Amiya Nayak

Amiya Nayak
University of Ottawa · School of Electrical Engineering and Computer Science

About

165
Publications
28,394
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,732
Citations

Publications

Publications (165)
Article
Full-text available
The Internet of Things (IoT) is comprised of numerous devices connected through wired or wireless networks, including sensors and actuators. Recently, the number of IoT applications has increased dramatically, including smart homes, vehicular ad hoc network (VANETs), health care, smart cities, and wearables. As reported in IHS Markit (see https://t...
Conference Paper
Intelligent Connected Vehicles (ICV) are considered the promising technology that will replace traditional vehicles soon, especially with the improvement in automation and network technologies. This gives rise to the possibility of new cyberattacks, including intra- and inter-vehicle communication attacks. This paper proposed an infrastructure-inde...
Conference Paper
The Internet of Medical Things (IoMT) is a set of medical devices and applications that connect to healthcare systems through the Internet. Those devices are equipped with communication technologies that allow them to communicate with each other and the Internet. Reliance on the IoMT is increasing with the increase in epidemics and chronic diseases...
Article
Full-text available
The Internet of Things (IoT) is a massively extensive environment that can manage many diverse applications. Security is critical due to potential malicious threats and the diversity of the connectivity. Devices can protect themselves and detect threats with the Intrusion Detection System (IDS). IDS typically uses one of two approaches: anomaly-bas...
Article
Full-text available
In this paper, we aim to explore the possibility of the Transformer model in detecting the spam Short Message Service (SMS) messages by proposing a modified Transformer model that is designed for detecting SMS spam messages. The evaluation of our proposed spam Transformer is performed on SMS Spam Collection v.1 dataset and UtkMl’s Twitter Spam Dete...
Article
Software-Defined Networking (SDN) paradigm provides the ability to handle mobility more efficiently due to its programmability and fine granularity. However, in this emerging setting, the handover procedure still suffers delay due to exchanging and processing handover signaling messages. In this paper, we study the relevancy between an SDN controll...
Article
Full-text available
The detection of periodicity in a time series is considered a challenge in many research areas. The difficulty of period length extraction involves the varying noise levels among working environments. A system that performs well in one environment may not be accurate in another. Different methods, including deep neural networks, have been proposed...
Preprint
Full-text available
The attention mechanism has been widely used in deep neural networks as a model component. By now, it has become a critical building block in many state-of-the-art natural language models. Despite its great success established empirically, the working mechanism of attention has not been investigated at a sufficient theoretical depth to date. In thi...
Article
Full-text available
The extensive growth of the Internet of Things (IoT) has impacted diverse applications, including smart homes and cities, Intelligent Transport Systems (ITS) and smart factories. IoT integrates billions of smart devices -predicted to increase from 27 billion in 2017 to 125 billion by 2030- and manages communication between them. This degree of expa...
Article
The surging numbers of wireless devices and the accompanying exponential growth of user traffic have led edge and fog computing to become essential components in future access networks. By bringing more processing toward the edge of the network, they enable the realization of various demanding applications while supporting numerous resource-constra...
Article
The increasing numbers of broadband users and the corresponding rapid expansion of access networks have been putting more pressure on improving their energy efficiency to reduce both their operating costs and carbon footprint. At the center are passive optical networks (PONs), with them being one of the leading broadband technologies of today. Alth...
Article
The security threats to software-defined networks (SDNs) have become a significant problem, generally because of the open framework of SDNs. Among all the threats, distributed denial-of-service (DDoS) attacks can have a devastating impact on the network. We propose a method to discover DDoS attack behaviors in SDNs using a feature-pattern graph mod...
Article
Due to small cell deployments and multiple servers in 5G networks, a fast and anonymous mutual authentication protocol needs to be developed for complex 5G networks. In this paper, we propose a lightweight and untraceable authentication protocol for multi-server-based 5G networks. To reduce computational complexity, we employ self-certified public...
Article
An original sender's location-disclosure is a major privacy issue in vehicular social networks when people are interested in location-aware services. In this paper, we first propose a basic social-aware location-privacy protection (B-SLP) method in vehicular social networks. This method enables trustworthy users to obfuscate an original sender's lo...
Article
Full-text available
Software Defined Network (SDN) is a network framework which can be controlled and defined by software programming, and OpenFlow is the basic protocol in SDN that defines the communication protocol between SDN control plane and data plane. With the deployment of SDN in reality, many security threats and issues are of great concern. In this paper, we...
Article
In opportunistic social networks, most of the existing store-carry-forward routing mechanisms have severe problems with unfair traffic distribution among nodes and unfair delivery success ratio for individuals. To address these issues, we propose a novel protocol, called Fair and Social-aware Message Forwarding (FSMF), for opportunistic social netw...
Article
Full-text available
Network structures, consisting of nodes and edges, have applications in almost all subjects. A set of nodes is called a community if the nodes have strong interrelations. Industries (including cell phone carriers and online social media companies) need community structures to allocate network resources and provide proper and accurate services. Howe...
Article
