Change search
Link to record
Permanent link

Direct link
BETA
Vasilakos, AthanasiosORCID iD iconorcid.org/0000-0003-1902-9877
Alternative names
Publications (10 of 215) Show all publications
Yi,, J.-H., Xing, L.-N. -., Wang, G.-G., Dong, J., Vasilakos, A., Alavi, A. & Wang, L. (2020). Behavior of crossover operators in NSGA-III for large-scale optimization problems. Information Sciences, 509, 470-487
Open this publication in new window or tab >>Behavior of crossover operators in NSGA-III for large-scale optimization problems
Show others...
2020 (English)In: Information Sciences, ISSN 0020-0255, E-ISSN 1872-6291, Vol. 509, p. 470-487Article in journal (Refereed) Published
Abstract [en]

Traditional multi-objective optimization evolutionary algorithms (MOEAs) do not usually meet the requirements for online data processing because of their high computational costs. This drawback has resulted in difficulties in the deployment of MOEAs for multi-objective, large-scale optimization problems. Among different evolutionary algorithms, non-dominated sorting genetic algorithm-the third version (NSGA-III) is a fairly new method capable of solving large-scale optimization problems with acceptable computational requirements. In this paper, the performance of three crossover operators of the NSGA-III algorithm is benchmarked using a large-scale optimization problem based on human electroencephalogram (EEG) signal processing. The studied operators are simulated binary (SBX), uniform crossover (UC), and single point (SI) crossovers. Furthermore, enhanced versions of the NSGA-III algorithm are proposed through introducing the concept of Stud and designing several improved crossover operators of SBX, UC, and SI. The performance of the proposed NSGA-III variants is verified on six large-scale optimization problems. Experimental results indicate that the NSGA-III methods with UC and UC-Stud (UCS) outperform the other developed variants.

Place, publisher, year, edition, pages
Elsevier, 2020
Keywords
Electroencephalography, Large-scale optimization, Big data optimization, Evolutionary multi-objective optimization, NSGA-III, Crossover operator, Performance analysis
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71519 (URN)10.1016/j.ins.2018.10.005 (DOI)2-s2.0-85055637462 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-10-09 (johcin)

Available from: 2018-11-09 Created: 2018-11-09 Last updated: 2019-10-09Bibliographically approved
Huang, M., Liu, A., Xiong, N. N., Wang, T. & Vasilakos, A. (2019). A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems. IEEE Transactions on Systems, Man & Cybernetics. Systems, 49(2), 317-332
Open this publication in new window or tab >>A Low-Latency Communication Scheme for Mobile Wireless Sensor Control Systems
Show others...
2019 (English)In: IEEE Transactions on Systems, Man & Cybernetics. Systems, ISSN 2168-2216, E-ISSN 1349-2543, Vol. 49, no 2, p. 317-332Article in journal (Refereed) Published
Abstract [en]

Millions of dedicated sensors are deployed in smart cities to enhance quality of urban living. Communication technologies are critical for connecting these sensors and transmitting events to sink. In control systems of mobile wireless sensor networks (MWSNs), mobile nodes are constantly moving to detect events, while static nodes constitute the communication infrastructure for information transmission. Therefore, how to communicate with sink quickly and effectively is an important research issue for control systems of MWSNs. In this paper, a communication scheme named first relay node selection based on fast response and multihop relay transmission with variable duty cycle (FRAVD) is proposed. The scheme can effectively reduce the network delay by combining first relay node selection with node duty cycles setting. In FRAVD scheme, first, for the first relay node selection, we propose a strategy based on fast response, that is, select the first relay node from adjacent nodes in the communication range within the shortest response time, and guarantee that the remaining energy and the distance from sink of the node are better than the average. Then for multihop data transmission of static nodes, variable duty cycle is introduced novelty, which utilizes the residual energy to improve the duty cycle of nodes in far-sink area, because nodes adopt a sleep-wake asynchronous mode, increasing the duty cycle can significantly improve network performance in terms of delays and transmission reliability. Our comprehensive performance analysis has demonstrated that compared with the communication scheme with fixed duty cycle, the FRAVD scheme reduces the network delay by 24.17%, improves the probability of finding first relay node by 17.68%, while also ensuring the network lifetime is not less than the previous researches, and is a relatively efficient low-latency communication scheme.

