Change search
Refine search result
12345 101 - 150 of 214
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 101.
    Moetesum, Momina
    et al.
    Department of Computer Science, Bahria University, Islamabad.
    Hadi, Fazle
    Department of Computer Science, Bahria University, Islamabad.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Minhas, Abid Ali
    Department of Computer Science, Bahria University, Islamabad.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks2016In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 22, no 7, p. 2189-2201Article in journal (Refereed)
    Abstract [en]

    Provisioning buffer management mechanism is especially crucial in resource-constrained delay tolerant networks (DTNs) as maximum data delivery ratio with minimum overhead is expected in highly congested environments. However, most DTN protocols do not consider resource limitations (e.g., buffer, bandwidth) and hence, results in performance degradation. To strangle and mitigate the impact of frequent buffer overflows, this paper presents an adaptive and efficient buffer management scheme called size-aware drop (SAD) that strives to improve buffer utilization and avoid unnecessary message drops. To improve data delivery ratio, SAD exactly determines the requirement based on differential of newly arrived message(s) and available space. To vacate inevitable space from a congested buffer, SAD strives to avoid redundant message drops and deliberate to pick and discard most appropriate message(s) to minimize overhead. The performance of SAD is validated through extensive simulations in realistic environments (i.e., resource-constrained and congested) with different mobility models (i.e., Random Waypoint and disaster). Simulation results demonstrate the performance supremacy of SAD in terms of delivery probability and overhead ratio besides other metrics when compared to contemporary schemes based on Epidemic (DOA and DLA) and PRoPHET (SHLI and MOFO).

  • 102.
    Mohd, Bassam Jamil
    et al.
    Computer Engineering Department, Hashemite University.
    Hayajneh, Thaier
    School of Engineering and Computing Sciences, New York Institute of Technology.
    Khalaf, Zaid Abu
    School of Engineering and Computing Sciences, New York Institute of Technology.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A comparative study of steganography designs based on multiple FPGA platforms2016In: International Journal of Electronic Security and Digital Forensics, ISSN 1751-911X, E-ISSN 1751-9128, Vol. 8, no 2, p. 164-190Article in journal (Refereed)
    Abstract [en]

    Steganography methods conceal covert messages inside communicated data. Field-programmable gate array (FPGA) hardware implementation provides speed, flexibility and configurability. It is extremely difficult to compare published results from different platforms and technologies. The goal of our research work is to mitigate the dependency by examining implementations from multiple FPGA platforms. The research studies the implementations of 12 spatial steganography methods using Altera and Xilinx FPGAs. The methods include mix-bit LSB, least significant bit (LSB), random LSB and texture-based algorithms. The objective of the research is to develop platform-independent resources, timing, power and energy models; to empower future steganography research. Further, the article evaluates steganography methods using typical performance metrics as well as a novel performance metric. The results suggest that the mix-bit methods exhibit good performance across most of the metrics. However, when image quality is a concern, the two-bit LSB is the front runner

  • 103.
    Mohd, Bassam Jamil
    et al.
    Computer Engineering Department, Hashemite University.
    Hayajneh, Thaier
    School of Engineering and Computing Sciences, New York Institute of Technology.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A survey on lightweight block ciphers for low-resource devices: Comparative study and open issues2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 58, p. 73-93Article in journal (Refereed)
    Abstract [en]

    This paper investigates the lightweight block ciphers' implementations, which have received a fair amount of research for their essential security role in low-resource devices. Our objective is to present a comprehensive review of state-of-the-art research progress in lightweight block ciphers' implementation and highlight future research directions. At first, we present taxonomy of the cipher design space and accurately define the scope of lightweight ciphers for low-resource devices. Moreover, this paper discusses the performance metrics that are commonly reported in the literature when comparing cipher implementations. The sources of inaccuracies and deviations are carefully examined. In order to mitigate the confusion in the composite metrics, we developed a general metric which includes the basic metrics. Our analysis designated the energy/bit metric as the most appropriate metric for energy-constrained low-resource designs. Afterwards, the software and hardware implementations of the block cipher algorithms are surveyed, investigated, and compared. The paper selects the top performing ciphers in various metrics and suggests the Present cipher as a good reference for hardware implementations. What transpires from this survey is that unresolved research questions and issues are yet to be addressed by future research projects.

  • 104.
    Niazi, Muaz A.
    et al.
    COSMOSE Research Group, Computer Science Department, COMSATS University, Islamabad, Pakistan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Temkin, Anatoly
    Department of Computer Science, Boston University Metropolitan College, Boston, MA, USA.
    Review of “Exploratory Social Network Analysis with Pajek” by Wouter De Nooy, Andrej Mrvar and Vladimir Batageli2019In: Complex Adaptive Systems Modeling, E-ISSN 2194-3206, Vol. 7, no 1Article, book review (Other academic)
  • 105.
    Niu, Hao
    et al.
    Institute of Industrial Science, University of Tokyo.
    Zhu, Nanhao
    CETC Group, GCI Science and Technology Co.
    Sun, Li
    Department of Information and Communications Engineering, Xi’an Jiaotong University, Xi’an.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Sezaki, Kaoru
    Institute of Industrial Science, University of Tokyo.
    Security-embedded opportunistic user cooperation with full diversity2016In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 22, no 5, p. 1513-1522Article in journal (Refereed)
    Abstract [en]

    As a promising technique for wireless networks, cooperative communications is coming to maturity in both theory and practice. The main merit of the cooperation technique is its capability in providing additional transmission links to harvest the spatial diversity gain at the physical layer. However, due to the broadcast nature of wireless medium, the diversity gain can be also freely achieved at the potential eavesdropper if the cooperation is performed blindly. To solve this problem, we propose a security-embedded opportunistic user cooperation scheme (OUCS) in this paper. The OUCS first defines a concept called secrecy-providing capability (SPC) for both the source and the cooperative relays. By comparing the values of SPC of these nodes, the OUCS jointly decides whether to cooperate and with whom to cooperate from the perspective of physical layer security. The secrecy outage performance of the OUCS is then derived. From the results we prove that full diversity can be achieved (i.e., the diversity order is N + 1 for N cooperative relays), which outperforms existing alternatives. Finally, numerical results are provided to validate the theoretical analysis.

  • 106.
    Pace, Pasquale
    et al.
    University of Calabria.
    Loscri, Valeria
    Inria Lille-Nord Europe/FUN.
    Zheng, Zhengguo
    University of Sussex.
    Ruggeri, Guiseppe
    University Mediterranea of Reggio Calabria.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Smart Wireless Access Networks and Systems for Smart Cities2016In: Ad hoc networks, ISSN 1570-8705, E-ISSN 1570-8713, Vol. 43, p. 1-2Article in journal (Other academic)
  • 107.
    Pan, Linqiang
    et al.
    Key Laboratory of Image Information Processing and Intelligent Control of Education Ministry of China, School of Automation, Huazhong University of Science and Technology, Wuhan.
    Wu, Tingfang
    Key Laboratory of Image Information Processing and Intelligent Control of Education Ministry of China, School of Automation, Huazhong University of Science and Technology, Wuhan.
    Su, Yansen
    Key Lab of Intelligent Computing and Signal Processing of Ministry of Education, School of Computer Science and Technology, Anhui University, Hefei.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Cell-like spiking neural P systems with request rules2017In: IEEE Transactions on Nanobioscience, ISSN 1536-1241, E-ISSN 1558-2639, Vol. 16, no 6, p. 513-522Article in journal (Refereed)
    Abstract [en]

    Cell-like spiking neural P systems (in short, cSN P systems) are a class of distributed and parallel computation models inspired by both the way in which neurons process information and communicate to each other by means of spikes and the compartmentalized structures of living cells. cSNP systems have been proved to be Turing universal if more spikes can be produced by consuming some spikes or spikes can be replicated. In this work, in order to answer the open problem whether this functioning of producing more spikes and replicating spikes can be avoided by using some strategy without the loss of computation power, we introduce cSN P systems with request rules, which have classical spiking rules and forgetting rules, and also request rules in the skin membrane. The skin membrane can receive spikes from the environment by the application of request rules. cSN P systems with request rules are proved to be Turing universal. The results show that the decrease of computation power caused by removing the internal functioning of producing spikes and replicating spikes can be compensated by request rules, which suggests that the communication between a cell and the environment is an essential ingredient of systems in terms of computation power.

