Göran Pulkkis

Learn More
As demand increases for ubiquitous network facilities, infrastructure-less and self-configuring systems like Mobile Ad hoc Networks (MANET) are gaining popularity. MANET routing security however, is one of the most significant challenges to wide scale adoption, with wormhole attacks being an especially severe MANET routing threat. This is because wormholes(More)
Control signaling messages in Mobile IPv6 are mainly used to inform the home agent (HA) and the correspondent node (CN) about the mobile node’s (MN’s) new address when its network attachment point is changed. In order to prevent various security attacks, these messages must be protected. In the current standard, the control signaling messages between a HA(More)
Host Identity Protocol (HIP) gives cryptographically veriable identities to hosts. These identities are based on public key cryptography and consist of public and private keys. Public keys can be stored, together with corresponding IP addresses, in DNS servers. When entities are negotiating on a HIP connection, messages are signed with private keys and(More)
Extending state-of-the-art machine learning algorithms to highly scalable (big data) analysis environments is crucial for the handling of authentic datasets in Intrusion Detection Systems (IDS). Traditional supervised learning methods are considered to be too slow for use in these environments. Therefore, we propose the use of Extreme Learning Machine (ELM)(More)
Traversal time and hop count analysis (TTHCA) is a recent wormhole detection algorithm for mobile ad hoc networks (MANET) which provides enhanced detection performance against all wormhole attack variants and network types. TTHCA involves each node measuring the processing time of routing packets during the route discovery process and then delivering the(More)
The didactical approach of the virtual course is a guided excursion to which students enroll. The task sets, consisting of exercises and study directives, that the course teacher assigns each week to the students are introduced and explained in detail. The concept of step-by-step skill assimilation, which lies behind the student guidance process, is(More)
Much has happened in the field of Information Technology since 2008 when ACM published its curriculum recommendation for a four year Undergraduate Degree Program in Information Technology. We show an alternative path reflecting what we consider presently requested by the industry and students alike. In this paper we look at the topics from a holistic point(More)