WBANs offer a variety of medical applications and have received considerable attention in recent years. Due to the limited energy of sensors, prolonging network lifetime is of paramount importance for WBANs. Although duty-cycling techniques can conserve energy consumption and energy harvesting techniques can provide extra energy supply, the former...
Article
Full-text available
Abstract Full quantum capability devices can provide secure communications, but they are challenging to make portable given the current technology. Besides, classical portable devices are unable to construct communication channels resistant to quantum computers. Hence, communication security on portable devices cannot be guaranteed. Semi-Quantum Co...
Article
Full-text available
The software-defined networking (SDN) paradigm has become essential in tackling several issues and challenges in conventional networking, especially in mobile/cellular networks. In order to realize the benefits brought by SDN to mobility management, we study the effects of SDN in conjunction with OpenFlow protocol on the handover procedure. However...
Article
Integrating fog computing with optical access networks is believed to form a highly capable fronthaul that will live up to the various requirements and challenges of tomorrow's access networks. Such integration combines the high capacity of optical fiber with closer-to-the-edge computing and storage capabilities. However, because optical access net...
Article
Wireless Body Area Networks (WBANs) that offer various medical applications have received considerable attention in recent years. Due to limited energy of sensors, duty-cycling technique is employed to prolong the network lifetime. However, it results in long delivery delay and suffers from reliability issues. In this paper, we introduce an efficie...
Article
Smartphones are the most ubiquitous and popular hand-held devices because of their rich set of features and wide variety of services that require frequent battery recharging. In smartphones, most energy issues are due to energy bugs (ebugs). These energy bugs are said to be exist when smartphone software applications (apps) consume more power than...
Preprint
Full-text available
Full quantum capability devices can provide secure communications, but they are challenging to make portable given the current technology. Besides, classical portable devices are unable to construct communication channels resistant to quantum computers. Hence, communication security on portable devices cannot be guaranteed. Semi-Quantum Key Distrib...
Article
The huge bandwidth capacities and low costs of passive optical networks (PONs) combined with their high data rates have made them strong candidates for wireless backhauls. Many designs have therefore been proposed to integrate PONs with edge and fog computing paradigms, which are essential for many emerging applications. However, the feasibility of...
Article
THE future power network will be designed to accommodate and integrate all types of distributed renewable energy resources, storage units, and flexible demand response loads in the existing conventional grid. Also it should be able to perform intelligent energy management utilizing advancement in computation and communication to cater the needs of...
Article
Due to the short communication range, users are selected as relays to support multi-hop transmission for content sharing/downloading in D2D communications. In this letter, we first exploit social relationships from interacts and contributions, and then formulate an optimal relay selection problem to enhance cooperative multi-hop D2D communications....
Article
Network structures, consisting of nodes and edges, have applications in almost all subjects. The sets of nodes strongly connected internally are called communities. Industries (including cell phone carriers and online social media companies) need community structures to allocate network resources and provide proper customer services. However, all c...
Article
Full-text available
The focus of this paper is on participatory sensing in which every participant carrying smartphone senses its environment and shares it with server. Most of the applications require location information to perform sensing activity. But, GPS drains considerable amount of energy if used for localization. There exists a centralized localization approa...
Article
Authentication is an important issue in VANET. However, existing studies have not addressed some issues like efficiency and anonymity. In this paper, we propose an anonymous and lightweight Authentication based on Smart Card (ASC) protocol to address this issue. To accomplish this goal, ASC employs low-cost cryptographic operations to authenticate...
Conference Paper
Radio Frequency Identification (RFID) technology is becoming a revolutionary element in supply chain management by providing real-time visibility of goods flows. Across supply chains, one-for-one checking is required at each handover point to discover discrepancies between the physical shipped inventory and receiver’s order. This operation is so ub...
Conference Paper
Aeronautical ad hoc networks (AANETs) can have a hybrid topology of intermittently connected clusters and mesh network. The hybrid network topology compounded with highly dynamic nature of AANET leads to variable connectivity in the network. The connectivity in the network for direct air-to-air communication between aircrafts is primarily a functio...
Article
Full-text available
The smart grid mainly suffers from two types of cascading failures: 1) interdependence cascading failure and 2) load propagation cascading failure. The former one happens due to the interdependence between power grid and communication networks. The latter one is caused by the load propagation in the single power grid. A tiny failure leads to the si...
Article
In the past two decades, there has been a drastic increase in the mobile traffic, which is caused by the improved user experience with smart phones and its applications. In LTE system, the packet scheduler plays a vital role in the effective utilization of the resources. This field is not standardized and has immense scope of improvement, allowing...
Article
Full-text available
Task offloading from smartphones to the cloud is a promising strategy to enhance the computing capability of smartphones and prolong their battery life. However, task offloading introduces a communication cost for those devices. Therefore, consideration of the communication cost is crucial for the effectiveness of task offloading. To make task offl...
Conference Paper
The proliferation of smartphones is retarded by energy inefficient applications and energy bugs. These energy bugs severely impact the user experience and cause significant user frustrations. To detect energy bugs, we need to characterize the power consumption behaviour of software. To achieve that, we develop an operational definition of energy bu...
