Kuljeet Kaur

Kuljeet Kaur
  • PhD
  • PostDoc Position at École de Technologie Supérieure

About

90
Publications
16,818
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,369
Citations
Introduction
Dr. Kaur is currently working as a NSERC Postdoctoral Research Fellow with Department of ElectricalEngineering, École de technologie supérieure, Université du Québec, Montréal, Canada. Her main research interests include Cloud Computing, Energy Efficiency, Smart Grid, Frequency Support, and Vehicle-to-Grid. Dr. Kaur has secured a number of research articles in top-tier journals and international conferences. Dr. Kaur also received the IEEE ICC best paper award in 2018 at Kansas City, USA.
Current institution
École de Technologie Supérieure
Current position
  • PostDoc Position

Publications

Publications (90)
Conference Paper
The performance of integrated satellite-aerial-terrestrial relay networks (ISATRNs) faces two main challenges, severe signal strength degradation over long transmission distances and limited spectrum resources. To address these issues, we consider the introduction of high altitude platforms (HAPs) and unmanned aerial vehicles (UAVs) carrying reconf...
Conference Paper
Due to the constant influx of multiple security attacks into the next generation of mobile communication technologies, the Third Generation Partnership Project (3GPP) has established authentication and key agreement protocol, 5G-AKA, to securely access the 5G communication services while maintaining the integrity of the underlying network. However,...
Article
The journey to the next decade of smart cellular connectivity, sixth-generation (6G) networks, has already begun, even though 6G is still in its nascent stages and far from its deployment. In telecommunications, 6G networks have gained the attention of the industry and academia. 6G is planned to succeed the 5G standard with almost 100 times greater...
Article
The inclusion of smart electronic devices and the integration of a large number of renewable energy resources (RERs) make network monitoring and control complicated in a power system network. The scenario becomes worse when asymmetrical faults occur in a system at multiple intervals of time, which may lead to blackouts if proper remedial actions ar...
Conference Paper
In Internet of Things (IoT)-based e-Health Systems (IoTEHS), medical devices form a large network that continuously sense and share the healthcare data with the nearby edge devices or cloud servers. The health data is subsequently made available to various IoTEHS stakeholders (such as doctors, nurses and patients) to track and monitor patients unde...
Article
New industrial control systems (ICSs) that have been modernized with the industrial internet of things (IIoT) are exposed to cyber-attacks that exploit IIoT vulnerabilities. Numerous intrusion detection systems (IDSs) have therefore been proposed to secure ICSs, many of which are based on machine learning, specifically deep neural networks (DNNs)....
Article
A non-orthogonal multiple access (NOMA)-enabled double-layer airborne access vehicular ad hoc networks (DLAA-VANETs) architecture is designed in this paper, which consists of a high-altitude platform (HAP), multiple unmanned aerial vehicles (UAVs) and vehicles. For the designed DLAA-VANETs, we investigate the UAV deployment and network optimization...
Article
In recent years, intrusion detection systems (IDSs) are offering effective solutions to protect various types of cyber-attacks in different networks such as Internet of Vehicles (IoVs) network in Intelligent Transportation Systems (ITS). Deep learning models have largely been leveraged by these intrusion detection systems to achieve better effectiv...
Conference Paper
Full-text available
Due to the constant penetration of various security attacks, it is highly important to secure the underlying communication networks between the IoT, Fog and Cloud in the next generation of mobile communication system (5G). Thus, secure authentication and key agreement protocol, namely 5G-AKA, has been proposed in the literature to safely and stably...
Article
Wireless Body Area Networks (WBANs) provide wireless remote patient monitoring services where doctors get patients' health records without physically visiting them. In WBANs, biosensors are placed on the patient's body that sense and transmit physiological data to the paired medical personnel. Such medical setups are appropriate for COVID-19 patien...
Article
Intelligent Manufacturing 5.0 of multipulse rectifier systems requires them to be optimized for a variety of use in transportation and factories producing hearty touch technology. The research presented in this article show advances of using heuristic models to set 12-pulse and 24-pulse rectifiers to work under low- and high-voltage load. As a resu...
Article
Full-text available
A Virtual Network Function (VNF) is responsible for running codes that have been offloaded by mobile users, and are hosted in the cloud and edge servers of the 5G Internet's hybrid cloud infrastructure. The two key design goals of VNF deployment in a 5G hybrid cloud are to reduce deployment cost and minimize service latency experienced by users (i....