  • 108.
    Pavone, Mario
    et al.
    Department of Mathematics and Computer Science, University of Catania.
    Ramadan, Rabie A.
    Computer Engineering Department, Faculty of Engineering, Cairo University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Intelligent cloud computing2016In: Memetic Computing, ISSN 1865-9284, E-ISSN 1865-9292, Vol. 8, no 4, p. 253-254Article in journal (Refereed)
  • 109.
    Perera, Charith
    et al.
    The Open University, UK.
    Qin, Yongrui
    University of Huddersfield, UK.
    Estrella, Julio C.
    University of Sao Paulo.
    Reiff-Marganiec, Stephan
    University of Leicester, UK.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Fog Computing for Sustainable Smart Cities: A Survey2017In: ACM Computing Surveys, ISSN 0360-0300, E-ISSN 1557-7341, Vol. 50, no 3, article id 32Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) aims to connect billions of smart objects to the Internet, which can bring a promising future to smart cities. These objects are expected to generate large amounts of data and send the data to the cloud for further processing, especially for knowledge discovery, in order that appropriate actions can be taken. However, in reality sensing all possible data items captured by a smart object and then sending the complete captured data to the cloud is less useful. Further, such an approach would also lead to resource wastage (e.g., network, storage, etc.). The Fog (Edge) computing paradigm has been proposed to counterpart the weakness by pushing processes of knowledge discovery using data analytics to the edges. However, edge devices have limited computational capabilities. Due to inherited strengths and weaknesses, neither Cloud computing nor Fog computing paradigm addresses these challenges alone. Therefore, both paradigms need to work together in order to build a sustainable IoT infrastructure for smart cities. In this article, we review existing approaches that have been proposed to tackle the challenges in the Fog computing domain. Specifically, we describe several inspiring use case scenarios of Fog computing, identify ten key characteristics and common features of Fog computing, and compare more than 30 existing research efforts in this domain. Based on our review, we further identify several major functionalities that ideal Fog computing platforms should support and a number of open challenges toward implementing them, to shed light on future research directions on realizing Fog computing for building sustainable smart cities.

  • 110.
    Perera, Charith
    et al.
    Centre for Research in Computing, The Open University, Milton Keynes.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Knowledge-Based Resource Discovery for Internet of Things2016In: Knowledge-Based Systems, ISSN 0950-7051, E-ISSN 1872-7409, Vol. 109, p. 122-136Article in journal (Refereed)
    Abstract [en]

    In the sensing as a service paradigm, Internet of Things (IoT) Middleware platforms allow data consumers to retrieve the data they want without knowing the underlying technical details of IoT resources (i.e. sensors and data processing components). However, configuring an IoT middleware platform and retrieving data is a significant challenge for data consumers as it requires both technical knowledge and domain expertise. In this paper, we propose a knowledge driven approach called Context Aware Sensor Configuration Model (CASCOM) to simplify the process of configuring IoT middleware platforms, so the data consumers, specifically non-technical personnel, can easily retrieve the data they required. In this paper, we demonstrate how IoT resources can be described using semantics in such away that they can later be used to compose service work-flows. Such automated semantic-knowledge-based IoT resource composition approach advances the current research. We demonstrate the feasibility and the usability of our approach through a prototype implementation based on an IoT middleware called Global Sensor Networks (GSN), though our model can be generalized to any other middleware platform.

  • 111.
    Perera, Charith
    et al.
    IEEE.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Privacy Mindset for Developing Internet of Things Applicationsfor Social Sensing: Software Engineering Challenges2017In: SocialSens'17: Proceedings of the 2nd International Workshop on Social Sensing, Pittsburgh, PA, USA — April 18 - 21, 2017, New York: ACM Digital Library, 2017, p. 103-Conference paper (Refereed)
    Abstract [en]

    Social sensing aims to collect sensory data by using human population as sensor carriers (e.g., location), sensor operators (e.g., taking photos), and sensors themselves (e.g., Twitter). The Internet of Things (IoT) applications facilitate social sensing tasks. However, designing and developing IoT applications is much more complicated than designing and developing desktop, mobile, or web applications. The IoT applications require both software and hardware (e.g., sensors and actuators) to work together on multiple different type of nodes (e.g., micro-controllers, system-on-chips, mobile phones, single-board computers, cloud platforms) with different capabilities under different conditions.

  • 112.
    Perera, Charith
    et al.
    School of Computing Science, Newcastle University, Newcastle, UK.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Calikli, Gul
    Chalmers University, Gothenburg, Sweden.
    Sheng, Quan Z.
    Department of Computing, Macquarie University, Sydney, Australia.
    Li, Kuan-Ching
    Department of Computer Science and Information Engineering (CSIE), Providence University, Taichung City, Taiwan.
    Guest Editorial Special Section on Engineering Industrial Big Data Analytics Platforms for Internet of Things2018In: IEEE Transactions on Industrial Informatics, ISSN 1551-3203, E-ISSN 1941-0050, Vol. 14, no 2, p. 744-747Article in journal (Refereed)
    Abstract [en]

    Over the last few years, a large number of Internet of Things (IoT) solutions have come to the IoT marketplace. Typically, each of these IoT solutions are designed to perform a single or minimal number of tasks (primary usage). We believe a significant amount of knowledge and insights are hidden in these data silos that can be used to improve our lives; such data include our behaviors, habits, preferences, life patterns, and resource consumption. To discover such knowledge, we need to acquire and analyze this data together in a large scale. To discover useful information and deriving conclusions toward supporting efficient and effective decision making, industrial IoT platform needs to support variety of different data analytics processes such as inspecting, cleaning, transforming, and modeling data, especially in big data context. IoT middleware platforms have been developed in both academic and industrial settings in order to facilitate IoT data management tasks including data analytics. However, engineering these general-purpose industrial-grade big data analytics platforms need to address many challenges. We have accepted six manuscripts out of 24 submissions for this special section (25% acceptance rate) after the strict peerreview processes. Each manuscript has been blindly reviewed by at least three external reviewers before the decisions were made. The papers are briefly summarized.

  • 113.
    Porambage, Pawani
    et al.
    University of Oulu.
    Ylianttila, Mika
    University of Oulu.
    Schmitt, Corinne
    University of Zürich.
    Kumar, Pardeep
    UiT, The Arctic University of Norway, Narvik.
    Gurtov, Andrei
    Aalto University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Quest for Privacy in the Internet of Things2016In: I E E E Cloud Computing, ISSN 2325-6095, Vol. 3, no 2, p. 36-45Article in journal (Refereed)
    Abstract [en]

    The Internet of Things (IoT) is the current evolutionary paradigm of networking and the key driving force toward a smart world. Although privacy in the IoT is highly regarded to ensure the protection of users and personal information from the perspective of individual or cooperative users, it's insufficiently studied. As members of the always-connected paradigm of the massive IoT world, people can scarcely control the disclosure of their personal information. The biggest challenge is to allow users to experience the best utilization of IoT-based products and services with the fewest privacy threats and failures. This article provides a holistic view of the challenges of and issues related to preserving IoT privacy, as well as the existing solutions. Privacy by design (PbD) is identified as the key solution for many IoT privacy issues. The article also discusses hot topics in IoT privacy and future research directions.

