Change search
Link to record
Permanent link

Direct link
BETA
Vasilakos, AthanasiosORCID iD iconorcid.org/0000-0003-1902-9877
Alternative names
Publications (10 of 198) Show all publications
Wazid, M., Kumar Das, A., Kumar, N., Vasilakos, A. & Rodrigues, J. J. P. (2019). Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet of Things Journal
Open this publication in new window or tab >>Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
Show others...
2019 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662Article in journal (Refereed) Epub ahead of print
Abstract [en]

The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Internet of Drones, user authentication, AVISPA, NS2 simulation, security
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-72766 (URN)10.1109/JIOT.2018.2888821 (DOI)
Available from: 2019-02-01 Created: 2019-02-01 Last updated: 2019-02-01
Wazid, M., Kumar Das, A., Kumar, N. & Vasilakos, A. (2019). Design of secure key management and user authentication scheme for fog computing services. Future generations computer systems, 91, 475-492
Open this publication in new window or tab >>Design of secure key management and user authentication scheme for fog computing services
2019 (English)In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, p. 475-492Article in journal (Refereed) Published
Abstract [en]

Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real-Or-Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Fog computing, Key management, Authentication, Services, Security, AVISPA, NS2 simulation
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71007 (URN)10.1016/j.future.2018.09.017 (DOI)000451790900040 ()2-s2.0-85054039812 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-10-03 (svasva)

Available from: 2018-09-27 Created: 2018-09-27 Last updated: 2019-02-13Bibliographically approved
Xu, X., Lu, Q., Liu, Y., Zhu, L., Yao, H. & Vasilakos, A. (2019). Designing blockchain-based applications a case study for imported product traceability. Future generations computer systems, 92, 399-406
Open this publication in new window or tab >>Designing blockchain-based applications a case study for imported product traceability
Show others...
2019 (English)In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, p. 399-406Article in journal (Refereed) Published
Abstract [en]

Blockchain technology enables decentralization as new forms of distributed software architectures, where components can reach agreements on the shared system states without trusting on a central integration point. Since blockchain is an emerging technology which is still at an early stage of development, there is limited experience on applying blockchain to real-world software applications. We applied blockchain application design approaches proposed in software architecture community in a real-world project called originChain, which is a blockchain-based traceability system that restructures the current system by replacing the central database with blockchain. In this paper, we share our experience of building originChain. By using blockchain and designing towards security, originChain provides transparent tamper-proof traceability data with high availability and enables automated regulatory-compliance checking and adaptation in product traceability scenarios. We also demonstrate both qualitative and quantitative analysis of the software architecture of originChain. Based on our experience and analysis, we found that the structural design of smart contracts has large impact on the quality of the system.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Blockchain, Smart contract, Adaptability, Software architecture
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71483 (URN)10.1016/j.future.2018.10.010 (DOI)000454370600034 ()2-s2.0-85055626212 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-11-07 (johcin)

Available from: 2018-11-07 Created: 2018-11-07 Last updated: 2019-01-29Bibliographically approved
Sun, G., Li, Y., Yu, H., Vasilakos, A., Du, X. & Guizani, M. (2019). Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks. Future generations computer systems, 91, 347-360
Open this publication in new window or tab >>Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks
Show others...
2019 (English)In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, p. 347-360Article in journal (Refereed) Published
Abstract [en]

Service function chaining (SFC) provisioning is helpful not only for saving the capital expenditure (CAPEX) and operational expenditure (OPEX) of a network provider but also for reducing energy consumption in the substrate network. However, to the best of our knowledge, there has been little research on the problem of energy consumption for orchestrating online SFC requests in multi-domain networks. In this paper, we first formulate the problem of an energy-efficient online SFC request that is orchestrated across multiple clouds as an integer linear programming (ILP) model to find an optimal solution. Then, we analyze the complexity of this ILP model and prove that the problem is NP-hard. Additionally, we propose a low-complexity heuristic algorithm named energy-efficient online SFC request orchestration across multiple domains (EE-SFCO-MD) for near-optimally solving the mentioned problem. Finally, we conduct simulation experiments to evaluate the performance of our algorithm. Simulation results show that EE-SFCO-MD consumes less energy than existing approaches while the online SFC’s requirements are met and the privacy of each cloud is effectively guaranteed. The low computational complexity of the heuristic approach makes it applicable for quickly responding to online SFC requests.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Service function chaining, Orchestration, Energy efficiency, Multi-domain networks
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71011 (URN)10.1016/j.future.2018.09.037 (DOI)000451790900029 ()2-s2.0-85053801008 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-09-27 (svasva)