Conference Paper
Full-text available
The growing usage of wireless devices has significantly increased the need for Wireless Local Area Network (WLAN) during the past two decades. However, security (most notably authentication) remains a major roadblock to WLAN adoption. Several authentication protocols exist for verifying a supplicant's identity who attempts to connect his wireless d...
Article
The Internet of Things (IoT) networks are obstructed by security vulnerabilities that hackers can leverage to operate intrusions in many environments, such as smart homes, smart factories, and smart healthcare systems. To overcome this obstruction, researchers have come up with different intrusion detection and prevention systems (IDPSs). Out of al...
Book
This book provides comprehensive discussion on key topics related to the usage and deployment of software defined networks (SDN) in Internet of Everything applications like, healthcare systems, data centers, edge/fog computing, vehicular networks, intelligent transportation systems, smart grids, smart cities and more. The authors provide diverse so...
Article
Intelligent Transportation Systems (ITS) have gained popularity due to smart services and applications to facilitate the users on the roads. The increasing growth of users in these networks created new and complex data processing, storage, security, and privacy concerns. These networks are using centralized edge, fog, or cloud architecture for data...
Article
The convergence of Maritime Transportation Systems (MTS) and Internet of Things (IoT) has led to the promising IoT-empowered MTS (IoT-MTS). However, abnormal trajectories of maritime transportation ships can have highly negative impacts on the management of IoT-MTS. Therefore, anomaly detection of trajectories is important for the successful deploy...
Article
The vigorous development of positioning technology and ubiquitous computing has spawned trajectory big data. By analyzing and processing the trajectory big data in the form of data streams in a timely and effective manner, anomalies hidden in the trajectory data can be found, thus serving urban planning, traffic management, safety control and other...
Article
The traditional healthcare is overwhelmed by the processing and storage of massive medical data. The emergence and gradual maturation of Internet of Things (IoT) technologies bring the traditional healthcare an excellent opportunity to evolve into the IoT-enabled healthcare of massive data storage and extraordinary data processing capability. Howev...
Article
With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edges so as to provide better support to computation-intensive Internet of Things (IoT) applications. Al...
Article
Due to proliferation of online posts and rise in the active social media users, fraudulent activities related with spam messages have taken a spike drift. Spam is an activity by which hackers use electronic messaging system to unsolicited messages in mass content to unknown users. It can be also taken as one of the major attraction of attackers in...
Article
Artificial Internet of Things (AIoT) is that the system collects all kinds of information in real-time through various sensors, and intelligence analysis of the data through machine learning in the terminal equipment, edge domains, or cloud centers, including positioning, comparison, forecasting, scheduling, etc. which brings about the data securit...
Article
Full-text available
A R T I C L E I N F O A B S T R A C T Triangular Fuzzy numbers (TFNs) are vast and common representation of fuzzy data in applied sciences. Multiplication is a very important operation for fuzzy numbers. It is needed to decompose fuzzy systems such as fully triangular fuzzy regression models where the unknown and unrestricted triangular fuzzy coeff...
Article
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years; particularly due to the increasing dependence of emerging Cyber-Physical Systems on them. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the mos...
Article
The ever-growing trend of making the traditional power grids smarter than before has resulted in their gradual evolution to more sophisticated grids, referred to as Smart Grids (SGs) Cyber-Physical Systems with complex networking technologies. The integration of Information and Communication Technologies with power grids fosters seamless data shari...
Article
The potential for the wide-scale acceptance of the Industrial IoT is limited by a lack of automation, real-time monitoring, and connectedness. However, the future communication trend towards 5G is expected to bring greater benefits to IIoT infrastructures in terms of high-speed transmission and ultra-low latency. Furthermore, with emerging techniqu...
Article
Energy Internet (also referred to as Smart Grid 2.0) is another promising application of the Industrial Internet of Things (IIoT), for example, in the way energy is being produced, traded, distributed, and consumed. This is partly due to the lowering of barriers (e.g., costs and Internet connectivity) and advances in the underlying technologies, su...
Conference Paper
Energy consumption minimization of cloud data centers (DCs) has attracted much attention from the research community in the recent years. An effective way to improve the energy efficiency of DCs is by using efficient job scheduling strategies. However, the most challenging issue in selection of efficient job scheduling strategy is to ensure SLA bin...
Article
Full-text available
With the advent of 5G, technologies such as Software-Defined Networks (SDNs) and Network Function Vir-tualization (NFV) have been developed to facilitate simple programmable control of Wireless Sensor Networks (WSNs). However, WSNs are typically deployed in potentially untrusted environments. Therefore, it is imperative to address the security chal...
Article
The rapid advancement of the Internet of Things is expected to play a critical role in future intelligent transportation systems. This technology utilizes advanced information and communication technologies to enhance the operational capabilities of the vehicles and is often referred to as IoAV. More importantly, the increasing usage of sensors and...
Article
For a number of years, due to an exponential increase in the demand for an eco-friendly environment, there has been a rapid increase in the green city revolution across the globe. Subsequently, load shifting of major energy consumers from conventional power grids to renewable energy sources (RES) has become inevitable. Towards this end, cloud data...
Article
In this paper, a secure and lightweight authentication scheme, which provides trust, anonymity, and mutual authentication, with reduced energy, communicational, and computational overheads, is proposed for resource-constrained Smart meters (SMs). The designed mutual authentication-based key agreement protocol leverages the advantages of Fully Hashe...
Article
Internet of Things (IoT) has many applications, including Industry 4.0. There are a number of challenges when deploying IoT devices in the Industry 4.0 setting, partly due to the low-cost IoT devices/nodes with limited capacity to run/support security solutions. Hence, there is a need for a lightweight and efficient security solution to protect the...
Article
The rapidly evolving Industry standards and transformative advances in the field of Internet of Things (IoT) are expected to create a tsunami of Big Data shortly. This, in turn, will demand real-time data analysis and processing from Cloud Computing platforms. A substantial part of the computing infrastructure is supported by large-scale and geogra...
Article
With the rapid explosion of Industrial Internet of Things (IIoT), the need for real-time data processing with enhanced flexibility and scalability has increased manifold. However, the newly evolved containerization technology offers lucrative advantages in comparison to the conventional virtual machines. However, management of these light-weight co...
Article
The synergy between data security and high intensive computing has envisioned the way to robust anomaly detection schemes which in turn necessitates the need for efficient data analysis. Data clustering is one of the most important components of data analytics, and plays an important role in various Internet of Things (IoT)-enabled applications suc...
Article
With an exponential increase in the usage of different types of services and applications in cloud computing environment, the identification of malicious behavior of different nodes becomes challenging due to the diversity of traffic patterns generated from various services and applications. Most of the existing solutions reported in the literature...
Article
Rapid advancements in IIoT have paved the way to the evolution of SGs, which support many applications including DRM, energy sharing, and fault recovery. Among these, DRM is very critical since it helps to maintain adequate balance between electricity demand and supply. However, with the increasing penetration of EVs and their dynamic charging and...
Article
An intelligent transportation system (ITS) is a cyber physical system (CPS) that is well recognized due to its distinctive applications such as passenger safety, enhanced traffic efficiency, and infotainment services. However, very recently, these CPSs have witnessed a rapid increase in the number of autonomous vehicles (AVs), and the count is expe...
Article
Grid frequency support is one of the most challenging problems, since minor variations in it may lead to huge financial losses. This problem becomes even more challenging with the horizontal and vertical expansion of modern cloud data centers (DCs). In the past, several efforts have been made to manage frequency deviations using flywheels, commerci...
Preprint
Full-text available
Smart metering infrastructure (SMI) is the core component of the smart grid (SG) which enables two-way communication between consumers and utility companies to control, monitor, and manage the energy consumption data. Despite their salient features, SMIs equipped with information and communication technology are associated with new threats due to t...
Preprint
Full-text available
With the advent of the Internet-of-Things (IoT), vehicular networks and cyber-physical systems, the need for real-time data processing and analysis has emerged as an essential pre-requite for customers' satisfaction. In this direction, Mobile Edge Computing (MEC) provides seamless services with reduced latency, enhanced mobility, and improved locat...
Article
With the emergence of the Internet-of-Things (IoT) and seamless Internet connectivity, the need to process streaming data on real-time basis has become essential. However, the existing data stream management systems are not efficient in analyzing the network log big data for real-time anomaly detection. In this context, the existing anomaly detecti...
Conference Paper
The proliferation of the Internet of Things (IoT) has paved the way for many cloud based applications such as smart grid, healthcare, traffic management, finance, etc. In this vein, the need of transferring large data-streams to remote data centers is a key concern for modern Cloud-based IoT paradigms. This disrupts the remote Cloud Computing model...
Conference Paper
Rapid progress in Intelligent Transportation Systems (ITS) during the last few decades has resulted in the emergence of the Internet of Vehicles (IoV), in which smart vehicles communicate with each other for information sharing. The exponential increase in the number of vehicles, together with an increasing data demands from in-vehicle users, has l...
Article
The ever-increasing demands of vehicular networks pose significant challenges such as availability, computation complexity, security, trust, authentication, etc. This becomes even more complicated for high-speed moving vehicles. As a result, increasing the capacity of these networks has been attracting considerable awareness. In this regard, the ne...
Conference Paper
Vehicle to Grid (V2G) is a crucial technology that enables the bidirectional flow of communication between electric vehicles (EVs) and the smart grid (SG). Undoubtedly security and privacy are inherent requirements of these connections. In order to ensure seamless communications across EVs and the SG, privacy and anonymity of users, confidentiality...
Conference Paper
Due to recent advances in wireless communication, the availability of mobile services has increased significantly. However, due to the open nature of wireless channels, vulnera-bilities exploiting these services have increased as well. Thus, it is essential to ensure the legitimacy of both clients and servers and to provide communication confidenti...
Preprint
Full-text available
Vehicle-to-grid (V2G) networks have emerged as a new technology in modern electric power transmission networks. It allows bi-directional flow of communication and electricity between electric vehicles (EVs) and the Smart Grid (SG), in order to provide more sophisticated energy trading. However, due to the involvement of a huge amount of trading dat...
Preprint
Full-text available
With the increasing development of advanced communication technologies, vehicles are becoming smarter and more connected. Due to the tremendous growth of various vehicular applications, a huge amount of data is generated through advanced on-board devices and is deemed critical to improve driving safety and enhance vehicular services. However, cloud...
Article
With the exponential growth of technologies such as IoT, edge computing, and 5G, a tremendous amount of structured and unstructured data is being generated from different applications in the smart citiy environment in recent years. Thus, there is a need to develop sophisticated techniques that can efficiently process such huge volumes of data. One...
Article
Cloud computing has emerged as a popular technologies which provide on-demand services to the end users. Such services are hosted by massive geo-distributed data centers(DCs). Nowadays, connected vehicles in a smart city can also avail cloud services through Internet using cellular technologies. But, the advent of 5G technology has posed challenges...
Preprint
Full-text available
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-en...
Conference Paper
Network Functions Virtualization (NFV) in Software Defined Networks (SDN) emerged as a new technology for creating virtual instances for smooth execution of multiple applications. Their amalgamation provides flexible and programmable platforms to utilize the network resources for providing Quality of Service (QoS) to various applications. In SDN-en...
Conference Paper
Full-text available
The growing interest in the Internet of Things (IoT) applications is associated with an augmented volume of security threats. In this vein, the Intrusion detection systems (IDS) have emerged as a viable solution for the detection and prevention of malicious activities. Unlike the signature-based detection approaches, machine learning-based solution...
Conference Paper
Full-text available
The powerful paradigm of Fog computing is currently receiving major interest, as it provides the possibility to integrate virtualized servers into networks and brings cloud service closer to end devices. To support this distributed intelligent platform, Software-Defined Network (SDN) has emerged as a viable network technology in the Fog computing e...
Preprint
Full-text available
The growing interest in the Internet of Things (IoT) applications is associated with an augmented volume of security threats. In this vein, the Intrusion detection systems (IDS) have emerged as a viable solution for the detection and prevention of malicious activities. Unlike the signature-based detection approaches, machine learning-based solution...
Preprint
The powerful paradigm of Fog computing is currently receiving major interest, as it provides the possibility to integrate virtualized servers into networks and brings cloud service closer to end devices. To support this distributed intelligent platform, Software-Defined Network (SDN) has emerged as a viable network technology in the Fog computing e...
Article
The continuous development and usage of multimedia-based applications and services have contributed to the exponential growth of social multimedia traffic. In this context, secure transmission of data plays a critical role in realizing all the key requirements of social multimedia networks such as reliability, scalability, Quality of Information (Q...
Conference Paper
Full-text available
With the explosive penetration of Electric Vehicles (EVs) in the last decade, the load on the existing grids have exaggerated manifold. This has led to severe demand-supply imbalances causing grid instability and reliability issues. Towards this end, Demand Reponse (DR) management has been identified as an important means to tackle this problem. Th...
Article
Improved quality of life has lead the healthcare industry to geographically expand and support real-time services. Following this trend, a surge of healthcare monitoring devices has substantially overgrown in the global market. These devices tend to generate data in humongous quantity that need real-time analysis with seamless and secure transmissi...
Article
With the ongoing trend of smart and Internet-connected objects being deployed across a broad range of applications, there is also a corresponding increase in the amount of data movement across different geographical regions. This, in turn, poses a number of challenges with respect to big data storage across multiple locations, including cloud compu...
Article
Frequency regulation is one of the most crucial ancillary services that strives to maintain the demand and supply in Smart Grid (SG) setup. The deviations in grid’s frequency can be managed efficiently by adjusting the power generation and consumption of supply and demand sides respectively. Traditionally, frequency support is provided using conven...
Article
Full-text available
Cloud Computing (CC) has emerged as one of the most popular technologies of the modern era for providing ondemand services to the end users. Most of the computing tasks in CC are performed by geo-distributed data centers which may consume hefty amount of energy for their operations. However, the usage of renewable energy resources with appropiate s...
Article
The emergence of the Industrial Internet of Things (IIoT) has paved the way to real-time big data storage, access, and processing in the cloud environment. In IIoT, the big data generated by various devices such as-smartphones, wireless body sensors, and smart meters will be on the order of zettabytes in the near future. Hence, relaying this huge a...
Article
In the last few years, there has been an exponential increase in the penetration of electric vehicles (EVs) due to their eco-friendly nature, and ability to support bidirectional energy exchanges with the smart grid. Besides serving transportation needs and reducing the carbon footprints in the environment, EVs are widely used for instantaneous gri...
Article
In the last few years, we have witnessed the huge popularity of one of the most promising technologies of the modern era: the Internet of Things. In IoT, various smart objects (smart sensors, embedded devices, PDAs, and smartphones) share their data with one another irrespective of their geographical locations using the Internet. The amount of data...
Conference Paper
Penetration of electric vehicles (EVs) in the market, have gained significant momentum in the last couple of years. EVs not only deliver efficient transportation facilities, but also reduce the carbon footprints in the environment. In addition to this, EVs have the intrinsic ability to support the grid during peak and off-peak hours, which can be e...
Article
Nontechnical losses, particularly due to electrical theft, have been a major concern in power system industries for a long time. Large-scale consumption of electricity in a fraudulent manner may imbalance the demand-supply gap to a great extent. Thus, there arises the need to develop a scheme that can detect these thefts precisely in the complex po...
Article
The ever-growing dependency of modern life on electricity may impose huge burden on smart grids (SGs). This dependency affects the demand-supply gap and may lead to undesirable frequency fluctuations. In the worst case, these fluctuations may result in blackouts. In this direction, fleet of electric vehicles (EVs) may play a crucial role in reducin...
Article
With the widespread penetration of plug-in hybrid electric vehicles (PHEVs), the overall demand on microgrids (MGs) may increase manifold in the near future. Unregulated power demands from PHEVs may increase the demand-supply gap at MGs. Thus, to keep MGs stabilize and cater the evergrowing energy demands, there is a requirement of an intelligent s...
Conference Paper
Smart grid (SG) is an innovative technology which aims to make the conventional power grids capable enough to handle the ever increasing demands of power in an efficient manner. SG technology renders the electric distribution system with the capability of accumulating energy from various sources like wind, solar etc. But these sources have intermit...
Article
Full-text available
Internet of Vehicles (IoV) is a leading technology of the present era. It has gained huge attention with respect to its implementation in wide variety of domains ranging from traffic safety to infotainment applications. However, IoV can also be extended to healthcare domain, where the patients can be provided healthcare services on-the-fly. We exte...
Article
Full-text available
Recently, vehicular cloud computing (VCC) has emerged as the one of the fast growing technologies with an aim to provide uninterrupted services to the moving clients even on-the-fly. One of the services provided by VCC is the mobile healthcare in which patient can be provided diagonosis from anywhere during their mobility. This paper proposes an in...
Article
Smart Grid Network (SGN) is one of the innovative trends towards efficient and intelligent use of the conventional and non conventional resources of energy with respect to electric power generation, transmission and distribution. However, with the ever growing dependence and demand of modern life and industry on electricity, there arises a need of...

Network

Cited By