About
202
Publications
99,109
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,893
Citations
Publications
Publications (202)
This paper defines a smart home use case to automatically adjust home temperature and/or hot water. The main objective is to reduce the energy consumption of cooling, heating and hot water systems in smart homes. To this end, the residents set a temperature (i.e., X degree Celsius) for home and/or hot water. When the residents leave homes (e.g., fo...
With the continuous increase in the development and use of artificial intelligence systems and applications, problems due to unexpected operations and errors of artificial intelligence systems have emerged. In particular, the importance of trust analysis and management technology for artificial intelligence systems is continuously growing so that u...
Finding an available parking place has been considered a challenge for drivers in large-size smart cities. In a smart parking application, Artificial Intelligence of Things (AIoT) can help drivers to save searching time and automotive fuel by predicting short-term parking place availability. However, performance of various Machine Learning and Neur...
Fog computing could potentially cause the next paradigm shift by extending cloud services to the edge of the network, bringing resources closer to the end-user. With its close proximity to end-users and its distributed nature, fog computing can significantly reduce latency. With the appearance of more and more latency-stringent applications, in the...
Broken characters restoration represents the major challenge of optical character recognition (OCR). Active contours, which have been used successfully to restore ancient documents with high degradations have drawback in restoring characters with deep concavity boundaries. Deep concavity problem represents the main obstacle, which has prevented Gra...
Face detection, which is an effortless task for humans, is complex to perform on machines. The recent veer proliferation of computational resources is paving the way for frantic advancement of face detection technology. Many astutely developed algorithms have been proposed to detect faces. However, there is little attention paid in making a compreh...
It is undoubted that fog computing contributes in catering the latency-stringent applications of 5G, and one of the enabling technologies that fundamentally ensure the success of fog computing is virtualization as it offers isolation and platform independence. Although the emergence of vehicle-based fog (referred to as v-fog) facilities can certain...
In recent years, the number of objects connected to the internet have significantly increased. Increasing the number of connected devices to the internet is transforming today’s Internet of Things (IoT) into massive IoT of the future. It is predicted that, in a few years, a high communication and computation capacity will be required to meet the de...
Blockchain technology has been envisaged to commence an era of decentralised applications and services (DApps) without the need for a trusted intermediary. Such DApps open a marketplace in which services are delivered to end-users by contributors which are then incentivised by cryptocurrencies in an automated, peer-to-peer, and trustless fashion. H...
Blockchain technology has been envisaged to commence an era of decentralised applications and services (DApps) without the need for a trusted intermediary. Such DApps open a marketplace in which services are delivered to end-users by contributors which are then incentivised by cryptocurrencies in an automated, peer-to-peer, and trustless fashion. H...
The Internet of Things (IoT) is the novel paradigm of connectivity and the driving force behind state-of-the-art applications and services. However, the exponential growth of the number of IoT devices and services, their distributed nature, and scarcity of resources has increased the number of security and privacy concerns ranging from the risks of...
This paper proposes a General Data Protection Regulation (GDPR)-compliant Internet of Things (IoT) Recommender (IoTRec) system, developed in the framework of H2020 EU-KR WISE-IoT (Worldwide Interoperability for Semantic IoT) project, which provides the recommendations of parking spots and routes while protecting users' privacy. It provides recommen...
Network slicing is a promising technology for 5G networks in which operators can sell customized services to different tenants at various prices and Quality of Services (QoS) demands. Thus, the latest 4th Generation (4G) and upcoming 5th Generation (5G) mobile technologies are expected to offer massive connectivity and management of high volume of...
With the widespread use of embedded sensing capabilities of mobile devices, there has been unprecedented development of context-aware solutions. This allows the proliferation of various intelligent applications, such as those for remote health and lifestyle monitoring, intelligent personalized services, etc. However, activity context recognition ba...
One of the key enablers in serving the applications requiring stringent latency in 5G networks is fog computing as it is situated closer to the end users. With the technological advancement of vehicles’ on-board units, their computing capabilities are becoming robust, and considering the underutilization of the off-street vehicles, we envision that...
Digital twin (DT) is an emerging concept that is gaining attention in various industries. It refers to the ability to clone a physical object (PO) into a software counterpart. The softwarized object, termed logical object, reflects all the important properties and characteristics of the original object within a specific application context. To full...
Abstract As most vehicles remain parked 95% of its time, this suggests that leveraging the use of On-board Units (OBUs) in parked vehicles would provide communication and computation services to other mobile and fixed nodes for delivery of services such as multimedia streaming, data storage and data processing. The nearby vehicles can form an infra...