Available from: 2018-09-27 Created: 2018-09-27 Last updated: 2019-02-13Bibliographically approved
Makkie, M., Huang, H., Zhao, Y., Vasilakos, A. & Liu, T. (2019). Fast and Scalable Distributed Deep Convolutional Autoencoder for fMRI Big Data Analytics. Neurocomputing, 325, 20-30
Open this publication in new window or tab >>Fast and Scalable Distributed Deep Convolutional Autoencoder for fMRI Big Data Analytics
Show others...
2019 (English)In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 325, p. 20-30Article in journal (Refereed) Published
Abstract [en]

In recent years, analyzing task-based fMRI (tfMRI) data has become an essential tool for understanding brain function and networks. However, due to the sheer size of tfMRI data, its intrinsic complex structure, and lack of ground truth of underlying neural activities, modeling tfMRI data is hard and challenging. Previously proposed data modeling methods including Independent Component Analysis (ICA) and Sparse Dictionary Learning only provided shallow models based on blind source separation under the strong assumption that original fMRI signals could be linearly decomposed into time series components with corresponding spatial maps. Given the Convolutional Neural Network (CNN) successes in learning hierarchical abstractions from low-level data such as tfMRI time series, in this work we propose a novel scalable distributed deep CNN autoencoder model and apply it for fMRI big data analysis. This model aims to both learn the complex hierarchical structures of the tfMRI big data and to leverage the processing power of multiple GPUs in a distributed fashion. To deploy such a model, we have created an enhanced processing pipeline on the top of Apache Spark and Tensorflow, leveraging from a large cluster of GPU nodes over cloud. Experimental results from applying the model on the Human Connectome Project (HCP) data show that the proposed model is efficient and scalable toward tfMRI big data modeling and analytics, thus enabling data-driven extraction of hierarchical neuroscientific information from massive fMRI big data.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Data mining, Neural networks, Distributed computing methodologies, Machine learning
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71190 (URN)10.1016/j.neucom.2018.09.066 (DOI)000449695000002 ()2-s2.0-85055437227 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-11-21 (johcin)

Available from: 2018-10-12 Created: 2018-10-12 Last updated: 2018-11-30Bibliographically approved
Liu, X., Zhao, S., Liu, A., Xiong, N. & Vasilakos, A. (2019). Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things. Future generations computer systems, 92, 1142-1156
Open this publication in new window or tab >>Knowledge-aware Proactive Nodes Selection approach for energy management in Internet of Things
Show others...
2019 (English)In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, p. 1142-1156Article in journal (Refereed) Published
Abstract [en]

Internet of Things will serve communities across the different domains of life. Tracking mobile targets is one important system engineering application in IOT, and the resource of embedded devices and objects working under IoT implementation are constrained. Thus, building a scheme to make full use of energy is key issue for mobile target tracking applications. To achieve both energy efficiency and high monitoring performance, an effective Knowledge-aware Proactive Nodes Selection (KPNS) system is proposed in this paper. The innovations of KPNS are as follows: 1) the number of proactive nodes are dynamically adjusted based on prediction accuracy of target trajectory. If the prediction accuracy is high, the number of proactive nodes in the non-main predicted area will be decreased. If prediction accuracy of moving trajectory is low, large number of proactive nodes will be selected to enhance monitoring quality. 2) KPNS takes full advantage of energy to further enhance target tracking performance by properly selecting more proactive nodes in the network. We evaluated the efficiency of KPNS with both theory analysis and simulation based experiments. The experimental results demonstrate that compared with Probability-based target Prediction and Sleep Scheduling strategy (PPSS), KPNS scheme improves the energy efficiency by 60%, and can reduce target missing rate and tracking delay to 66%, 75% respectively.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Proactive nodes selection system; Target tracking; Network lifetime; Energy efficient
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-65149 (URN)10.1016/j.future.2017.07.022 (DOI)000454370600099 ()2-s2.0-85028345951 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-01-29 (inah)