Place, publisher, year, edition, pages
IEEE, 2019
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-68843 (URN)10.1109/TSMC.2018.2833204 (DOI)000457670800005 ()2-s2.0-85047223757 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-04-12 (johcin)

Available from: 2018-05-22 Created: 2018-05-22 Last updated: 2019-04-12Bibliographically approved
Safkhani, M. & Vasilakos, A. (2019). A New Secure Authentication Protocol for Telecare Medicine Information Systemand Smart Campus. IEEE Access, 7, 23514-23526
Open this publication in new window or tab >>A New Secure Authentication Protocol for Telecare Medicine Information Systemand Smart Campus
2019 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 23514-23526Article in journal (Refereed) Published
Abstract [en]

Telecare Medicine Information System (TMIS)'s security importance attracts a lot of attention these days. Whatever the security of TMIS improves, its application becomes wider. To address this requirement, recently, Li et al. proposed a new privacy-preserving RFID authentication protocol for TMIS. After that, Zhou et al. and also Benssalah et al. presented their scheme, which is not secure, and they presented their new authentication protocol and claim that their proposal can provide higher security for TMIS applications. In this stream, Zheng et al. proposed a novel authentication protocol with application in smart campus, including TMIS. In this paper, we present an efficient impersonation and replay attacks against Zheng et al. with the success probability of 1 and a desynchronization attack which is applicable against all of the rest three mentioned protocols with the success probability of 1-2^{-n} , where n is the protocols parameters length. After that, we proposed a new protocol despite these protocols can resist the attacks presented in this paper and also other active and passive attacks. Our proposed protocol's security is also done both informally and formally through the Scyther tool.

Place, publisher, year, edition, pages
PISCATAWAY: IEEE, 2019
Keywords
Telecare medicine information system, security, authentication, residue theorem, hash function
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-73268 (URN)10.1109/ACCESS.2019.2896641 (DOI)000460916100001 ()2-s2.0-85062725146 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-03-20 (oliekm)

Available from: 2019-03-20 Created: 2019-03-20 Last updated: 2019-03-21Bibliographically approved
Lan, Y., Bai, K., Hung, C.-C., Alelaiwi, A. & Vasilakos, A. (2019). A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve. IEEE Access, 7, 45850-45857
Open this publication in new window or tab >>A Novel Definition of Equivalent Uniform Dose Based on Volume Dose Curve
Show others...
2019 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 45850-45857Article in journal (Refereed) Published
Abstract [en]

With the improvement of mobile device performance, the requirement of equivalent dose description in intensity-modulated radiation therapy is increasing in mobile multimedia for health-care. The emergence of mobile cloud computing will provide cloud servers and storage for IMRT mobile applications, thus realizing visualized radiotherapy in a real sense.Equivalent uniform dose (EUD) is a biomedical indicator based on the dose measure. In this study, the dose volume histogram is used to describe the dose distribution of different tissues in target and nontarget regions. The traditional definition of equivalent uniform dose such as the exponential form and the linear form has only a few parameters in the model for fast calculation. However, there is no close relationship between this traditional definition and the dose volume histogram.In order to establish the consistency between the equivalent uniform dose and the dose volume histogram, this paper proposes a novel definition of equivalent uniform dose based on the volume dose curve, called VD-EUD. By using a unique organic volume weight curve, it is easy to calculate VD-EUD for different dose distributions. In the definition, different weight curves are used to represent the biological effects of different organs. For the target area, we should be more careful about those voxels with low dose (cold point); thus, the weight curve is monotonically decreasing. While for the nontarget area, the curve is monotonically increasing. Furthermore, we present the curves for parallel, serial and mixed organs of nontarget areas separately, and we define the weight curve form with only two parameters. Medical doctors can adjust the curve interactively according to different patients and organs. We also propose a fluence map optimization model with the VD-EUD constraint, which means the proposed EUD constraint will lead to a large feasible solution space.We compare the generalized equivalent uniform dose (gEUD) and the proposed VD-EUD by experiments, which show that the VD-EUD has a closer relationship with the dose volume histogram. If the biological survival probability is equivalent to the VD-EUD, the feasible solution space would be large, and the target areas can be covered.By establishing a personalized organic weight curve, medical doctors can have a unique VD-EUD for each patient. By using the flexible and adjustable equivalent uniform dose definition, we can establish VD-EUD-based fluence map optimization model, which will lead to a larger solution space than the traditional dose volume constraint-based model. The VD-EUD is a new definition; thus, we need more clinical testing and verification.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Biological systems, Histograms, Medical services, Biological system modeling, Cloud computing, Solid modeling
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-73548 (URN)10.1109/ACCESS.2019.2905875 (DOI)000465620500001 ()2-s2.0-85064730288 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-05-14 (johcin)