  • 114.
    Rahimi, M. Reza
    et al.
    Huawei Innovation Center, US R&D Storage Lab, Santa Clara.
    Venkatasubramanian, Nalini
    School of Information and Computer Science, University of California, Irvine.
    Mehrotra, Sharad
    School of Information and Computer Science, University of California, Irvine.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    On Optimal and Fair Service Allocation in Mobile Cloud Computing2018In: I E E E Transactions on Cloud Computing, ISSN 2168-7161, Vol. 6, no 3, p. 815-828Article in journal (Refereed)
    Abstract [en]

    This paper studies the optimal and fair service allocation for a variety of mobile applications (single or group and collaborative mobile applications) in mobile cloud computing. We exploit the observation that using tiered clouds, i.e. clouds at multiple levels (local and public) can increase the performance and scalability of mobile applications. We proposed a novel framework to model mobile applications as a location-time workflows (LTW) of tasks; here users mobility patterns are translated to mobile service usage patterns. We show that an optimal mapping of LTWs to tiered cloud resources considering multiple QoS goals such application delay, device power consumption and user cost/price is an NP-hard problem for both single and group-based applications. We propose an efficient heuristic algorithm called MuSIC that is able to perform well (73% of optimal, 30% better than simple strategies), and scale well to a large number of users while ensuring high mobile application QoS. We evaluate MuSIC and the 2-tier mobile cloud approach via implementation (on real world clouds) and extensive simulations using rich mobile applications like intensive signal processing, video streaming and multimedia file sharing applications. We observe about 25% lower delays and power (under fixed price constraints) and about 35% decrease in price (considering fixed delay) in comparison to only using the public cloud. Our studies also show that MuSIC performs quite well under different mobility patterns, e.g. random waypoint and Manhattan models.

  • 115.
    Ramadan, Rabie A.
    et al.
    Department of Computer Engineering, Cairo University, Egypt and Hail University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Brain Computer Interface: control Signals Review2017In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 223, p. 26-44Article in journal (Refereed)
    Abstract [en]

    Brain Computer Interface (BCI) is defined as a combination of hardware and software that allows brain activities to control external devices or even computers. The research in this field has attracted academia and industry alike. The objective is to help severely disabled people to live their life as regular persons as much as possible. Some of these disabilities are categorized as neurological neuromuscular disorders. A BCI system goes through many phases including preprocessing, feature extraction, signal classifications, and finally control. Large body of research are found at each phase and this might confuse researchers and BCI developers. This article is a review to the state-of-the-art work in the field of BCI. The main focus of this review is on the Brain control signals, their types and classifications. In addition, this survey reviews the current BCI technology in terms of hardware and software where the most used BCI devices are described as well as the most utilized software platforms are explained. Finally, BCI challenges and future directions are stated. Due to the limited space and large body of literature in the field of BCI, another two review articles are planned. One of these articles reviews the up-to-date BCI algorithms and techniques for signal processing, feature extraction, signals classification, and control. Another article will be dedicated to BCI systems and applications. The three articles are written as base and guidelines for researchers and developers pursue the work in the field of BCI.

  • 116.
    Rasheed, Muhammad Babar
    et al.
    COMSATS Institute of Information Technology, Islamabad.
    Javaid, Nadeem
    COMSATS Institute of Information Technology, Islamabad.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Khaan, Zahoorali
    Faculty of Engineering, Dalhousie University, Halifax, NS.
    Qasim, Umar
    University of Alberta, Edmonton.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Delay and energy consumption analysis of priority guaranteed MAC protocol for wireless body area networks2017In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 23, no 4, p. 1249-1266Article in journal (Refereed)
    Abstract [en]

    Wireless body area networks are captivating growing interest because of their suitability for wide range of applications. However, network lifetime is one of the most prominent barriers in deploying these networks for most applications. Moreover, most of these applications have stringent QoS requirements such as delay and throughput. In this paper, the modified superframe structure of IEEE 802.15.4 based MAC protocol is proposed which addresses the aforementioned problems and improves the energy consumption efficiency. Moreover, priority guaranteed CSMA/CA mechanism is used where different priorities are assigned to body nodes by adjusting the data type and size. In order to save energy, a wake-up radio based mechanism to control sleep and active modes of body sensors are used. Furthermore, a discrete time finite state Markov model to find the node states is used. Analytical expressions are derived to model and analyze the behavior of average energy consumption, throughput, packet drop probability, and average delay during normal and emergency data. Extensive simulations are conducted for analysis and validation of the proposed mechanism. Results show that the average energy consumption and delay are relatively higher during emergency data transmission with acknowledgment mode due to data collision and retransmission.

  • 117.
    Revadigar, Girish
    et al.
    School of Computer Science and Engineering, UNSW Australia.
    Javali, Chitra
    School of Computer Science and Engineering, UNSW Australia.
    Xu, Weitao
    School of Information Technology and Electrical Engineering, University of Queensland, Brisbane.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Hu, Wen
    School of Computer Science and Engineering UNSW Australia, Sydney.
    Jha, Sanjay
    School of Computer Science and Engineering UNSW Australia, Sydney.
    Accelerometer and Fuzzy Vault-Based Secure Group Key Generation and Sharing Protocol for Smart Wearables2017In: IEEE Transactions on Information Forensics and Security, ISSN 1556-6013, E-ISSN 1556-6021, Vol. 12, no 10, p. 2467-2482Article in journal (Refereed)
    Abstract [en]

    The increased usage of smart wearables in various applications, specifically in health-care, emphasizes the need for secure communication to transmit sensitive health-data. In a practical scenario, where multiple devices are carried by a person, a common secret key is essential for secure group communication. Group key generation and sharing among wearables has received very little attention in the literature due to the underlying challenges: (i) difficulty in obtaining a good source of randomness to generate strong cryptographic keys, and (ii) finding a common feature among all the devices to share the key. In this paper, we present a novel solution to generate and distribute group secret keys by exploiting on-board accelerometer sensor and the unique walking style of the user, i.e., gait. We propose a method to identify the suitable samples of accelerometer data during all routine activities of a subject to generate the keys with high entropy. In our scheme, the smartphone placed on waist employs fuzzy vault, a cryptographic construct, and utilizes the acceleration due to gait, a common characteristic extracted on all wearable devices to share the secret key. We implement our solution on commercially available off-the-shelf smart wearables, measure the system performance, and conduct experiments with multiple subjects. Our results demonstrate that the proposed solution has a bit rate of 750 bps, low system overhead, distributes the key securely and quickly to all legitimate devices, and is suitable for practical applications.

  • 118.
    Rho, Seungmin
    et al.
    Department of Media Software at Sungkyul University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Intelligent collaborative system and service in value network for enterprise computing2018In: Enterprise Information Systems, ISSN 1751-7575, E-ISSN 1751-7583, Vol. 12, no 1, p. 1-3Article in journal (Refereed)
  • 119.
    Rho, Seungmin
    et al.
    Department of Multimedia, Sungkyul University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Chen, Weifeng
    Department of Math, Computer Science and Information Systems, California University of Pennsylvania.
    Cyber physical systems technologies and applications2016In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 56, p. 436-437Article in journal (Other academic)
    Abstract [en]

    With the rapid progresses in ICT (Information Communication Technology), multidisciplinary research fields such as Internet of Things (IoT), Cyber-Physical System (CPS), and Social Computing have been widely explored in recent years. These research and application have been speeded up the formation of cyberspace, which will further lead to a subversive change for information science development as well as human production and living (Ma and Yang, 2015 [1]). Cyberspace is being linked to versatile individuals in physical space and social space — Cyber-Physical Society (CPSoc) (Zhuge, 2014 [2]). This special issue on new technologies and research trends for cyber physical systems technologies and application provides high quality contributions addressing related theoretical and practical aspects of CPS technologies and their applications. We have selected five research papers whose topics are strongly related to this special issue.