Available from: 2017-08-17 Created: 2017-08-17 Last updated: 2019-02-11Bibliographically approved
Lemlouma, T., Laborie, S., Rachedi, A., Santos, A. & Vasilakos, A. (2019). Special issue on selected papers from e-health pervasive wireless applications and services 2017. Information Science and Technology, 10(2), Article ID 52.
Open this publication in new window or tab >>Special issue on selected papers from e-health pervasive wireless applications and services 2017
Show others...
2019 (English)In: Information Science and Technology, ISSN 2078-2489, E-ISSN 2078-2489, Vol. 10, no 2, article id 52Article in journal, Editorial material (Refereed) Published
Place, publisher, year, edition, pages
MDPI, 2019
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-72931 (URN)10.3390/info10020052 (DOI)2-s2.0-85061185155 (Scopus ID)
Available from: 2019-02-18 Created: 2019-02-18 Last updated: 2019-02-18Bibliographically approved
Liu, L., Zhou, Y., Vasilakos, A., Tian, L. & Shi, J. (2019). Time-domain ICIC and optimized designs for 5G and beyond: a survey. Science China Information Sciences, 62(2), Article ID 21302.
Open this publication in new window or tab >>Time-domain ICIC and optimized designs for 5G and beyond: a survey
Show others...
2019 (English)In: Science China Information Sciences, ISSN 1674-733X, E-ISSN 1869-1919, Vol. 62, no 2, article id 21302Article in journal (Refereed) Published
Abstract [en]

Time-domain enhanced inter-cell interference coordination (eICIC) is an effective technique to reduce the cross-tier inter-cell interference (ICI) in long term evolution (LTE)-based heterogeneous small cell networks (HetSCNs). This paper first clarifies two main communication scenarios in HetSCNs, i.e., macrocells deployed with femtocells (macro-femto) and with picocells (macro-pico). Then, the main challenges in HetSCNs, particularly the severe cross-tier ICI in macro-femto caused by femtocells with closed subscribe group (CSG) access or in macro-pico caused by picocells with range expansion are analyzed. Based on the prominent feature of dominant interference in HetSCNs, the main idea of time-domain interference coordination and two basic schemes in the eICIC standardization, i.e., almost blank subframe (ABS) and orthogonal frequency division multiplexing symbol shift are presented, with a systematic introduction to the interactions of these techniques with other network functions. Then, given macro-femto and macro-pico HetSCNs, an overview is provided on the advanced designs of ABS-based eICIC, including self-optimized designs with regard to key parameters such as ABS muting ratio, and joint optimized designs of ABS-based eICIC and other radio resource management techniques, such as user association and power control. Finally, the open issues and future research directions are discussed.

Keywords
eICIC, almost blank subframe, joint optimized design, heterogeneous small cell networks, 5G and beyond
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-72823 (URN)10.1007/s11432-017-9477-4 (DOI)000453363700001 ()2-s2.0-85058644688 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-02-08 (johcin) 

Available from: 2019-02-08 Created: 2019-02-08 Last updated: 2019-02-08Bibliographically approved
Yin, L., Guo, Y., Li, F., Sun, Y., Qian, J. & Vasilakos, A. (2018). A game-theoretic approach to advertisement dissemination in ephemeral networks. World wide web (Bussum), 21(2), 241-260
Open this publication in new window or tab >>A game-theoretic approach to advertisement dissemination in ephemeral networks
Show others...
2018 (English)In: World wide web (Bussum), ISSN 1386-145X, E-ISSN 1573-1413, Vol. 21, no 2, p. 241-260Article in journal (Refereed) Published
Abstract [en]

In ephemeral networks, disseminating advertisements faces two dilemmatic problems: on the one hand, disseminators own the limited resources and have privacy concerns, thus, often preferring to avoid disseminating advertisements without enough incentives; Even if advertisements are disseminated, their dissemination accuracy is lower. On the other hand, false advertisements may flood in ephemeral networks if too many incentives but no punishments are given. Thus, it is a challenge to design an effective scheme to guarantee rational disseminators have sufficient impetus to forward true advertisements to the interested consumers and report false advertisements, despite facing the limitation of resources and the risk of privacy leakage. To solve this problem, in this paper, a bargaining-based scheme is proposed to motive disseminators to forward the true advertisements to the interested node and a semi-grim policy is designed for punishing the disseminators who releases and disseminates false advertisements. Acknowledging the assumption of incomplete information, a repeated dissemination game is proposed to help disseminators to decide whether to forward advertisements or report false advertisements. Simulation results demonstrate that our scheme not only provides disseminators a strong impetus to disseminate the advertisements with higher dissemination accuracy, but also effectively prevents disseminators from forwarding false advertisements.

Place, publisher, year, edition, pages
Springer, 2018
National Category
Media and Communication Technology
Research subject
Mobile and Pervasive Computing
Identifiers
urn:nbn:se:ltu:diva-62696 (URN)10.1007/s11280-017-0432-6 (DOI)000425319200001 ()
Note

Validerad;2018;Nivå 2;2018-02-19 (svasva)

Available from: 2017-03-27 Created: 2017-03-27 Last updated: 2018-03-15Bibliographically approved
Huang, M., Liu, A., Xiong, N. N., Wang, T. & Vasilakos, A. (2018). A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems. IEEE Transactions on Systems, Man & Cybernetics. Systems
Open this publication in new window or tab >>A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems
Show others...
2018 (English)In: IEEE Transactions on Systems, Man & Cybernetics. Systems, ISSN 2168-2216, E-ISSN 1349-2543Article in journal (Refereed) Epub ahead of print
Abstract [en]

Millions of dedicated sensors are deployed in smart cities to enhance quality of urban living. Communication technologies are critical for connecting these sensors and transmitting events to sink. In control systems of mobile wireless sensor networks (MWSNs), mobile nodes are constantly moving to detect events, while static nodes constitute the communication infrastructure for information transmission. Therefore, how to communicate with sink quickly and effectively is an important research issue for control systems of MWSNs. In this paper, a communication scheme named first relay node selection based on fast response and multihop relay transmission with variable duty cycle (FRAVD) is proposed. The scheme can effectively reduce the network delay by combining first relay node selection with node duty cycles setting. In FRAVD scheme, first, for the first relay node selection, we propose a strategy based on fast response, that is, select the first relay node from adjacent nodes in the communication range within the shortest response time, and guarantee that the remaining energy and the distance from sink of the node are better than the average. Then for multihop data transmission of static nodes, variable duty cycle is introduced novelty, which utilizes the residual energy to improve the duty cycle of nodes in far-sink area, because nodes adopt a sleep-wake asynchronous mode, increasing the duty cycle can significantly improve network performance in terms of delays and transmission reliability. Our comprehensive performance analysis has demonstrated that compared with the communication scheme with fixed duty cycle, the FRAVD scheme reduces the network delay by 24.17%, improves the probability of finding first relay node by 17.68%, while also ensuring the network lifetime is not less than the previous researches, and is a relatively efficient low-latency communication scheme.

Place, publisher, year, edition, pages
IEEE, 2018
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-68843 (URN)10.1109/TSMC.2018.2833204 (DOI)
Available from: 2018-05-22 Created: 2018-05-22 Last updated: 2018-05-31
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-1902-9877

Search in DiVA

Show all publications