The General Data Protection Regulation (GDPR) gives control of personal data back to the owners by appointing higher requirements and obligations on service providers who manage and process personal data. As the verification of GDPR-compliance, handled by a supervisory authority, is irregularly conducted; it is challenging to be certified that a se...
Recent advancements in the Internet of Things (IoT) has enabled the collection, processing, and analysis of various forms of data including the personal data from billions of objects to generate valuable knowledge, making more innovative services for its stakeholders. Yet, this paradigm continuously suffers from numerous security and privacy concer...
The proliferation of mobile devices and user applications has continued to contribute to the humongous volume of data traffic in cellular networks. To surmount this challenge, service and resource providers are looking for alternative mechanisms that can successfully facilitate managing network resources in a more dynamic, predictive and distribute...
The General Data Protection Regulation (GDPR) gives control of personal data back to the owners by appointing higher requirements and obligations on service providers (SPs) who manage and process personal data. As the verification of GDPR-compliance, handled by a supervisory authority, is irregularly conducted; it is challenging to be certify that...
With the widespread use of IoT, data-driven services take the lead of both online and offline businesses. Especially, personal data draw heavy attention to service providers because of usefulness in value-added services. With the emerging bigdata technology, a data broker appears, which exploits and sells personal data about individuals to other th...
Mobile Crowd-Sensing (MCS) has appeared as aprospective solution for large-scale data collection, leveragingbuilt-in sensors and social applications in mobile devices thatenables a variety of Internet of Things (IoT) services. However,the human involvement in MCS results in a high possibilityfor unintentionally contributing corrupted and falsified...
Mobile Crowd-Sensing (MCS) has appeared as a prospective solution for large-scale data collection, leveraging built-in sensors and social applications in mobile devices that enables a variety of Internet of Things (IoT) services. However, the human involvement in MCS results in a high possibility for unintentionally contributing corrupted and falsi...
Mobile Crowd-Sensing (MCS) has appeared as a prospective solution for large-scale data collection, leveraging built-in sensors and social applications in mobile devices that enables a variety of Internet of Things (IoT) services. However, the human involvement in MCS results in a high possibility for unintentionally contributing corrupted and falsi...
Choosing an appropriate packet traffic scheduling mechanism is a critical element in a case of enhancing quality of service over 5G mobile networks, especially, in the near future cellular networks are expected to face challenges due to the massive number of smart devices data traffic rate with various QoS requirements, and specifically, 5G mobile...
Video class-lecture streaming is regarded as a popular means in improving quality of teaching and learning in schools and universities. Several research findings reveal that, recorded lecture videos (streamed over the Internet) are a useful supplement to non-classroom learning. Despite knowing this importance, some schools or universities are reluc...
In this article, we verify whether or not prediction performance can be improved by fitting the actual data to optimize the parameter values of a prediction model. Traffic flow prediction is an important research issue for solving the traffic congestion problem in an ITS. Traffic congestion is one of the most serious problems in a city, which can b...
The deliverable reports the work done in the scope of Task 2.2 of work package 2 (WP2) of Wise-IoT project. The document focuses on two main components of the task. The first and second part of the documents describe respectively details of the development of an end-to-end security framework and trust management framework for Wise-IoT platform.
The growth of IoT is proven with the massive amount of data generated in 2015, and is expected to be even more in the years to come. Relying on the cloud to meet the expanding volume, variety, and velocity of data that the IoT generates may not be feasible. In the last two years, fog computing has become a considerably important research topic in a...
The Internet of Things has facilitated access to a large volume of sensitive information on each participating object in an ecosystem. This imposes many threats ranging from the risks of data management to the potential discrimination enabled by data analytics over delicate information such as locations, interests, and activities. To address these...
Network slicing is an architectural solution that enables the future 5G network to offer a high data traffic capacity and efficient network connectivity. Moreover, software defined network (SDN) and network functions virtualization (NFV) empower this architecture to visualize the physical network resources. The network slicing identified as a multiple...
In recent years, Blockchain has been expected to create a secure mechanism for exchanging not only for cryp-tocurrency but also for other types of assets without the need for a powerful and trusted third-party. This could enable a new era of the Internet usage called the Internet of Value (IoV) in which any types of assets such as intellectual and...
5G mobile network is predictable to assist flexible requirements henceforth dynamically allocate network resources according to the demands. Network slicing, where network resources are assigned and packaged in a customize manner to set of users according to their particular requirements, is measured as a key standard to fulfil diversity of require...
Recent innovations and advances in mobile networking technologies have resulted in the emergence of smart services in various different application domains, in support of high mobility and scalability. 5G mobile networks represent a promising cellular technology to efficiently support emerging systems with a large volume of data traffic. Over the l...