  • 120.
    Rho, Seungmin
    et al.
    Department of Multimedia, Sungkyul University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Chen, Weifeng
    Department of Math, Computer Science and Information Systems, California University of Pennsylvania.
    Cyber physical systems technologies and applications: Part II2016In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 61, p. 83-84Article in journal (Other academic)
    Abstract [en]

    The second part of the special issue presents more practical issues on cyber physical systems technologies and application. We have selected five research papers whose topics are strongly related to this special issue. As continued from the part 1, we have selected 5 additional papers

  • 121.
    Safkhani, Masoumeh
    et al.
    Department of Computer Engineering, Shahid Rajaee Teacher Training University, Tehran, Iran.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A New Secure Authentication Protocol for Telecare Medicine Information Systemand Smart Campus2019In: IEEE Access, E-ISSN 2169-3536, Vol. 7, p. 23514-23526Article in journal (Refereed)
    Abstract [en]

    Telecare Medicine Information System (TMIS)'s security importance attracts a lot of attention these days. Whatever the security of TMIS improves, its application becomes wider. To address this requirement, recently, Li et al. proposed a new privacy-preserving RFID authentication protocol for TMIS. After that, Zhou et al. and also Benssalah et al. presented their scheme, which is not secure, and they presented their new authentication protocol and claim that their proposal can provide higher security for TMIS applications. In this stream, Zheng et al. proposed a novel authentication protocol with application in smart campus, including TMIS. In this paper, we present an efficient impersonation and replay attacks against Zheng et al. with the success probability of 1 and a desynchronization attack which is applicable against all of the rest three mentioned protocols with the success probability of 1-2^{-n} , where n is the protocols parameters length. After that, we proposed a new protocol despite these protocols can resist the attacks presented in this paper and also other active and passive attacks. Our proposed protocol's security is also done both informally and formally through the Scyther tool.

  • 122.
    Sakai, Kazuya
    et al.
    Department of Information and Communication Systems, Tokyo Metropolitan University.
    Sun, Min-Te
    Department of Computer Science and Information Engineering, National Central University, Taoyuan.
    Ku, Wei-Shinn
    Department of Computer Science and Software Engineering, Auburn University.
    Lai, Ten H.
    Department of Computer Science and Engineering, The Ohio State University, Columbus.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A Framework for the Optimal k-Coverage Deployment Patterns of Wireless Sensors2015In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 15, no 12, p. 7273-7283Article in journal (Refereed)
    Abstract [en]

    The strategy for node deployment to achieve multiple connectivity and coverage plays an important role in various wireless senor network applications. To alleviate the operational cost, the number of nodes to be deployed needs to be reduced. While the optimal k-connectivity deployment patterns (k <= 6) and the multiple k-coverage problem (k <= 3) have been extensively studied for 2-D networks, a general method to identify the optimal deployment pattern for any given sensor coverage requirement has yet to be found. Considering the ease of sensor deployment and operation, the deployment patterns should be identical and symmetric in the deployment region. This implies that the Voronoi diagram of the optimal deployment is a regular tessellation. Based on the fact that there exist only three regular tessellations, we propose a framework, namely, range elimination scheme (RES), to compute the optimal k-coverage deployment pattern for any given k value to accommodate various wireless sensor application requirements. We apply RES to show the optimal k-coverage deployment patterns for 4 <= k <= 9. Our analytical and simulation results show that our proposed framework successfully identifies the optimal deployment patterns and significantly reduces the number of sensors to be deployed

  • 123.
    Sakr, Sherif
    et al.
    University of Taru, Estonia.
    Zomaya, Albert
    University of Sydney, Australia.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Editorial for Special issue of FGCS special issue on “Benchmarking big data systems”2019In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 96, p. 32-34Article in journal (Refereed)
    Abstract [en]

    Even though several big data processing and analytics systems have been introduced with various design architectures, we are still lacking a deeper understanding of the performance characteristics for the various design architectures in addition to lacking comprehensive benchmarks for the various Big Data platforms. There is a crucial need to conduct fundamental research with a more comprehensive performance evaluation for the various Big Data processing systems and architectures. We also lack the availability of validation tools, standard benchmarks, and system performance prediction methods that can help us have a deeper and more solid understanding of the strengths and weaknesses of the various Big Data processing platforms. This special issue is dedicated to original results and achievements by active researchers, designers, and developers working on various issues and challenges related to big data research.

  • 124.
    Sarkar, Chayan
    et al.
    Delft University of Technology.
    Rao, Vijay S.
    Delft University of Technology.
    Prasad, R. Venkatesha
    Delft University of Technology.
    Das, Sankar Narayan
    IIT Kanpur.
    Misra, Sudip
    IIT Kharagpur.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    VSF: An Energy-Efficient Sensing Framework Using Virtual Sensors2016In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 16, no 12, p. 5046-5059, article id 7440786Article in journal (Refereed)
    Abstract [en]

    this paper, we describe virtual sensing framework (VSF), which reduces sensing and data transmission activities of nodes in a sensor network without compromising on either the sensing interval or data quality. VSF creates virtual sensors (VSs) at the sink to exploit the temporal and spatial correlations amongst sensed data. Using an adaptive model at every sensing iteration, the VSs can predict multiple consecutive sensed data for all the nodes with the help of sensed data from a few active nodes. We show that even when the sensed data represent different physical parameters (e.g., temperature and humidity), our proposed technique still works making it independent of physical parameter sensed. Applying our technique can substantially reduce data communication among the nodes leading to reduced energy consumption per node yet maintaining high accuracy of the sensed data. In particular, using VSF on the temperature data from IntelLab and GreenOrb data set, we have reduced the total data traffic within the network up to 98% and 79%, respectively. Corresponding average root mean squared error of the predicted data per node is as low as 0.36 degrees C and 0.71 degrees C, respectively. This paper is expected to support deployment of many sensors as part of Internet of Things in large scales.

  • 125.
    Saxena, Neetesh
    et al.
    Georgia Institute of Technology.
    Grijalva, Santiago
    Georgia Institute of Technology.
    Chukwuka, Victor
    Georgia Institute of Technology.
    Vasilakos, Athanasios V.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Network Security and Privacy Challenges in Smart Vehicle-to-Grid2017In: IEEE wireless communications, ISSN 1536-1284, E-ISSN 1558-0687, Vol. 24, no 4, p. 88-98Article in journal (Refereed)
    Abstract [en]

    Smart vehicle-to-grid (V2G) involves intelligent charge and discharge decisions based on user operational energy requirements, such as desired levels of charging and waiting time. V2G is also supported by information management capabilities enabled by a secure network, such as a reliable privacy-preserving payment system. In this article, we describe the network security and privacy requirements and challenges of V2G applications. We present a new network security architecture to support V2G. We propose a scheme with the following security and privacy-preserving features: anonymous authentication, fine-grained access control, anonymous signatures, information confidentiality, message integrity, remote attestation, and a payment system. This article is oriented toward practitioners interested in designing and implementing secure and privacy-preserving networks for smart V2G applications.