Article
Network partition is an inevitable phenomena that prohibits existence of unified robust networks. Partition in static networks occur mainly due to uneven traffic. In mobile networks, a member of the network can be defined using n-dimensions. These dimensions account for the member profile and properties. A multi-dimensional profile can partition th...
Article
Today's cloud datacenters host wide variety of applications which generate diverse mix of internal datacenter traffic. In a cloud datacenter environment 90% of the traffic flows, though they constitute only 10% of the data carried around, are short flows with sizes up to a maximum of 1MB. The rest 10% constitute long flows with sizes in the range o...
Article
Efficient authentication in the vehicular networks has been studied by several researchers in the past. However, there are still several issues to be addressed like high communication/ computation overhead, security problems, etc. In this paper, we propose an Efficient Authentication Protocol (EAP) for secure vehicular communication. This protocol...
Article
This paper introduces a new system-level fault diagnosis approach using support vector machines (SVMs). The objective of the fault diagnosis problem is to identify the set of permanent faulty nodes when at most nodes can fail simultaneously. We consider both the asymmetric and symmetric comparison models which assume that nodes are assigned a set o...
Article
Radio Frequency Identification technology (RFID) is widely used in many applications, such as asset monitoring, e-passport and electronic payment, and is becoming one of the most effective solutions in cyber physical system. Since the identification alone does not provide any guarantee that tag corresponds to genuine identity, authentication of tag...
Article
Developing and maintaining context-aware efficient systems in heterogeneous environments is a challenging task. In our research work, we enable context awareness in users, devices and applications to enable context-based systems in Ambient Networks. We achieve this by proposing a context dissemination system which propagates the fast evolving conte...
Article
Full-text available
This paper introduces our proposed Split- and Aggregated-TCP (SA-TCP) scheme's enhanced TCP performance in a smart metering infrastructure (SMI). The scheme is based on upgrading intermediate devices (e.g., regional collectors) to aggregate TCP connections. An SA-TCP aggregator collects data packets from smart meters in a certain region over separa...
Conference Paper
Warning data dissemination using vehicular networks is envisioned in Intelligent Transportation System applications. Due to extended connectivity of roadway vehicles and consequent extension of region of data propagation, data may be accessed in some geographical areas where it is neither relevant nor effectively beneficial. Moreover, propagating d...
Conference Paper
Full-text available
We define an iris detection algorithm that performs an order of magnitude faster than the state of the art, while preserving accuracy. The algorithm isolates the pupil boundary by extracting image edges, then finding the largest contiguous set of points that satisfy the circularity criterion and contain mostly dark pixels. The iris/sclera boundary...
Conference Paper
Third Generation Partnership Project (3GPP) Long Term Evolution (LTE) offers high data rate capabilities to mobile users, and network operators are trying to deliver a true mobile broadband experience over LTE networks. Mobile TV and Video on Demand (VoD) are expected to be the main revenue generators in the near future, and efficient video streami...
Conference Paper
Accessing video content on mobile devices has become widespread in recent years. The wireless network has to become content aware in order to offer enhanced quality of video service through efficient utilisation of the wireless spectrum. This paper proposes a scheme for end-to-end video transmission over Long Term Evolution (LTE) network. The netwo...
Article
The dynamic composition of networked appliances, or virtual devices, enables users to generate complex, strong, and specific systems. Current MANET-based composition schemes use service discovery mechanisms that depend on periodic service advertising by controlled broadcast, resulting in the unnecessary depletion of node resources. The assumption t...
Conference Paper
This paper investigates the TCP's congestion control mechanism effectiveness for smart meters. We show that the classic congestion control causes a high loss rate for metered data and disrupts competing traffic flows in a shared network. The paper introduces the performance analysis of our proposed Splitand Aggregated-TCP (SA-TCP). SA-TCP complies...
Conference Paper
The volatile world economy has greatly affected fuel prices, while pollution and gas emissions are increasing to negatively impact global warming. Vehicular networks offer a promising approach that can be applied in transportation systems to reduce fuel consumption and emissions. One of the interesting applications involves a traffic light signal s...
Conference Paper
Full-text available
The identification and processing of the risk sources that prevail in a sensor-monitored area is crucial to guarantee the uninterrupted and efficient operation of the surveillance system. In particular, a time-varying schematic depiction of the risk associated with each object will allow the human expert to draw meaningful conclusions about the sys...
Conference Paper
A drastic increase in traffic of mobile broadband is seen in the past few years, which is further accelerated by the increased usage of smart phones and its applications. The availability of good smart phones and better data connectivity are encouraging mobile users to use video services. This huge increase in usage will pose a lot of challenges to...
Conference Paper
In spite of the dramatic growth in the number of smartphones in recent years, the challenge of limited energy capacity of these devices has not been solved satisfactorily. However, in the era of cloud computing, the limitation on energy capacity can be eased off in an efficient way by offloading heavy tasks to the cloud. It is important for smartph...
Conference Paper
Neighbor discovery is necessary for the proper functioning of wireless networks. Directional antennae can be used in the network to improve connectivity due to the fact that a narrower beam width can reach a faraway place using the same transmission power. Researches until now have worked on neighbor discovery using only omni directional antenna (O...