This page has only limited features, please log in for full access.
Fog computing, a term coined by Cisco, is a new paradigm that extends the capabilities and services of cloud computing to the edge of the network. As a result, fog computing provides better location awareness and reduces the latency that occurs due to the distance between end devices and the cloud, which is a major issue for sensitive applications. Given that fog computing runs software on devices at the edge of the network rather than on the cloud side, it supports real-time smart applications, such as smart homes, smart grids, health data management, and smart vehicular technologies. This study focuses on security and privacy challenges in the fog computing paradigm and proposes a trust mechanism to address data breach, data loss, Denial of service (DoS) and establish a secure environment for fog applications. The novel model based on the subjective logic method calculates the trust value of nodes to determine if a node is from the network or a rogue node. The proposed trust model is implemented on iFogSim simulator and analyzed with multiple fog nodes that clearly demonstrates the effectiveness in providing the security.
Jalal Al Muhtadi; Rawan A. Alamri; Farrukh Aslam Khan; Kashif Saleem. Subjective logic-based trust model for fog computing. Computer Communications 2021, 178, 221 -233.
AMA StyleJalal Al Muhtadi, Rawan A. Alamri, Farrukh Aslam Khan, Kashif Saleem. Subjective logic-based trust model for fog computing. Computer Communications. 2021; 178 ():221-233.
Chicago/Turabian StyleJalal Al Muhtadi; Rawan A. Alamri; Farrukh Aslam Khan; Kashif Saleem. 2021. "Subjective logic-based trust model for fog computing." Computer Communications 178, no. : 221-233.
In above article [1] , reference [11] is incorrect as the conference article had not been published in full until 2019. The correct reference is cited here as [2] . Therefore, the sentences in the article [1] with reference [11] should be cited [2] in this article as “When the data are stored in a centralized location and are transmitted by applying symmetric data encryption techniques, the deployment and maintenance costs will go beyond cost tolerance thresholds [2] ,” “Since cloud computing signifies a comparatively novel computing representation at every level, like applications, hosts, network, and data, that in turn raises the issue of the application safety to shift toward cloud computing [2] and [3] ,” and “However, this definition is not accurate in the sense that, if the normal operation is susceptible to eavesdropping, in this case, the normal operation of the organization must be restricted [2] .”
Hina Abrar; Syed Jawad Hussain; Junaid Chaudhry; Kashif Saleem; Mehmet A. Orgun; Jalal Al-Muhtadi; Craig Valli. Corrections to “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”. IEEE Access 2021, 9, 79628 -79628.
AMA StyleHina Abrar, Syed Jawad Hussain, Junaid Chaudhry, Kashif Saleem, Mehmet A. Orgun, Jalal Al-Muhtadi, Craig Valli. Corrections to “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”. IEEE Access. 2021; 9 ():79628-79628.
Chicago/Turabian StyleHina Abrar; Syed Jawad Hussain; Junaid Chaudhry; Kashif Saleem; Mehmet A. Orgun; Jalal Al-Muhtadi; Craig Valli. 2021. "Corrections to “Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry”." IEEE Access 9, no. : 79628-79628.
The security and privacy of healthcare enterprises (HEs) are crucial because they maintain sensitive information. Because of the unique functional requirement of omni-inclusiveness, HEs are expected to monitor patients, allowing for connectivity with vehicular ad hoc networks (VANETs). In the absence of literature on security provisioning frameworks that connect VANETs and HEs, this paper presents a smart zero-knowledge proof and statistical fingerprinting-based trusted secure communication framework for a fog computing environment. A zero-knowledge proof is used for vehicle authentication, and statistical fingerprinting is employed to secure communication between VANETs and HEs. Authenticity verification of the operations is performed at the on-board unit (OBU) fitted in the vehicle based on the service executions at the resident hardware platform. The processor clock cycles are acquired from the service executions in a complete sandboxed environment. The calculated cycles assist in developing the blueprint signature for the particular OBU of the vehicle. Hence, the fingerprint signature helps build trust and plays a key role in authenticating the vehicle's horizontal movement to everything or to different sections of the HEs. In an environment enabled for fog computing, our novel model can provide efficient remote monitoring.
Junaid Ahsenali Chaudhry; Kashif Saleem; Mamoun Alazab; Hafiz Maher Ali Zeeshan; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues. Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications. IEEE Transactions on Intelligent Transportation Systems 2021, 22, 3869 -3879.