Available from: 2019-04-10 Created: 2019-04-10 Last updated: 2019-05-14Bibliographically approved
Lee, C.-C., Li, C.-T., Cheng, C.-L., Lai, Y.-M. & Vasilakos, A. (2019). A Novel Group Ownership Delegate Protocol for RFID Systems. Information Systems Frontiers, 21(5), 1153-1166
Open this publication in new window or tab >>A Novel Group Ownership Delegate Protocol for RFID Systems
Show others...
2019 (English)In: Information Systems Frontiers, ISSN 1387-3326, E-ISSN 1572-9419, Vol. 21, no 5, p. 1153-1166Article in journal (Refereed) Published
Abstract [en]

In recent years, Radio Frequency Identification (RFID) applications of various kinds have been blooming. However, along with the stunning advancement have come all sorts of security and privacy issues, for RFID tags oftentimes store private data and so the permission to read a tag or any other kind of access needs to be carefully controlled. Therefore, of all the RFID-related researches released so far, a big portion focuses on the issue of authentication. There have been so many cases where the legal access to or control over a tag needs to be switched from one reader to another, which has encouraged the development of quite a number of different kinds of ownership transfer protocols. On the other hand, not only has the need for ownership transfer been increasing, but a part of it has also been evolving from individual ownership transfer into group ownership transfer. However, in spite of the growing need for practical group ownership transfer services, little research has been done to offer an answer to the need. In this paper, we shall present a new RFID time-bound group ownership delegate protocol based on homomorphic encryption and quadratic residues. In addition, in order to provide more comprehensive service, on top of mutual authentication and ownership delegation, we also offer options for the e-th time verification as well as the revocation of earlier delegation.

Place, publisher, year, edition, pages
Springer, 2019
Keywords
Group ownership delegate, Homomorphic encryption, Quadratic residue, RFID, Time-bound
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-67703 (URN)10.1007/s10796-018-9835-x (DOI)000485311300011 ()
Note

Validerad;2019;Nivå 2;2019-09-20 (johcin)

Available from: 2018-02-20 Created: 2018-02-20 Last updated: 2019-10-08Bibliographically approved
Dai, H.-N., Wong, R.-W. C., Wang, H., Zheng, Z. & Vasilakos, A. (2019). Big Data Analytics for Large-scale Wireless Networks: Challenges and Opportunities. ACM Computing Surveys, 52(5), Article ID 99.
Open this publication in new window or tab >>Big Data Analytics for Large-scale Wireless Networks: Challenges and Opportunities
Show others...
2019 (English)In: ACM Computing Surveys, ISSN 0360-0300, E-ISSN 1557-7341, Vol. 52, no 5, article id 99Article in journal (Refereed) Published
Abstract [en]

The wide proliferation of various wireless communication systems and wireless devices has led to the arrival of big data era in large-scale wireless networks. Big data of large-scale wireless networks has the key features of wide variety, high volume, real-time velocity, and huge value leading to the unique research challenges that are different from existing computing systems. In this article, we present a survey of the state-of-art big data analytics (BDA) approaches for large-scale wireless networks. In particular, we categorize the life cycle of BDA into four consecutive stages: Data Acquisition, Data Preprocessing, Data Storage, and Data Analytics. We then present a detailed survey of the technical solutions to the challenges in BDA for large-scale wireless networks according to each stage in the life cycle of BDA. Moreover, we discuss the open research issues and outline the future directions in this promising area.