  • 126.
    Shakir, Muhammad Zeeshan
    et al.
    Department of Systems and Computer Carleton University, Ottawa.
    Imran, Muhammad AliCenter for Communication, University of Surrey.Qaraqe, Khalid A,Department of Electrical and Computer, Texas A&M University.Alouini, Mohamed-SlimScience and Technology, King Abdallah University.Vasilakos, AthanasiosLuleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Energy Management in Wireless Cellular and Ad-hoc Networks2016Collection (editor) (Refereed)
  • 127.
    Sheng, Quan Z.
    et al.
    University of Adelaide.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Yu, Qi
    Rochester Institute of Technology, Rochester, NY.
    Yao, Lina
    UNSW, Sydney.
    Guest Editorial: Big Data Analytics and the Web2015In: IEEE Transactions on Big Data, ISSN 2332-7790, Vol. 1, no 4, p. 123-124Article in journal (Other academic)
  • 128.
    Shitiri, Ethungshan
    et al.
    School of Electronics, Kyungpook National University, Korea.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Cho, Ho-Shin
    School of Electronics, Kyungpook National University, Korea.
    Biological Oscillators in Nanonetworks-Opportunities and Challenges2018In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 18, no 5, article id 1544Article in journal (Refereed)
    Abstract [en]

    One of the major issues in molecular communication-based nanonetworks is the provision and maintenance of a common time knowledge. To stay true to the definition of molecular communication, biological oscillators are the potential solutions to achieve that goal as they generate oscillations through periodic fluctuations in the concentrations of molecules. Through the lens of a communication systems engineer, the scope of this survey is to explicitly classify, for the first time, existing biological oscillators based on whether they are found in nature or not, to discuss, in a tutorial fashion, the main principles that govern the oscillations in each oscillator, and to analyze oscillator parameters that are most relevant to communication engineer researchers. In addition, the survey highlights and addresses the key open research issues pertaining to several physical aspects of the oscillators and the adoption and implementation of the oscillators to nanonetworks. Moreover, key research directions are discussed.

  • 129.
    Shu, Zhaogang
    et al.
    Fujian Agriculture and Forestry University, Fuzhou, China.
    Wan, Jiafu
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou , South China University of Technology, Guangzhou.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou , South China University of Technology, Guangzhou.
    Lin, Jiaxiang
    Fujian Agriculture and Forestry University, Fuzhou, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Security in Software-Defined Networking: Threats and Countermeasures2016In: Journal on spesial topics in mobile networks and applications, ISSN 1383-469X, E-ISSN 1572-8153, Vol. 21, no 5, p. 764-776Article in journal (Refereed)
    Abstract [en]

    In recent years, Software-Defined Networking (SDN) has been a focus of research. As a promising network architecture, SDN will possibly replace traditional networking, as it brings promising opportunities for network management in terms of simplicity, programmability, and elasticity. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be also paid to security at this early design stage. This paper focuses on the security aspects of SDN. We begin by discussing characteristics and standards of SDN. On the basis of these, we discuss the security features as a whole and then analyze the security threats and countermeasures in detail from three aspects, based on which part of the SDN paradigm they target, i.e., the data forwarding layer, the control layer and the application layer. Countermeasure techniques that could be used to prevent, mitigate, or recover from some of such attacks are also described, while the threats encountered when developing these defensive mechanisms are highlighted.

  • 130.
    Socievole, Annalisa
    et al.
    DIMES, Ponte P. Bucci, University of Calabria.
    Zivani, Artur
    National Laboratory for Scientific Computing (LNCC).
    de Rango, Floriano
    DIMES, Ponte P. Bucci, University of Calabria.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Yoneki, Eiko
    University of Cambridge Computer Laboratory, JJ Thomson Avenue Cambridge.
    Cyber-physical systems for Mobile Opportunistic Networking in Proximity (MNP)2016In: Computer Networks, ISSN 1389-1286, E-ISSN 1872-7069, Vol. 111, p. 1-5Article in journal (Refereed)
  • 131.
    Song, Qiang
    et al.
    Henan University of Technology, College of Electrical Engineering, Zhengzhou, China.
    Liu, Fang
    Huanghuai University, Zhumadian, China.
    Cao, Jinde
    Southeast University, Research Center for Complex Systems and Network Sciences, Nanjing, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Tang, Yang
    East China University of Science and Technology, Institute of Physics, Berlin, Germany.
    Leader-following synchronization of coupled homogeneous and heterogeneous harmonic oscillators based on relative position measurements2019In: IEEE Transactions on Control of Network Systems, ISSN 2325-5870, Vol. 6, no 1, p. 13-23Article in journal (Refereed)
    Abstract [en]

    This paper considers the leader-following synchronization problem for a network of coupled harmonic oscillators by utilizing the relative position measurements between neighboring nodes, where the node dynamics can be either identical or nonidentical. For a homogeneous network with the same node dynamics, two types of first-order observer-based protocols are proposed to achieve leader-following synchronization in the network under some necessary and sufficient conditions, including some synchronization criteria for the homogeneous network subject to parameter uncertainty. For a heterogeneous network with different node dynamics, an output regulation approach is applied to solve the leader-following synchronization problem for the nominal network, based on which the robust synchronization of the uncertain network is investigated with an allowable bound being estimated for parameter uncertainties. Numerical examples are given to illustrate the correctness and the feasibility of the theoretical analysis. 

  • 132.
    Song, Qiang
    et al.
    College of Electrical Engineering, Henan University of Technology, Zhengzhou.
    Liu, Fang
    School of Information Engineering, Huanghuai University, Henan.
    Su, Housheng
    School of Automation, Huazhong University of Science and Technology, Wuhan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Semi-global and global containment control of multi-agent systems with second-order dynamics and input saturation2016In: International Journal of Robust and Nonlinear Control, ISSN 1049-8923, E-ISSN 1099-1239, Vol. 36, no 16, p. 3460-3480Article in journal (Refereed)
    Abstract [en]

    This paper considers both semi-global and global containment control for a second-order multi-agent system that is composed by a network of identical harmonic oscillators or double integrators with multiple leaders and input saturation. A distributed low gain feedback algorithm is proposed to solve the semi-global containment control problem for the network whose topology is directed and initial condition is taken from any a priori given bounded set. In particular, by using a parametric Lyapunov equation approach, M-matrix properties and algebraic graph theory, an upper bound of the low gain parameter is estimated such that the low gain feedback matrix can be analytically determined without involving numerical computation. Furthermore, under the assumption that the induced subgraph formed by the followers is strongly connected and detail balanced, two linear feedback protocols are designed for coupled harmonic oscillators and coupled double integrators, respectively, to asymptotically achieve the global containment control of the network with any initial condition. Finally, numerical examples are given to illustrate the effectiveness of the theoretical results

  • 133.
    Su, Guanming
    et al.
    Dolby Labs, Sunnyvale, CA.
    Su, Xiao
    Computer Engineering, San José State University.
    Bai, Yan
    Institute of Technology, University of Washington Tacoma.
    Wang, Mea
    Department of Computer Science, University of Calgary.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Wang, Haohong
    TCL Research America, San Jose.
    QoE in video streaming over wireless networks: perspectives and research challenges2016In: Wireless networks, ISSN 1022-0038, E-ISSN 1572-8196, Vol. 22, no 5, p. 1571-1593Article in journal (Refereed)
    Abstract [en]

    The deployment of 3G/LTE networks and advancements in smart mobile devices had led to high demand for multimedia streaming over wireless network. The rapid increasing demand for multimedia content poses challenges for all parties in a multimedia streaming system, namely, content providers, wireless network service providers, and smart device makers. Content providers and mobile network service providers are both striving to improve their streaming services while utilizing advancing technologies. Smart device makers endeavor to improve processing power and displays for better viewing experience. Ultimately, the common goal shared by content providers, network service providers, and smart device manufactures is to improve the QoE for users. QoE is both an objective and a subjective metric measuring the streaming quality experience by end users. It may be measured by streaming bitrate, playback smoothness, video quality metrics like Peak to Signal Noise Ratio, and other user satisfaction factors. There have been efforts made to improve the streaming experiences in all these aspects. In this paper, we conducted a survey on existing literatures on QoE of video streaming to gain a deeper and more complete understanding of QoE quality metrics. The goal is to inspire new research directions in defining better QoE and improving QoE in existing and new streaming services such as adaptive streaming and 3D video streaming