AMA StyleJunaid Ahsenali Chaudhry, Kashif Saleem, Mamoun Alazab, Hafiz Maher Ali Zeeshan, Jalal Al-Muhtadi, Joel J. P. C. Rodrigues. Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications. IEEE Transactions on Intelligent Transportation Systems. 2021; 22 (6):3869-3879.
Chicago/Turabian StyleJunaid Ahsenali Chaudhry; Kashif Saleem; Mamoun Alazab; Hafiz Maher Ali Zeeshan; Jalal Al-Muhtadi; Joel J. P. C. Rodrigues. 2021. "Data Security Through Zero-Knowledge Proof and Statistical Fingerprinting in Vehicle-to-Healthcare Everything (V2HX) Communications." IEEE Transactions on Intelligent Transportation Systems 22, no. 6: 3869-3879.
Every IPv6-enabled device connected and communicating over the Internet forms the Internet of things (IoT) that is prevalent in society and is used in daily life. This IoT platform will quickly grow to be populated with billions or more objects by making every electrical appliance, car, and even items of furniture smart and connected. The 5 th generation (5G) and beyond networks will further boost these IoT systems. The massive utilization of these systems over gigabits per second generates numerous issues. Owing to the huge complexity in large-scale deployment of IoT, data privacy and security are the most prominent challenges, especially for critical applications such as Industry 4.0, e-healthcare, and military. Threat agents persistently strive to find new vulnerabilities and exploit them. Therefore, including promising security measures to support the running systems, not to harm or collapse them, is essential. Nature-inspired algorithms have the capability to provide autonomous and sustainable defense and healing mechanisms. This paper first surveys the 5G network layer security for IoT applications and lists the network layer security vulnerabilities and requirements in wireless sensor networks, IoT, and 5G-enabled IoT. Second, a detailed literature review is conducted with the current network layer security methods and the bio-inspired techniques for IoT applications exchanging data packets over 5G. Finally, the bio-inspired algorithms are analyzed in the context of providing a secure network layer for IoT applications connected over 5G and beyond networks.
Kashif Saleem; Ghadah Majid Alabduljabbar; Nouf Alrowais; Jalal Al-Muhtadi; Muhammad Imran; Joel J. P. C. Rodrigues. Bio-Inspired Network Security for 5G-Enabled IoT Applications. IEEE Access 2020, 8, 229152 -229160.
AMA StyleKashif Saleem, Ghadah Majid Alabduljabbar, Nouf Alrowais, Jalal Al-Muhtadi, Muhammad Imran, Joel J. P. C. Rodrigues. Bio-Inspired Network Security for 5G-Enabled IoT Applications. IEEE Access. 2020; 8 ():229152-229160.
Chicago/Turabian StyleKashif Saleem; Ghadah Majid Alabduljabbar; Nouf Alrowais; Jalal Al-Muhtadi; Muhammad Imran; Joel J. P. C. Rodrigues. 2020. "Bio-Inspired Network Security for 5G-Enabled IoT Applications." IEEE Access 8, no. : 229152-229160.
Internet of things (IoT) plays a key role in enabling smart sustainable cities. Pervasive computing over the IoT platform makes life more convenient by embedding sensors based on context-aware computing devices in the physical environment for the ubiquitous availability of computing resources. The sensors gather contextual information from the physical world and transmit it to receivers as per requirements or in case of environmental changes, such as temperature and humidity. However, the combination of dynamic operation and the need to handle sensitive and private data make the pervasive computing environment and IoT devices vulnerable to numerous attacks. Smart environments require a maximum level of safety assurance, such as trusted context producers and customers, which should protect sensitive information from exposure or monitoring. This paper discusses the major cyber threats in smart environments and proposes a novel lightweight security framework that authenticates and maintains the context providers and receivers. The cloud environment is adopted for user authentication at the user layer to implement access control and role assignment. Finally, the proposed security framework is implemented in the IBM cloud platform with six devices to evaluate its efficiency, sustainability, and secure communication.
Jalal Al-Muhtadi; Kashif Saleem; Sumayah Al-Rabiaah; Muhammad Imran; Amjad Gawanmeh; Joel J.P.C. Rodrigues. A lightweight cyber security framework with context-awareness for pervasive computing environments. Sustainable Cities and Society 2020, 66, 102610 .
AMA StyleJalal Al-Muhtadi, Kashif Saleem, Sumayah Al-Rabiaah, Muhammad Imran, Amjad Gawanmeh, Joel J.P.C. Rodrigues. A lightweight cyber security framework with context-awareness for pervasive computing environments. Sustainable Cities and Society. 2020; 66 ():102610.
Chicago/Turabian StyleJalal Al-Muhtadi; Kashif Saleem; Sumayah Al-Rabiaah; Muhammad Imran; Amjad Gawanmeh; Joel J.P.C. Rodrigues. 2020. "A lightweight cyber security framework with context-awareness for pervasive computing environments." Sustainable Cities and Society 66, no. : 102610.
The rapid growth of Information and Communication Technologies (ICT)—specifically, the Internet—has given emergence to e-learning. Resultantly, web-based e-learning systems are being increasingly developed to enhance the learning process. However, the utilization of such systems is low, mainly owing to poor quality content and overall design problems. To improve usage, it is imperative to identify the factors with the most significant impact on the quality of these systems so that the e-learning industry keeps these factors in consideration while developing e-learning systems. This study focused on the identification and prioritization of factors related to the design quality of e-learning systems through a hierarchical quality model. Thus, firstly, an extensive literature review was conducted to identify the factors that most affect the quality of web-based e-learning systems. Secondly, among the identified factors, only those with the most significant effect were considered. To identify the most important quality criteria, a survey was conducted. An instrument was deployed among 157 subjects, including e-learning designers, developers, students, teachers, and educational administrators. Finally, a second instrument was distributed among 51 participants to make a pairwise comparison among the criteria and rank them according to their relative importance. The identified and prioritized factors were classified into four main categories. Among these four factors, content was identified as the most important factor, whereas design was found to be the least important factor.
Abdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability 2020, 12, 4071 .
AMA StyleAbdul Hafeez Muhammad, Ansar Siddique, Ahmed E. Youssef, Kashif Saleem, Basit Shahzad, Adnan Akram, Al-Batool Saleh Al-Thnian. A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems. Sustainability. 2020; 12 (10):4071.
Chicago/Turabian StyleAbdul Hafeez Muhammad; Ansar Siddique; Ahmed E. Youssef; Kashif Saleem; Basit Shahzad; Adnan Akram; Al-Batool Saleh Al-Thnian. 2020. "A Hierarchical Model to Evaluate the Quality of Web-Based E-Learning Systems." Sustainability 12, no. 10: 4071.
Internet of things environment is adopted widely in different industries and business organizations with varying capacity. It provides a favorable environment to outsource the crowdsourced data in the cloud to minimize the cost of computation, which is called crowdsourcing. Crowdsourcing is a technique where individuals or organizations obtain goods and services. A professional or industry outsource the crowdsourced data in the cloud, where confidentiality and authenticity of data become essential. Signcryption is the cryptographic technique that serves both the authenticity and the privacy of transmitted messages. This technique ensures secure authentic data transmission and storage. Therefore, this paper proposes an identity‐based signcryption scheme. In the proposed PSSCC framework, the user does pairing free computation during signcryption, which makes efficient calculation on user‐side. Moreover, PSSCC framework is proved secure under modified bilinear Diffie‐Hellman inversion and modified bilinear strong Diffie‐Hellman problems. The performance analysis of PSSCC with related schemes indicates that the proposed system supports efficient communication along with less computation cost.
Dharminder Dharminder; Dheerendra Mishra; Joel J. P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem. PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments. Software: Practice and Experience 2020, 1 .
AMA StyleDharminder Dharminder, Dheerendra Mishra, Joel J. P. C. Rodrigues, Ricardo Rabelo, Kashif Saleem. PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments. Software: Practice and Experience. 2020; ():1.
Chicago/Turabian StyleDharminder Dharminder; Dheerendra Mishra; Joel J. P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem. 2020. "PSSCC: Provably secure communication framework for crowdsourced industrial Internet of Things environments." Software: Practice and Experience , no. : 1.
The microservice recommendation mechanism, as a key supporting technology for providing users with intelligent and proactive application services, is one of the important research contents in mobile social networks. In this paper, a recommendation mechanism of mobile social network service based on user trajectory, trust network and collaborative filtering algorithm is proposed. The user trajectory prediction model based on Generative Adversarial Network (GAN) is introduced into the process of service recommendation, and combined with trust degree to constitute the 3D service recommendation model of user-service-trajectory prediction. This method improves the accuracy and reliability of service recommendation and avoids the blindness and randomness of service recommendation. The simulation experiments show that the service recommendation algorithm has higher accuracy than the traditional collaborative filtering algorithm.
Ru Wang; Muhammad Imran; Kashif Saleem. A microservice recommendation mechanism based on mobile architecture. Journal of Network and Computer Applications 2019, 152, 102510 .
AMA StyleRu Wang, Muhammad Imran, Kashif Saleem. A microservice recommendation mechanism based on mobile architecture. Journal of Network and Computer Applications. 2019; 152 ():102510.
Chicago/Turabian StyleRu Wang; Muhammad Imran; Kashif Saleem. 2019. "A microservice recommendation mechanism based on mobile architecture." Journal of Network and Computer Applications 152, no. : 102510.
Among the numerous alternatives used in the world of risk balance, it highlights the provision of guarantees in the formalization of credit agreements. The objective of this paper is to compare the achievement of fuzzy sets with that of artificial neural network-based decision trees on credit scoring to predict the recovered value using a sample of 1890 borrowers. Comparing with fuzzy logic, the decision analytic approach can more easily present the outcomes of the analysis. On the other hand, fuzzy logic makes some implicit assumptions that may make it even harder for credit-grantors to follow the logical decision-making process. This paper leads an initial study of collateral as a variable in the calculation of the credit scoring. The study concludes that the two models make modelling of uncertainty in the credit scoring process possible. Although more difficult to implement, fuzzy logic is more accurate for modelling the uncertainty. However, the decision tree model is more favourable to the presentation of the problem.
Gernmanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei Kozlov; Ricardo Rabelo. Machine learning and decision support system on credit scoring. Neural Computing and Applications 2019, 32, 9809 -9826.
AMA StyleGernmanno Teles, Joel J. P. C. Rodrigues, Kashif Saleem, Sergei Kozlov, Ricardo Rabelo. Machine learning and decision support system on credit scoring. Neural Computing and Applications. 2019; 32 (14):9809-9826.
Chicago/Turabian StyleGernmanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei Kozlov; Ricardo Rabelo. 2019. "Machine learning and decision support system on credit scoring." Neural Computing and Applications 32, no. 14: 9809-9826.
Real-time and ubiquitous patient monitoring demands the use of wireless data acquisition through resource constrained medical sensors, mostly configured with No-input No-output (NiNo) capabilities. Bluetooth is one of the most popular and widely adopted means of communicating this sensed information to a mobile terminal. However, over simplified implementations of Bluetooth low energy (BLE) protocol in eHealth sector is susceptible to several wireless attacks, in particular the Man-in-the-Middle (MITM) attack. The issue arises due to a lack of mutual authentication and integrity protection between the communicating devices, which may lead to compromise of confidentiality, availability and even the integrity of this safety-critical information. This research paper presents a novel framework named MARC to detect, analyze, and mitigate Bluetooth security flaws while focusing upon MITM attack against NiNo devices. For this purpose, a comprehensive solution has been proposed, which can detect MITM signatures based upon four novel anomaly detection metrics: analyzing Malicious scan requests, Advertisement intervals, RSSI levels, and Cloned node addresses. The proposed solution has been evaluated through practical implementation and demonstration of different attack scenarios, which show promising results concerning accurate and efficient detection of MITM attacks.
Muhammad Yaseen; Mian Muhammad Waseem Iqbal; Imran Rashid; Haider Abbas; Mujahid Mohsin; Kashif Saleem; Yawar Abbas Bangash. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems. Journal of Medical Systems 2019, 43, 324 .
AMA StyleMuhammad Yaseen, Mian Muhammad Waseem Iqbal, Imran Rashid, Haider Abbas, Mujahid Mohsin, Kashif Saleem, Yawar Abbas Bangash. MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems. Journal of Medical Systems. 2019; 43 (11):324.
Chicago/Turabian StyleMuhammad Yaseen; Mian Muhammad Waseem Iqbal; Imran Rashid; Haider Abbas; Mujahid Mohsin; Kashif Saleem; Yawar Abbas Bangash. 2019. "MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems." Journal of Medical Systems 43, no. 11: 324.
With the advancement in technology, the installation and usage of diverse applications and softwares on various Operating Systems (OS) have become a very common practice. Owing to technical flaws, misconfigurations, hidden vulnerabilities etc, these applications/ softwares are highly susceptible to cyber-attacks. The installation of such applications on critical systems may compromise the security of the systems as well as the resident data. Numerous standards and guidelines already exist that help determine the authenticity of software applications, but they are very specific to an OS or a single point of check. Furthermore, the tools, available in this regard, are used to target a very specific issue while others are not freely available. This research work, after the critical analysis of such frameworks and tools, proposes an integrated framework to check the application’s authenticity before its installation. It covers the aspects of confidentiality, integrity, availability and authentication. This is a general framework for all kinds of organizations, but critical organizations with high security objectives specifically, may use this framework to increase their security. The framework has been applied and validated on data sets of six PDF readers, taken from "CVE Details".
Rida Zojaj Naeem; Haider Abbas; Narmeen Shafqat; Kashif Saleem; Waseem Iqbal. A Framework to Determine Applications’ Authenticity. Procedia Computer Science 2019, 155, 268 -275.
AMA StyleRida Zojaj Naeem, Haider Abbas, Narmeen Shafqat, Kashif Saleem, Waseem Iqbal. A Framework to Determine Applications’ Authenticity. Procedia Computer Science. 2019; 155 ():268-275.
Chicago/Turabian StyleRida Zojaj Naeem; Haider Abbas; Narmeen Shafqat; Kashif Saleem; Waseem Iqbal. 2019. "A Framework to Determine Applications’ Authenticity." Procedia Computer Science 155, no. : 268-275.
Credit operations are indispensable in the organizational development of financial institutions. However, misconduct in these operations occurs, and this can lead to financial loss. These consequences are caused by incorrectly granting credit or incorrectly assigning customer ratings and can compromise a credit portfolio. The result shows that support vector machine is the most commonly used classifier for credit scores, and while the system performs well, it does not apply approaches with collateral. The analysis includes 84 studies in this article to propose using statistical methodology to conduct a meta-analysis to compare the results of classification methods. It shows some cases that consider various probability distributions and also survival data. It also elaborates that collateral is not the first approach for credit scoring. The credit scoring system can then give several starting credit scores according to the classifier the user wants to use.
Germanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov. Classification Methods Applied to Credit Scoring With Collateral. IEEE Systems Journal 2019, 14, 4557 -4566.
AMA StyleGermanno Teles, Joel J. P. C. Rodrigues, Kashif Saleem, Sergei A. Kozlov. Classification Methods Applied to Credit Scoring With Collateral. IEEE Systems Journal. 2019; 14 (3):4557-4566.
Chicago/Turabian StyleGermanno Teles; Joel J. P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov. 2019. "Classification Methods Applied to Credit Scoring With Collateral." IEEE Systems Journal 14, no. 3: 4557-4566.
Routing protocols represent an important issue on the Internet of Things (IoT) scenarios since they are responsible for creating paths and forwarding data packets among the network nodes. In mobile IoT scenarios, the topology changes caused by the movement of nodes makes the work of routing protocols more difficult. Thus, the current IoT routing solutions tend to present strong limitations and a poor performance in these scenarios, generally requiring complex additional improvement to better support the mobility of the devices. In this context, the Lightweight On-demand Ad hoc Distance-vector Routing Protocol - Next Generation (LOADng), is an emerging solution for IoT networks that despite being adequate for a mobile environment due to its reactive functioning still lacks in performance. Thus, this paper proposes a novel solution to enhance the performance of LOADng in mobile IoT networks. The improved version, LOADng-IoT-Mob, introduces a mechanism that permits nodes to be aware of the availability of their neighbors through the harnessing of control messages. As a result, these nodes can shorten paths and avoid sending data packets through broken routes due to the movement of the nodes. Additionally, a short periodical control message is introduced, allowing the nodes to update their routing table, even with a low control message frequency. Furthermore, a new routing metric is proposed for creating routes based on the reliability of the link and proximity of the neighboring nodes. Finally, through computational simulations, the performance of the LOADng-IoT-Mob is studied under multiple scenarios varying the network size, the number of mobile devices, and maximum nodes' speed. The results obtained demonstrate the efficiency of the proposed solution in terms of packet delivery ratio, latency, and power and overhead efficiency, with a slight increase in memory consumption.
Jose V. V. Sobral; Joel Jose P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem; Sergei A. Kozlov. Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios. IEEE Access 2019, 7, 107032 -107046.
AMA StyleJose V. V. Sobral, Joel Jose P. C. Rodrigues, Ricardo Rabelo, Kashif Saleem, Sergei A. Kozlov. Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios. IEEE Access. 2019; 7 ():107032-107046.
Chicago/Turabian StyleJose V. V. Sobral; Joel Jose P. C. Rodrigues; Ricardo Rabelo; Kashif Saleem; Sergei A. Kozlov. 2019. "Improving the Performance of LOADng Routing Protocol in Mobile IoT Scenarios." IEEE Access 7, no. : 107032-107046.
Sinara P. Medeiros; Joel Rodrigues; Mauro A. A. Da Cruz; Ricardo Rabelo; Kashif Saleem; Petar Solic. Windows Monitoring and Control for Smart Homes based on Internet of Things. 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech) 2019, 1 .
AMA StyleSinara P. Medeiros, Joel Rodrigues, Mauro A. A. Da Cruz, Ricardo Rabelo, Kashif Saleem, Petar Solic. Windows Monitoring and Control for Smart Homes based on Internet of Things. 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech). 2019; ():1.
Chicago/Turabian StyleSinara P. Medeiros; Joel Rodrigues; Mauro A. A. Da Cruz; Ricardo Rabelo; Kashif Saleem; Petar Solic. 2019. "Windows Monitoring and Control for Smart Homes based on Internet of Things." 2019 4th International Conference on Smart and Sustainable Technologies (SpliTech) , no. : 1.
Connected objects to the Internet (computers, sensors, smartphones, and smart watches) are the part of daily life and their interconnection performs the Internet of Things (IoT) vision. IoT solutions are used in various domains, such as healthcare, industry, agriculture, and cities. IoT networks are often characterized by resource-constrained devices and sometimes deployed in hard to reach areas. In addition, an IoT network landscape may include a large number of heterogeneous devices. All these factors drive the need for adapted management solutions for IoT devices and networks. In order to guarantee the better use of IoT networks, effective and automatic management is necessary. This paper studies different solutions for IoT networks and devices management identifying their characteristics and technical challenges. Important requirements like security, context-aware, and a standard model for messages exchange have not been completely explored. Thus, these most relevant features are used to propose and deploy a new IoT management platform with a friendly user's interface, called management for devices and networks in IoT (M4DN.IoT). The solution is evaluated, demonstrated, validated, and it is under use.
Jonathan De C. Silva; Joel Jose P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov; Ricardo Rabelo. M4DN.IoT-A Networks and Devices Management Platform for Internet of Things. IEEE Access 2019, 7, 53305 -53313.
AMA StyleJonathan De C. Silva, Joel Jose P. C. Rodrigues, Kashif Saleem, Sergei A. Kozlov, Ricardo Rabelo. M4DN.IoT-A Networks and Devices Management Platform for Internet of Things. IEEE Access. 2019; 7 ():53305-53313.
Chicago/Turabian StyleJonathan De C. Silva; Joel Jose P. C. Rodrigues; Kashif Saleem; Sergei A. Kozlov; Ricardo Rabelo. 2019. "M4DN.IoT-A Networks and Devices Management Platform for Internet of Things." IEEE Access 7, no. : 53305-53313.
Mutual exclusion (ME) is a highly researched problem in distributed computing systems. In the mutual exclusion problem, no two nodes can use critical resource simultaneously. Numerous protocols have been proposed for various types of static as well as mobile distributed systems, namely, Mobile Ad Hoc Networks (MANET), Vehicular Ad Hoc Networks (VANET) and cellular networks. The flying ad hoc networks (FANET) is an interesting variant of distributed systems and, to the best of our knowledge, no protocol exists in the literature for mutual exclusion in FANETs. In FANETs, the critical resource is mounted on an unmanned aerial vehicle (UAV) and user nodes are assumed in the transmission range of the UAV. Ours is the first algorithm to ensure ME in FANETs. The algorithm is token-based and we name it Mobile Resource Mutual Exclusion (MRME) algorithm. Unlike other ad hoc networks, due to swift mobility of nodes as well as resource, the FANETs topology is highly dynamic and fault prone. The MRME algorithm handles it successfully. Further, we present the correctness proof, complexity analysis and simulation results. The worst-case complexity of MRME is O(n) and synchronization delay is T, where T is message propagation delay.
Ashish Khanna; Joel J.P.C. Rodrigues; Naman Gupta; Abhishek Swaroop; Deepak Gupta; Kashif Saleem; Victor Hugo C. de Albuquerque. A mutual exclusion algorithm for flying Ad Hoc networks. Computers & Electrical Engineering 2019, 76, 82 -93.
AMA StyleAshish Khanna, Joel J.P.C. Rodrigues, Naman Gupta, Abhishek Swaroop, Deepak Gupta, Kashif Saleem, Victor Hugo C. de Albuquerque. A mutual exclusion algorithm for flying Ad Hoc networks. Computers & Electrical Engineering. 2019; 76 ():82-93.
Chicago/Turabian StyleAshish Khanna; Joel J.P.C. Rodrigues; Naman Gupta; Abhishek Swaroop; Deepak Gupta; Kashif Saleem; Victor Hugo C. de Albuquerque. 2019. "A mutual exclusion algorithm for flying Ad Hoc networks." Computers & Electrical Engineering 76, no. : 82-93.
Vehicular networks are continually gaining popularity, owing to the evolution of the Internet of things, by means of rapid communication in IP-based networks. Vehicles are being fitted with sensory devices to gain inputs from the external environment for information processing. Numerous applications of vehicular networks depend on the use of communication networks. The security and privacy of data communication are significant challenges, particularly in wireless applications, for example, the Internet of connected vehicles. When an official fleet of vehicles (government or military) begins its journey, the vehicles need to communicate with one another to share sensitive information. The security of such a fleet is maintained in various security layers, each of which coordinates and communicates with the others, but avoids disclosing sensitive information of higher security layers to lower security layers. No such access control model exists that can enforce the authority of security officials in layers. We propose a novel security and privacy based access control (SPBAC) model for the Internet of connected vehicles, which allows security officials to access information in combination with permissions and roles, instead of roles only, for officials traveling in vehicles belonging to the same fleet. Vehicle-to-vehicle communication is performed with the aid of onboard unit sensory devices. The vehicles can also communicate through wireless technology, namely WiFi and cellular communications (4G/5G). The SPBAC model provides communication among security layers in a secure, private, and efficient manner compared to other state-of-the-art algorithms. The SPBAC model is demonstrated here using mathematical modeling along with implementation examples.
Muhammad Asif Habib; Mudassar Ahmad; Sohail Jabbar; Shehzad Khalid; Junaid Chaudhry; Kashif Saleem; Joel J.P. C. Rodrigues; Muhammad Sayim Khalil. Security and privacy based access control model for internet of connected vehicles. Future Generation Computer Systems 2019, 97, 687 -696.
AMA StyleMuhammad Asif Habib, Mudassar Ahmad, Sohail Jabbar, Shehzad Khalid, Junaid Chaudhry, Kashif Saleem, Joel J.P. C. Rodrigues, Muhammad Sayim Khalil. Security and privacy based access control model for internet of connected vehicles. Future Generation Computer Systems. 2019; 97 ():687-696.
Chicago/Turabian StyleMuhammad Asif Habib; Mudassar Ahmad; Sohail Jabbar; Shehzad Khalid; Junaid Chaudhry; Kashif Saleem; Joel J.P. C. Rodrigues; Muhammad Sayim Khalil. 2019. "Security and privacy based access control model for internet of connected vehicles." Future Generation Computer Systems 97, no. : 687-696.
Cloud Computing has been a predominant approach for the development of Internet of Things (IoT) solutions. However, to meet the requirements of real-time and latency-sensitive applications in healthcare, a new computing paradigm that follows a Cloud computing approach, called Fog Computing, demonstrates to be an effective tool by extending the Cloud resources to the edge of the network. This work studies the contribution of the Fog Computing paradigm applied to healthcare, highlighting its main benefits regarding latency, network usage, and power consumption. Based on these parameters, a Fog-assisted health monitoring system is proposed and its performance evaluation and demonstration is carried out. The results demonstrates the potential enhancement of this approach to minimise data traffic in the core of the network because data is analysed locally and, also, enhancing security on health information that can be kept locally, enhancing data security and providing better insights of patient’s health status.
Pedro H. Vilela; Joel J.P.C. Rodrigues; Petar Solic; Kashif Saleem; Vasco Furtado. Performance evaluation of a Fog-assisted IoT solution for e-Health applications. Future Generation Computer Systems 2019, 97, 379 -386.
AMA StylePedro H. Vilela, Joel J.P.C. Rodrigues, Petar Solic, Kashif Saleem, Vasco Furtado. Performance evaluation of a Fog-assisted IoT solution for e-Health applications. Future Generation Computer Systems. 2019; 97 ():379-386.
Chicago/Turabian StylePedro H. Vilela; Joel J.P.C. Rodrigues; Petar Solic; Kashif Saleem; Vasco Furtado. 2019. "Performance evaluation of a Fog-assisted IoT solution for e-Health applications." Future Generation Computer Systems 97, no. : 379-386.
The knowledge of flying insects wing-beat acoustical properties supported the progress of sensing disease vectors mosquitoes in free flight. The classification of individual flying insects species' through wing-beat frequencies and respective harmonics is the principle of frequency spectrum analysis method both in acoustical and optical sensors approaches for disease vectors mosquitoes. Investigations based on acoustic devices, microphones, amplifiers, and recorders have produced extensive scientific contributions to behavioral and biological insects’ knowledge. Moreover, the researches based on acoustical approach are accountable for the massive available database on flying insects species and gender classification. However, it was the advent of the optical sensing approach for flying insects detection that allowed sensor devices to become smaller, cheaper, faster, self-triggered, and further reliable and energy efficient. These benefits enabled the state of the art on mosquitoes monitoring to move towards smarter devices that automatically process data and have greater autonomy in inaccessible locations. Consequently, it becomes plausible to break geographic, economic and social boundaries for the flying insects sensing, allowing the ubiquitous monitoring of disease-vector mosquito populations. This paper reviews the related literature on automated electronic approaches for disease vectors mosquitoes monitoring and identifies open issues and opportunities for further researches in expanding scenarios considering new data processing and emerging transmission technologies.
Diego A.A. Santos; Joel J.P.C. Rodrigues; Vasco Furtado; Kashif Saleem; Valery Korotaev. Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency. Journal of Cleaner Production 2019, 217, 767 -775.
AMA StyleDiego A.A. Santos, Joel J.P.C. Rodrigues, Vasco Furtado, Kashif Saleem, Valery Korotaev. Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency. Journal of Cleaner Production. 2019; 217 ():767-775.
Chicago/Turabian StyleDiego A.A. Santos; Joel J.P.C. Rodrigues; Vasco Furtado; Kashif Saleem; Valery Korotaev. 2019. "Automated electronic approaches for detecting disease vectors mosquitoes through the wing-beat frequency." Journal of Cleaner Production 217, no. : 767-775.
The Internet of Things (IoT) is an emerging paradigm that proposes the connection of objects to exchange information in order to reach a common objective. In IoT networks, it is expected that the nodes will exchange data between each other and with external Internet services. However, due to deployment costs, not all the network devices are able to communicate with the Internet directly. Thus, other network nodes should use Internet-connected nodes as a gateway to forward messages to Internet services. Considering the fact that main routing protocols for low-power networks are not able to reach suitable performance in the displayed IoT environment, this work presents an enhancement to the Lightweight On-demand Ad hoc Distance-vector Routing Protocol—Next Generation (LOADng) for IoT scenarios. The proposal, named LOADng-IoT, is based on three improvements that will allow the nodes to find Internet-connected nodes autonomously and dynamically, decreasing the control message overhead required for the route construction, and reducing the loss of data messages directed to the Internet. Based on the performed assessment study, which considered several number of nodes in dense, sparse, and mobility scenarios, the proposed approach is able to present significant results in metrics related to quality-of-service, reliability, and energy efficiency.
José V. V. Sobral; Joel J. P. C. Rodrigues; Ricardo A. L. Rabêlo; Kashif Saleem; Vasco Furtado. LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks. Sensors 2019, 19, 150 .
AMA StyleJosé V. V. Sobral, Joel J. P. C. Rodrigues, Ricardo A. L. Rabêlo, Kashif Saleem, Vasco Furtado. LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks. Sensors. 2019; 19 (1):150.
Chicago/Turabian StyleJosé V. V. Sobral; Joel J. P. C. Rodrigues; Ricardo A. L. Rabêlo; Kashif Saleem; Vasco Furtado. 2019. "LOADng-IoT: An Enhanced Routing Protocol for Internet of Things Applications over Low Power Networks." Sensors 19, no. 1: 150.