Place, publisher, year, edition, pages
ACM Digital Library, 2019
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-76203 (URN)10.1145/3337065 (DOI)2-s2.0-85072409619 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-10-02 (johcin)

Available from: 2019-10-02 Created: 2019-10-02 Last updated: 2019-10-02Bibliographically approved
Wazid, M., Kumar Das, A., Kumar, N., Vasilakos, A. & Rodrigues, J. J. P. (2019). Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment. IEEE Internet of Things Journal, 6(2), 3572-3584, Article ID 8581510.
Open this publication in new window or tab >>Design and Analysis of Secure Lightweight Remote User Authentication and Key Agreement Scheme in Internet of Drones Deployment
Show others...
2019 (English)In: IEEE Internet of Things Journal, ISSN 2327-4662, Vol. 6, no 2, p. 3572-3584, article id 8581510Article in journal (Refereed) Published
Abstract [en]

The Internet of Drones (IoD) provides a coordinated access to Unmanned Aerial Vehicles (UAVs) that are referred as drones. The on-going miniaturization of sensors, actuators, and processors with ubiquitous wireless connectivity makes drones to be used in a wide range of applications ranging from military to civilian. Since most of the applications involved in the IoD are real-time based, the users are generally interested in accessing real-time information from drones belonging to a particular fly zone. This happens if we allow users to directly access real-time data from flying drones inside IoD environment and not from the server. This is a serious security breach which may deteriorate performance of any implemented solution in this IoD environment. To address this important issue in IoD, we propose a novel lightweight user authentication scheme in which a user in the IoD environment needs to access data directly from a drone provided that the user is authorized to access the data from that drone. The formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool along with informal security analysis show that our scheme is secure against several known attacks. The performance comparison demonstrates that our scheme is efficient with respect to various parameters, and it provides better security as compared to those for the related existing schemes. Finally, the practical demonstration of our scheme is done using the widely-accepted NS2 simulation.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
Internet of Drones, user authentication, AVISPA, NS2 simulation, security
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-72766 (URN)10.1109/JIOT.2018.2888821 (DOI)000467564700192 ()2-s2.0-85058878262 (Scopus ID)
Note

Validerad;2019;Nivå 2;2019-06-18 (johcin)

Available from: 2019-02-01 Created: 2019-02-01 Last updated: 2019-06-18Bibliographically approved
Wazid, M., Kumar Das, A., Kumar, N. & Vasilakos, A. (2019). Design of secure key management and user authentication scheme for fog computing services. Future generations computer systems, 91, 475-492
Open this publication in new window or tab >>Design of secure key management and user authentication scheme for fog computing services
2019 (English)In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, p. 475-492Article in journal (Refereed) Published
Abstract [en]

Fog computing (fog networking) is known as a decentralized computing infrastructure in which data, applications, compute as well as data storage are scattered in the most logical and efficient place among the data source (i.e., smart devices) and the cloud. It gives better services than cloud computing because it has better performance with reasonably low cost. Since the cloud computing has security and privacy issues, and fog computing is an extension of cloud computing, it is therefore obvious that fog computing will inherit those security and privacy issues from cloud computing. In this paper, we design a new secure key management and user authentication scheme for fog computing environment, called SAKA-FC. SAKA-FC is efficient as it only uses the lightweight operations, such as one-way cryptographic hash function and bitwise exclusive-OR (XOR), for the smart devices as they are resource-constrained in nature. SAKA-FC is shown to be secure with the help of the formal security analysis using the broadly accepted Real-Or-Random (ROR) model, the formal security verification using the widely-used Automated Validation of Internet Security Protocols and Applications (AVISPA) tool and also the informal security analysis. In addition, SAKA-FC is implemented for practical demonstration using the widely-used NS2 simulator.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Fog computing, Key management, Authentication, Services, Security, AVISPA, NS2 simulation
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71007 (URN)10.1016/j.future.2018.09.017 (DOI)000451790900040 ()2-s2.0-85054039812 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-10-03 (svasva)

