Aleksandr Ometov

Aleksandr Ometov
Tampere University | UTA · Faculty of Information Technology and Communication Studies

Doctor of Science in Technology

About

126
Publications
110,304
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,430
Citations
Citations since 2017
97 Research Items
2311 Citations
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
20172018201920202021202220230100200300400500600
Introduction
My name is Aleksandr Ometov and I am a young and excited researcher living in Tampere, Finland. I have background in Information Security for Communications. Currently, I'm working on H2020 A-WEAR and APROPOS ITN projects (with Tampere University) as Project and Training Manager on a PostDoc level. I am also responsible for Convergence of Humans and Machines research field at TAU.
Additional affiliations
January 2017 - December 2018
YL-Verkot OY
Position
  • Technical Project Manager
August 2013 - December 2016
Tampere University of Technology
Position
  • Research Assistant
Education
July 2017 - December 2018
Tampere University
Field of study
  • Technology
June 2016 - June 2018
August 2014 - September 2016
Tampere University of Technology
Field of study
  • Communication Systems and Networks

Publications

Publications (126)
Article
Full-text available
Driven by the unprecedented increase of mobile data traffic, device-to-device (D2D) communications technology is rapidly moving into the mainstream of fifth-generation (5G) networking landscape. While D2D connectivity has originally emerged as a technology enabler for public safety services, it is likely to remain in the heart of the 5G ecosystem b...
Article
Full-text available
Technology is continually undergoing a constituent development caused by the appearance of billions new interconnected “things” and their entrenchment in our daily lives. One of the underlying versatile technologies, namely wearables, is able to capture rich contextual information produced by such devices and use it to deliver a legitimately person...
Article
Full-text available
The blockchain technology is currently penetrating different areas of the modern Information and Communications Technology community. Most of the devices involved in blockchain-related processes are specially designed targeting only the mining aspect, i.e., solving the computational puzzle task. At the same time, the use of wearable and mobile devi...
Article
Full-text available
Today, digitalization decisively penetrates all the sides of the modern society. One of the key enablers to maintain this process secure is authentication. It covers many different areas of a hyper-connected world, including online payments, communications, access right management, etc. This work sheds light on the evolution of authentication syste...
Conference Paper
Full-text available
The Internet of Things (IoT) employs smart devices as its building blocks for developing a ubiquitous communication framework. It thus supports a wide variety of application domains, including public safety, healthcare, education, and public transportation. While offering a novel communication paradigm, IoT finds its requirements closely connected...
Conference Paper
Full-text available
Direction of Arrival (DOA) methods are found in many applications, and in the case of the Internet of Things (IoT), it is used for indoor localization. However, the implementation of DOA in IoT devices poses a real challenge, since they are computationally expensive complex numerical methods that could easily lead to resource starvation, unacceptab...
Article
Full-text available
The progress in computational offloading is heavily pushing the development of the modern Information and Communications Technology domain. The growth in resource-constrained Internet of Things devices demands the development of new computational offloading strategies to be sustainably integrated in beyond 5G networks. One of the solutions to said...
Article
Full-text available
Nowadays, the flexible localization solution for various devices for work safety is one of the most demanding research questions. Notably, it is expected to provide an acceptable level of precision in different types of environments empowered by wearable technology and the Interent of Things (IoT) devices. Existing leading localization technologies...
Article
Full-text available
With the increasing popularity of the Internet of Things and massive Machine Type Communication technologies, the number of connected devices is rising. However, while enabling valuable effects to our lives, bandwidth and latency constraints challenge Cloud processing of their associated data amounts. A promising solution to these challenges is the...
Conference Paper
Full-text available
The development of new processing algorithms has always been at the centre of satellite navigation research, aiming to minimize complexity and maximize the quality of the results. Often, these two objectives cannot be achieved simultaneously; thus, identifying the necessary trade-offs are required. Over the last decade, the development of new GNSS...
Conference Paper
Full-text available
This paper evaluates IEEE 802.15.4z standard-compliant NXP SR040 and SR150 chips in Angle of Arrival (AoA) capabilities in Channel 9 (7.737-8.237 GHz) of the Ultra-WideBand (UWB) spectrum. Due to the shorter wavelength, higher frequencies may encounter certain limitations when it comes to harsh environments, as more reflections and multipath propag...
Conference Paper
Full-text available
Broad adoption of resource-constrained devices for medical use has additional limitations in terms of execution of delay-sensitive medical applications. As one of the solutions, new ways of computational offloading could be developed and integrated. The recently emerged Mobile Edge Computing (MEC) and Mobile Cloud Computing (MCC) paradigms attempt...