In the last years, we have witnessed the introduction of the Internet of Things (IoT) as an integral part of the Internet with billions of interconnected and addressable everyday objects. On one hand, these objects generate a massive volume of data that can be exploited to gain useful insights into our day-to-day needs. On the other hand, context-a...
Machine-to-Machine communication is rapidly growing and becoming a significant part of the current 4G and future 5G mobile network data traffic, which is intended to provide coverage support and lower costs for mobile network providers. The 5G mobile network represents a promising technology to support the future of Machine-to-Machine communication...
Trust has been exploring in the era of Internet of Things (IoT) as an extension of the traditional triad of security, privacy and reliability for offering secure, reliable and seamless communications and services. It plays a crucial role in supporting IoT entities to reduce possible risks before making decisions. However, despite a large amount of...
Application of trust principals in internet of things (IoT) has allowed to provide more trustworthy services among the corresponding stakeholders. The most common method of assessing trust in IoT applications is to estimate trust level of the end entities (entity-centric) relative to the trustor. In these systems, trust level of the data is assumed...
Considering ever increasing importance of traffic sharing am- ong the users connected with different Optical Network Units (ONUs) of a TDM-Passive Optical Network (TDM-PON), to date, different TDM-PON architectures have been introduced. These architectures facilitate traffic flow among the ONUs directly along with traffic flow between an ONU and th...
Internet of Things (IoT) is the future of ubiquitous and personalized intelligent service delivery. It consists of interconnected, addressable and communicating everyday objects. To realize the full potentials of this new generation of ubiquitous systems, IoT's 'smart' objects should be supported with intelligent platforms for data acquisition, pre...
In the blooming era of the Internet of Things (IoT), trust has been accepted as a vital factor for provisioning secure, reliable, seamless communications and services. However, a large number of challenges still remain unsolved due to the ambiguity of the concept of trust as well as the variety of divergent trust models in different contexts. In th...
In Vehicular (Ad-hoc) Network (VANET), besides Vehicle-to-Vehicle communications (V2V), vehicles in VANET also exchange data with Road-Side-Units (RSUs) and Cellular Base Stations (Vehicle-to-Infrastructure communications (V2I)). With the introduction of Intelligent Transport Systems (ITS), VANETs possess a great potential in enabling surveillance...
Trust in Social Internet of Things has allowed to open new horizons in collaborative networking, particularly by allowing objects to communicate with their service providers, based on their relationships analogy to human world. However, strengthening trust is a challenging task as it involves identifying several influential factors in each domain o...
The paradigm of the Social Internet of Things (SIoT) boosts a new trend wherein the connectivity and user friendliness benefits of Social Network Services (SNS) are exhibited within the network of connected objects, i.e. the Internet of Things (IoT). The SIoT exceeds the more traditional paradigm of IoT with an enhanced intelligence and context-awa...
This paper highlights the importance of accommodating Fog computation facilities in a Passive Optical Network (PON). Fog computation is referred to as a decentralized computing infrastructure at the network access segment so as to facilitate computation capability closer to end users. PON is seen to be one of the key players in expansion of communi...
Proliferation of the number of smart devices and user applications has generated a tremendous volume of data traffic from/to a cellular network. With a traditional cellular network, a user may experience many drawbacks such as low throughput, large latencies and network outages due to overload of data traffic. The software defined networking (SDN)...
This paperpresents the trust concept, features, key characteristics and challenges for trusted ICT infrastructures and services based on ITU-T activities. It also discusses several technical issues for trust provisioning in ICT infrastructures and services. It then outlines ideas for an effort to find viable solutions to trust related problems whil...
User Location Discovery (ULD) is a key issue in smart home ecosystems, as it plays a critical role in many applications. If a smart home management system cannot detect the actual location of the users, the desired applications may not be able to work successfully. This article proposes a new taxonomy with a broad coverage of ULD methods in terms o...
Evolving toward a knowledge society requires a trusted ICT infrastructure for sharing information and creating knowledge. To advance the efforts to build converged ICT services and reliable information infrastructures, ITU-T has recently started to work on future trusted ICT infrastructures. This article proposes a possible future Social-Cyber-Phys...
Nowadays a cellular network suffers from a data traffic load in a metropolitan area due to the enormous number of mobile devices connectivity. Therefore, the users experience many issues because of a congestion and overload at an access network such as low throughput, long latencies and network outages. Current network operator's solutions, such as...
In the Internet of Thing, data is almost collected, aggregated
and analyzed without human intervention by machineto-
machine communications resulting in raising serious challenges
on access control. Particularly in Smart City ecosystem in
which multi-modal data comes from heterogeneous sources, data
owners cannot imagine how their data is used to e...