Available from: 2018-09-27 Created: 2018-09-27 Last updated: 2019-02-13Bibliographically approved
Xu, X., Lu, Q., Liu, Y., Zhu, L., Yao, H. & Vasilakos, A. (2019). Designing blockchain-based applications a case study for imported product traceability. Future generations computer systems, 92, 399-406
Open this publication in new window or tab >>Designing blockchain-based applications a case study for imported product traceability
Show others...
2019 (English)In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 92, p. 399-406Article in journal (Refereed) Published
Abstract [en]

Blockchain technology enables decentralization as new forms of distributed software architectures, where components can reach agreements on the shared system states without trusting on a central integration point. Since blockchain is an emerging technology which is still at an early stage of development, there is limited experience on applying blockchain to real-world software applications. We applied blockchain application design approaches proposed in software architecture community in a real-world project called originChain, which is a blockchain-based traceability system that restructures the current system by replacing the central database with blockchain. In this paper, we share our experience of building originChain. By using blockchain and designing towards security, originChain provides transparent tamper-proof traceability data with high availability and enables automated regulatory-compliance checking and adaptation in product traceability scenarios. We also demonstrate both qualitative and quantitative analysis of the software architecture of originChain. Based on our experience and analysis, we found that the structural design of smart contracts has large impact on the quality of the system.

Place, publisher, year, edition, pages
Elsevier, 2019
Keywords
Blockchain, Smart contract, Adaptability, Software architecture
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-71483 (URN)10.1016/j.future.2018.10.010 (DOI)000454370600034 ()2-s2.0-85055626212 (Scopus ID)
Note

Validerad;2018;Nivå 2;2018-11-07 (johcin)

Available from: 2018-11-07 Created: 2018-11-07 Last updated: 2019-03-27Bibliographically approved
Jangirala, S., Das, A. K. & Vasilakos, A. (2019). Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment. IEEE Transactions on Industrial Informatics
Open this publication in new window or tab >>Designing Secure Lightweight Blockchain-Enabled RFID-Based Authentication Protocol for Supply Chains in 5G Mobile Edge Computing Environment
2019 (English)In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050Article in journal (Refereed) Epub ahead of print
Abstract [en]

Secure real-time data about goods in transit in supply chains needs bandwidth having capacity that is not fulfilled with the current infrastructure. Hence, 5G-enabled Internet of Things (IoT) in mobile edge computing is intended to substantially increase this capacity. To deal with this issue, we design a new efficient lightweight blockchain-enabled RFID-based authentication protocol for supply chains in 5G mobile edge computing environment, called LBRAPS. LBRAPS is based on bitwise exclusive-or (XOR), one-way cryptographic hash and bitwise rotation operations only. LBRAPS is shown to be secure against various attacks. Moreover, the simulation-based formal security verification using the broadly-accepted Automated Validation of Internet Security Protocols and Applications (AVISPA) tool assures that LBRAPS is secure. Finally, it is shown that LBRAPS has better trade-off among its security and functionality features, communication and computation costs as compared to those for existing protocols.

Place, publisher, year, edition, pages
IEEE, 2019
Keywords
5G mobile edge computing, RFID, authentication, blockchain, supplychain, security
National Category
Media and Communication Technology
Research subject
Pervasive Mobile Computing
Identifiers
urn:nbn:se:ltu:diva-76321 (URN)10.1109/TII.2019.2942389 (DOI)
Available from: 2019-10-09 Created: 2019-10-09 Last updated: 2019-10-09
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-1902-9877

Search in DiVA

Show all publications