  • 134.
    Sun, Gang
    et al.
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China. Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Li, Yayu
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China.
    Yu, Hongfang
    Key Lab of Optical Fiber Sensing and Communications (Ministry of Education), University of Electronic Science and Technology of China, Chengdu, China. Center for Cyber Security, University of Electronic Science and Technology of China, Chengdu, China.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Du, Xiaojiang
    Department of Computer and Information Sciences, Temple University, Philadelphia, PA, USA.
    Guizani, Mohsen
    Department of Electrical and Computer Engineering, University of Idaho, Moscow, ID, USA.
    Energy-efficient and traffic-aware service function chaining orchestration in multi-domain networks2019In: Future generations computer systems, ISSN 0167-739X, E-ISSN 1872-7115, Vol. 91, p. 347-360Article in journal (Refereed)
    Abstract [en]

    Service function chaining (SFC) provisioning is helpful not only for saving the capital expenditure (CAPEX) and operational expenditure (OPEX) of a network provider but also for reducing energy consumption in the substrate network. However, to the best of our knowledge, there has been little research on the problem of energy consumption for orchestrating online SFC requests in multi-domain networks. In this paper, we first formulate the problem of an energy-efficient online SFC request that is orchestrated across multiple clouds as an integer linear programming (ILP) model to find an optimal solution. Then, we analyze the complexity of this ILP model and prove that the problem is NP-hard. Additionally, we propose a low-complexity heuristic algorithm named energy-efficient online SFC request orchestration across multiple domains (EE-SFCO-MD) for near-optimally solving the mentioned problem. Finally, we conduct simulation experiments to evaluate the performance of our algorithm. Simulation results show that EE-SFCO-MD consumes less energy than existing approaches while the online SFC’s requirements are met and the privacy of each cloud is effectively guaranteed. The low computational complexity of the heuristic approach makes it applicable for quickly responding to online SFC requests.

  • 135.
    Sun, Jian
    et al.
    Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, School of Computer and Communication Engineering, University of Science and Technology Beijing.
    Liu, Tong
    Department of Information and Communication Engineering, Harbin Engineering University, Harbin.
    Wang, Xianxian
    Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services, School of Computer and Communication Engineering, University of Science and Technology Beijing.
    Xing, Chengwen
    School of Information and Electronics, Beijing Institute of Technology, Beijing.
    Xiao, Hailin
    Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education, Guilin University of Electronic Technology, Guilin.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Zhang, Zhogshan
    Beijing Engineering and Technology Research Center for Convergence Networks and Ubiquitous Services, University of Science and Technology.
    Optimal mode selection with uplink data rate maximization for D2D-aided underlaying cellular networks2016In: IEEE Access, E-ISSN 2169-3536, Vol. 4, p. 8844-8856, article id 7762100Article in journal (Refereed)
    Abstract [en]

    The device-to-device (D2D) communication has been regarded as an effective technique for complementing and enhancing the conventional cellular systems owing to its capability of substantially improving both the spectral and power efficiencies of wireless networks. However, the severe interference imposed on the conventional cellular users (CUs) by the geographically close-by D2D pairs may cause a significant performance erosion in the D2D-aided underlaying cellular networks (CNs). In this paper, performance analysis for the D2D-aided underlaying CNs in terms of throughput is provided. We first derive the closed-form expressions of the coverage probability for both the conventional cellular links and the D2D links, followed by giving out the approximated expressions of the ergodic data rate for both an individual cellular/D2D link and the whole underlaying network. Furthermore, the key parameters (e.g., the density of D2D users (DUs) or CUs, and the average geographical distance between a pair of D2D peers) significantly impacting the channel capacity are adaptively adjusted for maximizing the sum data rate of the proposed underlaying networks. In addition, both theoretical analysis and simulation results reveal the attainability of the maximal throughput by optimizing the critical parameters, such as the density of DUs, provided that the scale factor between the DUs and sum users (i.e., comprising both conventional CUs and DUs) can be effectively balanced subject to the constraints specified in the proposed scheme

  • 136.
    Sun, Min-Te
    et al.
    Department of Computer Science and Information Engineering, National Central University, Taoyuan 320, Taiwan.
    Sakai, Kazuya
    Department of Information and Communication Systems, Tokyo Metropolitan University, 6-6 Asahigaoka, Hino, Tokyo.
    Ku, Wei-Shinn
    Department of Computer Science and Software Engineering, Auburn University, Auburn,.
    Lai, Ten H.
    Department of Computer Science and Engineering, The Ohio State University, Columbus, OH 43210.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Private and Secure Tag Access for Large-Scale RFID Systems2016In: IEEE Transactions on Dependable and Secure Computing, ISSN 1545-5971, E-ISSN 1941-0018, Vol. 13, no 6, p. 657-671Article in journal (Refereed)
    Abstract [en]

    The performance of key authentication and the degree of privacy in large-scale RFID systems are considered by manyresearchers as tradeoffs. Based on how keys are managed in the system, the privacy preserving tag authentications proposed in thepast can be categorized into tree-based and group-based approaches. While a tree-based approach achieves high performance in keyauthentication, it suffers from the issue of low privacy should a fraction of tags be compromised. On the contrary, while group-based keyauthentication is relatively invulnerable to compromise attacks, it is not scalable to a large number of tags. In this paper, we propose anew private tag authentication protocol based on skip lists, named randomized skip lists-based authentication (RSLA). Withoutsacrificing the authentication performance, RSLA provides a high privacy preserving mechanism. While RSLA provides the same levelof unpredictability-based-privacy and indistinguishability-based privacy compared with other structured key management approaches,our scheme achieves the highest system anonymity with good performance in key look up and update. In addition, the simulationresults match our analyses closely.

  • 137.
    Tahira, Shireen
    et al.
    Department of Computer Science and Software Engineering, International Islamic University, Islamabad.
    Sher, Muhammad
    Department of Computer Science and Software Engineering, International Islamic University, Islamabad.
    Ullah, Ata
    Department of Computer Science, National University of Modern Languages, Islamabad .
    Imran, Muhammad
    College of Computer and Information Sciences, King Saud University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Handover Based IMS Registration Scheme for Next Generation Mobile Networks2017In: Wireless Communications & Mobile Computing, ISSN 1530-8669, E-ISSN 1530-8677, Vol. 2017, article id 8789513Article in journal (Refereed)
    Abstract [en]

    Next generation mobile networks aim to provide faster speed and more capacity along with energy efficiency to support video streaming andmassive data sharing in social and communication networks. In these networks, user equipment has to register with IPMultimedia Subsystem (IMS) which promises quality of service to the mobile users that frequently move across different access networks. After each handover caused due to mobility, IMS provides IPSec Security Association establishment and authentication phases. The main issue is that unnecessary reregistration after every handover results in latency and communication overhead. To tackle these issues, this paper presents a lightweight Fast IMS Mobility (FIM) registration scheme that avoids unnecessary conventional registration phases such as security associations, authentication, and authorization. FIM maintains a flag to avoid deregistration and sends a subsequent message to provide necessary parameters to IMS servers after mobility. It also handles the change of IP address for user equipment and transferring the security associations from old to new servers. We have validated the performance of FIM by developing a testbed consisting of IMS servers and user equipment. The experimental results demonstrate the performance supremacy of FIM. It reduces media disruption time, number of messages, and packet loss up to 67%, 100%, and 61%, respectively, as compared to preliminaries.