Article
Full-text available
Healthcare is of particular importance in everyone's life, and keeping the advancement of it on a good pace is a priority of any country, as it highly influences the overall well-being of its citizens. Each government strives to build a modern, intelligent medical system that provides maximum population coverage with high-quality medical services....
Conference Paper
Full-text available
The possibility of utilizing different frequencies for the LoRaWAN is a key component which, together with the other parameters, i.e., (i) bandwidth, (ii) spreading factor, (iii) coding rate, and (iv) transmission power, defines the communication performance. In this paper, we present the substantive im- provements for both the end devices and the...
Conference Paper
Full-text available
Angle-of-Arrival (AoA) methods are an Internet of Things (IoT) application, which could be used, for example, in indoor localization. Anchor nodes have an array of antennas and could send the data via Ethernet cable to the cloud that calculates AoA. However, having cable connections means high installation costs, and constantly transferring big chu...
Conference Paper
Full-text available
Modern outdoor localization is commonly dependent on various Global Navigation Satellite Systems (GNSSs). On the other hand, they are known to be power-hungry and not suitable for resource-constrained devices currently flooding the Industrial Internet of Things (IIoT). Nonetheless, some of those devices may be equipped with Low-Power Wide-Area Netw...
Article
Full-text available
The evolution of modern cyber-physical systems and the tremendous growth in the number of interconnected Internet of Things (IoT) devices are already paving new ways for the development of improved data collection and processing methods [...]
Conference Paper
Full-text available
Despite the recent advances in semiconductor technology and energy-aware system design, the overall energy consumption of computing and communication systems is rapidly growing. On the one hand, the pervasiveness of these technologies everywhere in the form of mobile devices, cyber-physical embedded systems, sensor networks, wearables, social media...
Article
Full-text available
As an inevitable process, the number of older adults is increasing in many countries worldwide. Two of the main problems that society is being confronted with more and more, in this respect, are the inter-related aspects of feelings of loneliness and social isolation among older adults. In particular, the ongoing COVID-19 crisis and its associated...
Article
Full-text available
The field of information security and privacy is currently attracting a lot of research interest. Simultaneously, different computing paradigms from Cloud computing to Edge computing are already forming a unique ecosystem with different architectures, storage, and processing capabilities. The heterogeneity of this ecosystem comes with certain limit...
Article
Full-text available
Distributed Ledger Technology (DLT) is making the first steps toward becoming a solution for the growing number of various decentralized systems worldwide. Unlike pure Blockchain, DLT finds many uses across different industries, including eHealth, finance, supply chain monitoring, and the Internet of Things (IoT). One of the vital DLT features is t...
Article
Full-text available
Today, the traffic amount is growing inexorably due to the increase in the number of devices on the network. Researchers analyze traffic by identifying sophisticated dependencies, anomalies, and novel traffic patterns to improve the system performance. One of the fast development niches in this domain is related to Classic and Deep Machine Learning...
Conference Paper
Full-text available
Today, the evolution of electrical grid systems is pacing towards interconnected Smart Grids mainly driven by governmental activities worldwide. This step brings additional challenges from the data storage perspective since conventional centralized systems may not handle the growing data volumes arriving from various sources. Thus, new distributed...
Conference Paper
Full-text available
The development generally drives the evolution of modern systems towards distributed ones, generally, in blockchain and Distributed Ledger Technology domains. Ensuring the reliable digital signature of messages and the data security of messages signed with a digital signature from unauthorized interference is an essential part of enabling the opera...
Conference Paper
Full-text available
The development of small form-factor handheld electronics is pacing the personal devices market, followed by the increasing number of various applications. Some of those applications also cover computation-hungry use-cases, such as image or video processing and compression, among others. Historically, wearable and handheld devices were not designed...
Article
Full-text available
One of the most promising enablers for the secure distributed operation of the Internet of Things (IoT) systems could be based on a mathematical construct widely known as blockchain that aims to neglect the system’s centralization and scalability properties. This paper aims to map the requirements and features of both systems, highlight the main in...
Conference Paper
Full-text available
The demand in providing a reliable operation of modern Cooperative Intelligent Transport Systems (C-ITS) is growing tremendously. One of the enablers for improving efficiency is applying Machine Learning (ML) techniques to predict network characteristics. This work proposes methods to solve the Regression and Classification tasks for the real-life...
Article
Full-text available
This work is a data descriptor paper for measurements related to various operational aspects of LoRaWAN communication technology collected in Brno, Czech Republic. This paper also provides data characterizing the long-term behavior of the LoRaWAN channel collected during the two-month measurement campaign. It covers two measurement locations, one a...
Article
Full-text available
Today, ensuring work safety is considered to be one of the top priorities for various industries. Workplace injuries, illnesses, and deaths often entail substantial production and financial losses, governmental checks, series of dismissals, and loss of reputation. Wearable devices are one of the technologies that flourished with the fourth industri...
Conference Paper
Full-text available
Rapid technology advancement, economic growth, and industrialization have paved the way for developing a new niche of small body-worn personal devices, gathered together under a wearable-technology title. The triggers stimulated by end-users interest have introduced the first generation of mass-consumer wearables in just the past decade. Evidently,...
Article
Full-text available
Wearables are wireless devices that we "wear" on our bodies. The proliferation of devices embedded in clothes, medical smart wear, skin patches, smartwatches, and bracelets together with conventional smartphones has broadened the collection of data from various sources for multi-disciplinary research. Nowadays, new datasets are needed for high-dime...
Article
Full-text available
With technology evolving rapidly and proliferating, it is imperative to pay attention to mobile devices’ security being currently responsible for various sensitive data processing. This phase is essential as an intermediate before the cloud or distributed ledger storage delivery and should be considered additional care due to its inevitability. Thi...
Article
Full-text available
The positioning systems’ high accuracy and reliability are crucial enablers for various future applications, including autonomous shipping worldwide. It is especially challenging for the Arctic region due to the lower number of visible satellites, severe ionospheric disturbances, scintillation effects, and higher delays than in the non-Arctic and n...
Article
Full-text available
Since the beginning of the coronavirus (COVID-19) global pandemic, digital contact-tracing applications have been at the centre of attention as a digital tool enabling citizens to keep their social distancing, which appears to be one of the leading practices for mitigating the spread of airborne infectious diseases. Many countries have been working...
Article
Full-text available
Security and access control aspects are becoming more and more essential to consider during the design of various systems and the tremendous growth of digitization. One of the related key building blocks in this regard is, essentially, the authentication process. Conventional schemes based on one or two authenticating factors can no longer provide...
Conference Paper
Full-text available
Today, a significant share of smartphone applications use Artificial Intelligence (AI) elements that, in turn, are based on Machine Learning (ML) principles. Particularly, ML is also applied to the Edge paradigm aiming to predict and optimize the network load conventionally caused by human-based traffic, which is growing each year rapidly. The appl...
Conference Paper
Full-text available
The wearables' market is rapidly evolving, with applications ranging from healthcare and activity monitoring to emerging domains such as drones and haptic helmets. Wearable-based contact tracing is gaining increased attention in the COVID-19 era for more efficient disease prevention. Therefore, it is of timely relevance to identify the leading exis...
Conference Paper
Full-text available
The unique opportunities introduced by the emerging Industrial Internet of Things (IIoT) applications have accelerated the momentum of the massive Machine-Type Communications (mMTC) worldwide. As the number of already deployed Low-Power Wide-Area (LPWA) applications growth exponentially over the last decade, new open challenges started to be discus...
Article
Full-text available
Personal mobile devices such as smartwatches, smart jewelry, and smart clothes have launched a new trend in the Internet of Things (IoT) era, namely the Internet of Wearable Things (IoWT). These wearables are small IoT devices capable of sensing, storing, processing, and exchanging data to assist users by improving their everyday life tasks through...
Article
Full-text available
Today, the number of interconnected devices and the amount of personal information gathered by them increases tremendously resulting in the need for development tools to harness its potential. New devices are continually being introduced in the daily life of people, and they are already producing an unprecedented amount of data related to people's...
Article
Full-text available
This is a data descriptor paper for a set of the battery output data measurements during the turned on display discharge process caused by the execution of modern mobile blockchain projects on Android devices. The measurements were executed for Proof-of-Work (PoW) and Proof-of-Activity (PoA) consensus algorithms. In this descriptor, we give example...
Article
Full-text available
Dynamic blockage of radio propagation paths between the user equipment (UE) and the 5G New Radio (NR) Base Station (BS) induces abrupt rate fluctuations that may lead to sub-optimal performance of the Transmission Control Protocol (TCP) protocol. In this work, we characterize the effects of dynamic human blockage on TCP throughput at the 5G NR air...
Conference Paper
Full-text available
Interest in applications based on distributed ledger technology (DLT) is on the rise, with corporations worldwide shifting from simply exploring DLT's potential to creating productive business cases. However, despite the existence of numerous DLT applications, developers are still lacking proper tools and instruments for evaluating system behavior...
Conference Paper
Full-text available
Accuracy and reliability of major positioning systems is a crucial enabler for autonomous shipping worldwide and, in particular, in the Arctic region. Satellite positioning can be used in conjunction with other situational awareness systems that provide relative positioning information for decision-making. This work describes high-level requirement...
Article
Full-text available
The present increase of attention toward blockchain-based systems is currently reaching a tipping point with the corporate focus shifting from exploring the technology potential to creating Distributed Ledger Technology (DLT)-based systems. In light of a significant number of already existing blockchain applications driven by the Internet of Things...
Conference Paper
Full-text available
Future wearable devices are expected to increasinglyexchange their positioning information with various Location-Based Services (LBSs). Wearable applications can includeactivity-based health and fitness recommendations, location-based social networking, location-based gamification, amongmany others. With the growing opportunities for LBSs, it isexp...
Article
Full-text available
Wireless traffic produced by modern mobile devices displays high temporal and spatial dynamics as users spontaneously engage in collective applications where a significant portion of generated data remains localized. As a result, conventional service provisioning approaches may no longer be sufficient in beyond fifth generation (B5G) systems. The c...
Article
Full-text available
This work aims to put forward the utilization of onshore Narrowband IoT (NB-IoT) infrastructure for tracking of containers transported by marine cargo vessels while operating near the coastline. We introduce and evaluate three connectivity strategies, including direct sensor-to-onshore base station (BS) transmission as well as two relay-aided schem...
Article
Full-text available
Almost inevitable climate change and increasing pollution levels around the world are the most significant drivers for the environmental monitoring evolution. Recent activities in the field of wireless sensor networks have made tremendous progress concerning conventional centralized sensor networks known for decades. However, most systems developed...
Conference Paper
Full-text available
As the type of transmitted data over communication networks started to shift from the human-generated to massive Machine-Type Communications (mMTCs), entirely new applications within the Internet of Things (IoT) market emerged. Recently introduced Cellular IoT (CIoT) communication technologies operating in the licensed frequency spectrum (i.e., Nar...
Conference Paper
Full-text available
In this paper, we give a brief survey of the main research results in the area of wearable localization solutions, with a particular focus on the privacy constraints in the localization on wearable devices. We identify several open research challenges and define open questions for further research directions. It is shown that finding adequate metho...
Article
Full-text available
One of the recent major steps towards 5G cellular systems is standardization of 5G New Radio (NR) operating in the millimeter wave (mmWave) frequency band. This radio access technology (RAT) will potentially provide extraordinary rates at the access interface enabling the set of new bandwidth-greedy applications. However, the blockage of the line-o...
Chapter
Full-text available
In the wake of recent hardware developments, augmented, mixed, and virtual reality applications – grouped under an umbrella term of eXtended reality (XR) – are believed to have a transformative effect on customer experience. Among many XR use cases, of particular interest are crowded commuting scenarios, in which passengers are involved in in-bus/i...
Chapter
Full-text available
The future 5G New Radio (NR) systems are expected to support both multicast and unicast traffic. However, these traffic types require principally different NR system parameters. Particularly, the area covered by a single antenna configuration needs to be maximized when serving multicast traffic to efficiently use system resources. This prevents the...
Chapter
Full-text available
The number of Unmanned Aerial Vehicle (UAV) applications is growing tremendously. The most critical ones are operations in use cases such as natural disasters, and search and rescue activities. Many of these operations are performed on water scenarios. A standalone niche covering autonomous UAV operation is thus becoming increasingly important. One...
Article
Full-text available
Today’s dominant design for the Internet of Things (IoT) is a Cloud-based system, where devices transfer their data to a back-end and in return receive instructions on how to act. This view is challenged when delays caused by communication with the back-end become an obstacle for IoT applications with, for example, stringent timing constraints. In...
Conference Paper
Full-text available
The blockchain technology is currently penetrating different sides of modern ICT community. Most of the devices involved in blockchain-related processes are specially designed targeting only the mining aspect. At the same time, the use of wearable and mobile devices may also become a part of blockchain operation, especially during the charging time...
Conference Paper
Full-text available
Narrowband IoT (NB-IoT) stands for a radio access technology standardized by the 3GPP organization in Release 13 to enable a large set of use-cases for massive Machine-type Communications (mMTCs). Compared to legacy human-oriented 4G (LTE) communication systems, NB-IoT has game-changing features in terms of extended coverage, enhanced power saving...
Conference Paper
Full-text available
The Internet of Things (IoT) enables long-range outdoor networks, such as smart grid and municipal lighting, as well as short-range indoor systems for smart homes, residential security, and energy management. Wireless connectivity and standardized communication protocols bec