

book-chapter

A Taxonomy of Metrics for Cryptographic Systems

Published by

Thirteenth International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2019, Nice, France, 27/10/19

Summary

conference-presentation

Distributed LSA controller for public safety communications

Published by

2018 IEEE 4th International Conference on Computer and Communications, ICCC 2018

Summary

conference-paper

Security Awareness in Software-Defined Multi-Domain 5G Networks

Published by

Future Internet

Summary

journal-article

Security awareness in software-defined multi-domain 5G networks

Published by

Future Internet

Summary

journal-article

Security awareness in software-defined multi-domain 5G networks

Published by

Future Internet

Summary

journal-article

Sähköisen viestinnän salaus- ja suojausmenetelmät

Published by

Liikenne- ja viestintäministeriön julkaisuja

Summary

report

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

Published by

Cryptography

Summary

journal-article

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

Published by

Cryptography

Summary

journal-article

Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT

Published by

Cryptography

Summary

journal-article

A Security Architecture for 5G Networks

Published by

IEEE Access

Summary

journal-article

A Security Architecture for 5G Networks

Published by

IEEE Access

Summary

journal-article

A Security Architecture for 5G Networks

Published by

IEEE Access

Summary

journal-article

Critical Communications Over Mobile Operators’ Networks: 5G Use Cases Enabled by Licensed Spectrum Sharing, Network Slicing and QoS Control

Published by

IEEE Access

Summary

journal-article

Critical communications over mobile operators’ networks: 5G use cases enabled by licensed spectrum sharing, network slicing and QoS control

Published by

IEEE Access

Summary

journal-article

Critical communications over mobile operators' networks

Published by

IEEE Access

Summary

journal-article

Distributed LSA controller for public safety communications

Published by

2018 IEEE 4th International Conference on Computer and Communications (ICCC)

Summary

conference-paper

Micro-segmenting 5G

Published by

IoTBDS 2018 - Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security

Summary

conference-paper

Micro-segmenting 5G

Published by

IoTBDS 2018 - Proceedings of the 3rd International Conference on Internet of Things, Big Data and Security

Summary

conference-paper

Security Awareness in Software-Defined Multi-Domain 5G Networks

Published by

Future Internet

Summary

journal-article

Application cases of secrecy coding in communication nodes and terminals

Published by

Trusted Communications with Physical Layer Security for 5G and Beyond

Summary

journal-article

Method of univalent and one-to-one association between emitters and receivers of transmission on the basis of the propagation channel

Summary

patent

Application cases of secrecy coding in communication nodes and terminals

Published by

Trusted Communications with Physical Layer Security for 5G and Beyond

Summary

book-chapter

Application cases of secret key generation in communication nodes and terminals

Published by

Trusted Communications with Physical Layer Security for 5G and Beyond

Summary

book-chapter

Application cases of secret key generation in communication nodes and terminals

Published by

Trusted Communications with Physical Layer Security for 5G and Beyond

Summary

journal-article

Evaluating the Efficiency of Blockchains in IoT with Simulations

Published by

Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security

Summary

conference-paper

Evaluating the efficiency of blockchains in IoT with simulations

Published by

Proceedings of the 2nd International Conference on Internet of Things, Big Data and Security

Summary

conference-paper

Enhancing Privacy of Information Brokering in Smart Districts by Adaptive Pseudonymization

Published by

IEEE Access

Summary

journal-article

Towards Micro-Segmentation in 5G Network Security

Published by

European Conference on Networks and Communications, Athens, Greece, 27/06/16

Summary

conference-presentation

Enhancing Privacy of Information Brokering in Smart Districts by Adaptive Pseudonymization

Published by

IEEE Access

Summary

journal-article

Towards Micro-Segmentation in 5G Network Security

Published by

European Conference on Networks and Communications (EuCNC 2016). Workshop on Network Management, Quality of Service and Security for 5G Networks

Summary

conference-paper

Enhancing Privacy of Information Brokering in Smart Districts by Adaptive Pseudonymization

Published by

IEEE Access

Summary

journal-article

Mediated security pairing for the Internet of Things

Published by

Journal of Communication, Navigation, Sensing and Services (CONASENSE)

Summary

journal-article

Multicast security framework for multi-spot beam satellite network

Published by

Ka and Broadband Communications Conference

Summary

conference-paper

Critical technologies towards 5G

Published by

Research Results Report

Summary

report

Mediated Security Pairing for the Internet of Things

Published by

Journal of Communication, Navigation, Sensing and Services (CONASENSE)

Summary

journal-article

Security pairings using physical layer properties of wireless communications

Published by

2014 International Conference on Privacy and Security in Mobile Systems (PRISMS)

Summary

conference-paper

Security pairings using physical layer properties of wireless communications

Published by

2014 International Conference on Privacy and Security in Mobile Systems, PRISMS 2014 - Co-located with Global Wireless Summit

Summary

conference-paper

Security Pairings using Physical Layer Properties of Wireless Communications

Published by

International Conference on Privacy and Security in Mobile Systems (PRISMS 2014)

Summary

conference-paper

Smartphone assisted security pairings for the Internet of Things

Published by

2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE)

Summary

conference-paper

Smartphone assisted security pairings for the Internet of Things

Published by

2014 4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace and Electronic Systems, VITAE 2014 - Co-located with Global Wireless Summit

Summary

conference-paper

Smartphone Assisted Security Pairings for the Internet of Things

Published by

4th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems (VITAE 2014)

Summary

conference-paper

Security Pairings using Physical Layer Properties of Wireless Communications

Published by

INTERNATIONAL CONFERENCE ON PRIVACY AND SECURITY IN MOBILE SYSTEMS (PRISMS)

Summary

conference-paper

Smartphone Assisted Security Pairings for the Internet of Things

Published by

International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology

Summary

conference-paper

Security Aspects of Short-Range Wireless Communication – Risk Analysis for the Healthcare

Published by

International Journal of Intelligent Computing Research

Summary

journal-article

Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space

Published by

Computers

Summary

journal-article

Architecture and knowledge-driven self-adaptive security in smart space

Published by

Computers

Summary

journal-article

Security risks in the short-range communication of ubiquitous application

Published by

8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)

Summary

conference-paper

Security risks in the short-range communication of ubiquitous application

Published by

2013 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013

Summary

conference-paper

Security risks in the short-range communication of ubiquitous application

Published by

8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)

Summary

conference-paper

Smart authentication and authorization in heterogeneous networked world

Summary

dissertation-thesis

Smart spaces arise from interoperation

Published by

Value-driven Business in the Cloud

Summary

journal-article

Smart spaces arise from interoperation

Published by

Uniting the physical and virtual

Summary

book-chapter

Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space

Published by

Computers

Summary

journal-article

Secure inspection of web transactions

Published by

International Journal of Internet Technology and Secured Transactions

Summary

journal-article

Flexible Security Deployment in Smart Spaces

Published by

Grid and Pervasive Computing Workshops

Summary

other

Flexible security deployment in smart spaces

Published by

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Summary

book

Flexible security deployment in smart spaces

Published by

Proceedings

Summary

conference-paper

Quantifying the value of SSL certification with web reputation metrics

Published by

Proceedings of the Seventh International Conference on Internet Monitoring and Protection

Summary

conference-paper

Secure inspection of web transactions

Published by

International Journal of Internet Technology and Secured Transactions

Summary

journal-article

Secure inspection of web transactions

Published by

International Journal of Internet Technology and Secured Transactions

Summary

journal-article

Security solutions for smart spaces

Published by

Proceedings of the IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011

Summary

conference-paper

Security solutions for smart spaces

Published by

Proceedings - 11th IEEE/IPSJ International Symposium on Applications and the Internet, SAINT 2011

Summary

conference-paper

Security Solutions for Smart Spaces

Published by

2011 IEEE/IPSJ International Symposium on Applications and the Internet

Summary

conference-paper

Secure information sharing between heterogeneous embedded devices

Published by

Proceedings of the Fourth European Conference on Software Architecture Companion Volume - ECSA '10

Summary

conference-paper

Secure information sharing between heterogeneous embedded devices

Published by

ACM International Conference Proceeding Series

Summary

conference-paper

Secure information sharing between heterogeneous embedded devices

Published by

ECSA '10 Proceedings of the Fourth European Conference on Software Architecture

Summary

conference-paper

A secure P2P incentive mechanism for mobile devices

Published by

International Journal on Advances in Security

Summary

journal-article

Standards for security associations in personal networks

Published by

International Journal of Security and Networks

Summary

journal-article

Standards for security associations in personal networks: A comparative analysis

Published by

International Journal of Security and Networks

Summary

journal-article

A security analysis of a P2P incentive mechanisms for mobile devices

Published by

2008 Third International Conference on Internet and Web Applications and Services

Summary

conference-paper

OpenHouse: A Secure Platform for Distributed Home Services

Published by

2008 Sixth Annual Conference on Privacy, Security and Trust

Summary

conference-paper

OpenHouse: A secure platform for distributed home services

Published by

Proceedings - 6th Annual Conference on Privacy, Security and Trust, PST 2008

Summary

conference-paper

OpenHouse

Published by

Proceedings

Summary

conference-paper

A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices

Published by

2008 Third International Conference on Internet and Web Applications and Services

Summary

conference-paper

A security analysis of a P2P incentive mechanisms for mobile devices

Published by

Proceedings - 3rd International Conference on Internet and Web Applications and Services, ICIW 2008

Summary

conference-paper

Developing Keyboard Service for NoTA

Published by

VTT Working Papers

Summary

report

Towards fine-grained authorizations in small office and home networks

Published by

Second International Conference on Systems and Networks Communications, ICSNC 2007

Summary

conference-paper

Towards fine-grained authorizations in small office and home networks

Published by

Second International Conference on Systems and Networks Communications, ICSNC 2007

Summary

conference-paper

Security associations in personal networks: A comparative analysis

Published by

European Workshop on Security in Ad-hoc and Sensor Networks

Summary

conference-paper

Towards FineGrained Authorizations in Small Office and Home Networks

Published by

2007 Second International Conference on Systems and Networks Communications (ICSNC 2007)

Summary

conference-paper

Security associations in personal networks

Published by

Security and Privacy in Ad-hoc and Sensor Networks, ESAS 2007

Summary

conference-paper

Security associations in personal setworks

Published by

Nokia Research Center Technical Report

Summary

report

Implementing mobile access to heterogeneous home environment

Published by

Proc. of IFIP Conference on Home-Oriented Informatics and Telematics (HOIT 03)

Summary

conference-paper

Implementing mobile access to heterogeneous home environment

Published by

Home Oriented Informatics and Telematics, HOIT 2003, Irvine, United States, 6/04/03

Summary

conference-presentation

Secure storage for mobile terminals

Published by

The Eight Nordic Workshop on Secure IT System - NORDSEC 2003

Summary

conference-paper

Secure storage for mobile terminals

Published by

The Eight Nordic Workshop on Secure IT System - NORDSEC 2003

Summary

conference-paper