  • 138.
    Tang, Rui
    et al.
    Department of Computer and Information Science, University of Macau.
    Fong, Simon
    Department of Computer and Information Science, University of Macau.
    Deb, Suash
    INNS India Regional Chapter.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Millham, Richard C.
    Department of Information Technology, Durban University of Technology.
    Dynamic Group Optimisation Algorithm for Training Feed-Forward Neural Networks2018In: Neurocomputing, ISSN 0925-2312, E-ISSN 1872-8286, Vol. 314, p. 1-19Article in journal (Refereed)
    Abstract [en]

    Feed-forward neural networks are efficient at solving various types of problems. However, finding efficient training algorithms for feed-forward neural networks is challenging. The dynamic group optimisation (DGO) algorithm is a recently proposed half-swarm half-evolutionary algorithm, which exhibits a rapid convergence rate and good performance in searching and avoiding local optima. In this paper, we propose a new hybrid algorithm, FNNDGO that integrates the DGO algorithm into a feed-forward neural network. DGO plays an optimisation role in training the neural network, by tuning parameters to their optimal values and configuring the structure of feed-forward neural networks. The performance of the proposed algorithm was determined by comparing its performance with those of other training methods in solving two types of problems. The experimental results show that our proposed algorithm exhibits promising performance for solving real-world problems.

  • 139.
    Tang, Yang
    et al.
    Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai.
    Gao, Huijun
    Research Institute of Intelligent Control and Systems, Harbin Institute of Technology.
    Du, Wei
    Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai , Institute of Textiles and Clothing, The Hong Kong Polytechnic University.
    Lu, Jianquan
    Department of Mathematics, Southeast University Nanjing.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Kurths, Jûrgen
    Potsdam Institute for Climate Impact Research.
    Robust Multiobjective Controllability of Complex Neuronal Networks2016In: IEEE/ACM Transactions on Computational Biology & Bioinformatics, ISSN 1545-5963, E-ISSN 1557-9964, Vol. 13, no 4, p. 778-791Article in journal (Refereed)
    Abstract [en]

    This paper addresses robust multiobjective identification of driver nodes in the neuronal network of a cat’s brain, in which uncertainties in determination of driver nodes and control gains are considered. A framework for robust multiobjective controllability is proposed by introducing interval uncertainties and optimization algorithms. By appropriate definitions of robust multiobjective controllability, a robust nondominated sorting adaptive differential evolution (NSJaDE) is presented by means of the nondominated sorting mechanism and the adaptive differential evolution (JaDE). The simulation experimental results illustrate the satisfactory performance of NSJaDE for robust multiobjective controllability, in comparison with six statistical methods and two multiobjective evolutionary algorithms (MOEAs): nondominated sorting genetic algorithms II (NSGA-II) and nondominated sorting composite differential evolution (NSCDE). It is revealed that the existence of uncertainties in choosing driver nodes and designing control gains heavily affect the controllability of neuronal networks. We also unveil that driver nodes play a more drastic role than control gains in robust controllability. The developed NSJaDE and obtained results will shed light on the understanding of robustness in controlling realistic complex networks such as transportation networks, power grid networks and biological networks, etc.

  • 140.
    Ten, Chee-Wooi
    et al.
    Electrical and Computer Engineering Department, Michigan Technological University, Houghton, MI.
    Yamashita, Koji
    Electrical and Computer Engineering Department, Michigan Technological University, Houghton, MI.
    Yang, Zhiyuan
    Electrical and Computer Engineering Department, Michigan Technological University, Houghton, MI.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Ginter, Andrew
    Waterfall Security Solutions.
    Impact Assessment of Hypothesized Cyberattackson Interconnected Bulk Power Systems2018In: IEEE Transactions on Smart Grid, ISSN 1949-3053, E-ISSN 1949-3061, Vol. 9, no 5, p. 4405-4425Article in journal (Refereed)
    Abstract [en]

    The first-ever Ukraine cyberattack on power grid has proven its devastation by hacking into their critical cyber assets. With administrative privileges accessing substation networks/ local control centers, one intelligent way of coordinated cyberattacks is to execute a series of disruptive switching executions on multiple substations using compromised supervisory control and data acquisition (SCADA) systems. These actions can cause significant impacts to an interconnected power grid. Unlike the previous power blackouts, such high-impact initiating events can aggravate operating conditions, initiating instability that may lead to system-wide cascading failure. A systemic evaluation of “nightmare” scenarios is highly desirable for asset owners to manage and prioritize the maintenance and investment in protecting their cyberinfrastructure. This survey paper is a conceptual expansion of real-time monitoring, anomaly detection, impact analyses, and mitigation (RAIM) framework that emphasizes on the resulting impacts, both on steady-state and dynamic aspects of power system stability. Hypothetically, we associate the combinatorial analyses of steady state on substations/components outages and dynamics of the sequential switching orders as part of the permutation. The expanded framework includes (1) critical/noncritical combination verification, (2) cascade confirmation, and (3) combination re-evaluation. This paper ends with a discussion of the open issues for metrics and future design pertaining the impact quantification of cyber-related contingencies

  • 141.
    Tong, Guoxiang
    et al.
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Wu, Guanning
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Tan, Jian
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Xiong, Naixue
    School of Optical-Electrical and Computer Engineering, University of Shanghai for Science and Technology.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    A digital noise reduction scheme in communication systems for internet of things2016In: Journal of Internet Technology, ISSN 1607-9264, E-ISSN 2079-4029, Vol. 17, no 5, p. 879-887Article in journal (Refereed)
    Abstract [en]

    Data-driven computing and using data for strategic advantages are exemplified by communication systems, and the speech intelligibility in communication systems is generally interrupted by interfering noise. This interference comes from the environmental noise, so it can reduce them intelligibility by masking the interested signal. An important work in communication systems is to extract speech from noisy speech and inhibiting background noise. The primary purpose of speech noise reduction system is to extract pure speech from speech signal with noise. The focus of this paper is to build a new noise reduction system on the basis of the optimization of digital noise reduction algorithms. According to the program simulation results based on MATLAB, the digital noise reduction system has many improved performances in the low SNR and achieves more than 5dB-15dB on noise reduction. The combined algorithm was tested under different noise conditions, and data display that the optimize performance of algorithm achieve the best. The simulation results demonstrate that it can get nearly three times better than the other two algorithms. The output signal of combined algorithm are very close to the pure speech signal, the performance of restore the voice signal is better than the other two algorithms

  • 142.
    Tsai, Chun-Wei
    et al.
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Lai, Chin-Feng
    Institute of Computer Science and Information Engineering, National Chung Cheng University, Chia-Yi.
    Chao, Han-Chieh
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Big Data Analytics2016In: Big Data Technologies and Applications, Springer International Publishing , 2016, p. 13-52Chapter in book (Refereed)
    Abstract [en]

    The age of big data is now coming. But the traditional data analytics may not be able to handle such large quantities of data. The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data. To deeply discuss this issue, this paper begins with a brief introduction to data analytics, followed by the discussions of big data analytics. Some important open issues and further research directions will also be presented for the next step of big data analytics.

  • 143.
    Tsai, Chun-Wei
    et al.
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Lai, Chin-Feng
    Institute of Computer Science and Information Engineering, National Chung Cheng University, Chia-Yi.
    Chao, Han-Chieh
    Department of Computer Science and Information Engineering, National Ilan University, Yilan.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Big data analytics: a survey2015In: Journal of Big Data, ISSN 2196-1115, Vol. 2, article id 21Article in journal (Refereed)
    Abstract [en]

    The age of big data is now coming. But the traditional data analytics may not be able to handle such large quantities of data. The question that arises now is, how to develop a high performance platform to efficiently analyze big data and how to design an appropriate mining algorithm to find the useful things from big data. To deeply discuss this issue, this paper begins with a brief introduction to data analytics, followed by the discussions of big data analytics. Some important open issues and further research directions will also be presented for the next step of big data analytics.

  • 144.
    Valenza, Gaetano
    et al.
    University of Pisa.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Perspective: It's All About Time2017In: IEEE Transactions on Nanobioscience, ISSN 1536-1241, E-ISSN 1558-2639, Vol. 16, no 4, p. 309-310Article in journal (Refereed)
    Abstract [en]

    New knowledge on multi-scale temporal dynamics linking nanobio-time series, seasonal changes, immune response, and gut mictobiota can milestone (neuro) science soon.

  • 145.
    Vasilakos, Athanasios
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Duan, Qiang
    Pennsylvania State University.
    Federated selection of network and cloud services for high-performance software-defined cloud computing2016In: International Journal of High Performance Computing and Networking, ISSN 1740-0562, E-ISSN 1740-0570, Vol. 9, no 4, p. 316-327Article in journal (Refereed)
    Abstract [en]

    The crucial role of networking in cloud service provisioning calls for federated selection of network and cloud services in order to guarantee the service performance required by diverse applications. In order to address the new challenges brought in by the software-defined cloud environment (SDCE) to service selection, we develop an approach for performance-based federated selection of network and cloud services in this paper. The main contributions we make in this paper include an abstract profile for network/cloud service capability that is agnostic to service implementations, a general demand profile applicable to diverse applications, an analysis technique for evaluating achievable performance of composite network-cloud services, and a scheme for federated selection of network and cloud services based on performance evaluation. The technique and method developed in this paper enable service selection with a holistic vision across the networking and computing domains, which may greatly facilitate high-performance cloud service provisioning

  • 146.
    Vasilakos, Athanasios
    et al.
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Li, Zhe
    Institut Mine Telecom - Telecom Bretagne, France.
    Simon, Gwendal
    Institut Mine Telecom - Telecom Bretagne, France.
    You, Wei
    Orange, France.
    Information centric network: Research challenges and opportunities2015In: Journal of Network and Computer Applications, ISSN 1084-8045, E-ISSN 1095-8592, Vol. 52, p. 1-10Article in journal (Refereed)
    Abstract [en]

    For more than a decade, the inherent drawbacks of current Internet have been calling for its revolutionary designs. The end-to-end model, which was designed for special data transmission in the early age of Internet, is causing troubles everywhere in nowadays content based web services. Consequently, Information Centric Network (ICN) is proposed to solve these problems. As the most permanent clean-slate approach for next generation Internet, ICN has attracted much attention from network researchers in the passed few years. This survey focuses on the current progress of the research work in ICN. It investigates various key aspects such as naming and routing schemes, in-network caching policies, etc., and highlights the benefit of implementing ICN, open research issues and new interests in this domain.

  • 147.
    Vinel, Alexey
    et al.
    School of Information Technology, Halmstad University.
    Chen, Wen-Shyen Eric
    ProphetStor.
    Xiong, Neal N.
    Department of Business and Computer Science, Southwestern Oklahoma State University.
    Rho, Seungmin
    Department of Media Software at Sungkyul University.
    Chilamkurti, Naveen
    Department of Computer Science and Telecommunications, La Trobe University, Melbourne.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Enabling wireless communication and networking technologies for the internet of things: Guest editorial2016In: IEEE wireless communications, ISSN 1536-1284, E-ISSN 1558-0687, Vol. 23, no 5, p. 8-9Article in journal (Other academic)
    Abstract [en]

    The Internet of Things (IoT) is enabling ubiquitous computing with a novel design paradigm to integrate global physical objects, cyber and social spaces, and machines. It may be envisaged as a web of trillions of machines that will communicate with each other. The major enabling technologies that are giving a flying kickstart to IoT are ad hoc and wireless sensor networks, short-range wireless communications, real-time systems, low power and energy harvesting, radio frequency identification, machine type communication, resource-constrained networks, and embedded software.

  • 148.
    Viriyasitavat, Wantanee
    et al.
    Information and Communication Technology, Mahidol University, Bangkok.
    Boban, Mate
    NEC Laboratories Europe, NEC Europe Ltd., Heidelberg.
    Tsai, Hsinmu
    Department of Computer Science and Information Engineering, Graduate Institute of Networking and Multimedia, National Taiwan University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Vehicular communications: Survey and challenges of channel and propagation models2015In: IEEE Vehicular Technology Magazine, ISSN 1556-6072, E-ISSN 1556-6080, Vol. 10, no 2, p. 55-66, article id 7108160Article in journal (Refereed)
    Abstract [en]

    Vehicular communication is characterized by a dynamic environment, high mobility, and comparatively low antenna heights on the communicating entities (vehicles and roadside units). These characteristics make vehicular propagation and channel modeling particularly challenging. In this article, we classify and describe the most relevant vehicular propagation and channel models, with a particular focus on the usability of the models for the evaluation of protocols and applications. We first classify the models based on the propagation mechanisms they employ and their implementation approach. We also classify the models based on the channel properties they implement and pay special attention to the usability of the models, including the complexity of implementation, scalability, and the input requirements (e.g., geographical data input). We also discuss the less-explored aspects in vehicular channel modeling, including modeling specific environments (e.g., tunnels, overpasses, and parking lots) and types of communicating vehicles (e.g., scooters and public transportation vehicles). We conclude by identifying the underresearched aspects of vehicular propagation and channel modeling that require further modeling and measurement studies

  • 149.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Liu, Jianqi
    School of Information Engineering, Guangdong Mechanical & Electrical College, Guangzhou.
    Shao, Zehio
    School of Information Science and Technology, Chengdu University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Zhou, Keliang
    School of Electrical Engineering and Automation, Jiangxi University of Science and Technology, Ganzhou.
    Mobile Crowd Sensing for Traffic Prediction in Internet of Vehicles2016In: Sensors, ISSN 1424-8220, E-ISSN 1424-8220, Vol. 16, no 1, article id 88Article in journal (Refereed)
    Abstract [en]

    The advances in wireless communication techniques, mobile cloud computing, automotive and intelligent terminal technology are driving the evolution of vehicle ad hoc networks into the Internet of Vehicles (IoV) paradigm. This leads to a change in the vehicle routing problem from a calculation based on static data towards real-time traffic prediction. In this paper, we first address the taxonomy of cloud-assisted IoV from the viewpoint of the service relationship between cloud computing and IoV. Then, we review the traditional traffic prediction approached used by both Vehicle to Infrastructure (V2I) and Vehicle to Vehicle (V2V) communications. On this basis, we propose a mobile crowd sensing technology to support the creation of dynamic route choices for drivers wishing to avoid congestion. Experiments were carried out to verify the proposed approaches. Finally, we discuss the outlook of reliable traffic prediction.

  • 150.
    Wan, Jiafu
    et al.
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Tang, Shenglog
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Shu, Zhaogang
    Fujian Agriculture and Forestry University, Fuzhou, China, College of Computer and Information Sciences, Fujian Agriculture and Forestry University.
    Li, Di
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Wang, Shiyong
    School of Mechanical and Automotive Engineering, South China University of Technology, Guangzhou.
    Imran, Muhammad Al
    College of Computer and Information Sciences, Almuzahmiyah, King Saud University.
    Vasilakos, Athanasios
    Luleå University of Technology, Department of Computer Science, Electrical and Space Engineering, Computer Science.
    Software-Defined Industrial Internet of Things in the Context of Industry 4.02016In: IEEE Sensors Journal, ISSN 1530-437X, E-ISSN 1558-1748, Vol. 16, no 20, p. 7373-7380Article in journal (Refereed)
12345 101 - 150 of 214
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf