About
565
Publications
86,977
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
14,368
Citations
Publications
Publications (565)
In this work, we introduce a reliability-aware task service framework, named RATE, designed for fog-enabled Internet of Vehicle (IoV) environments. In RATE, each fog entity makes an efficient decision for task service while considering the task requirements and availability of the resources. Existing works focus mainly on delay and energy as the ma...
This article proposes attribute-based broadcast proxy (ABP) re-encryption with coalitional game theory—a scheme to share encrypted cloud data with Internet of Things (IoT) devices. The scheme reduces the decryption costs on the receiver's side. In the case of sharing data with a subgroup of IoT devices, i.e., identities, where attributes satisfy a...
This work presents the problem of optimal resource orchestration for green Sensor-as-a-Service (Se-aaS) in the presence of multiple sensor-cloud service providers (SCSPs) and vehicle owners (VOs). It leads to an oligopolistic market, where the shareholders may adopt unfair means to maximize revenue. Therefore, we consider the trust factors among th...
Bacterial networks-based novel healthcare applications integrated with the Internet of Bio-Nano Things (IoBNT) have been on the rise, particularly due to their high efficacy in delivering drugs at targeted sites. Nevertheless, these networks are vulnerable to various cyber security risks such as unauthorized access, data tampering, and malicious at...
In this work, we propose a real-time decision generation mechanism, termed as Dec-Safe, for delivering adaptive safety-linked decisions dynamically to the customers/users. None of the existing models on road transportation addressed the problems associated with the delivery of customized and safety-related information to the users. We introduce an...
In the most severe COVID-19 cases, often the cytokine molecules produced by the immune system to fight off coronavirus infection become hyperactive. This leads to “cytokine storm", which is a serious adverse medical condition causing multiple organ failures. In this work, we propose a system model that captures the transmission of cytokines from th...
One of the primary requirements in cellular-enabled multi-UAV Internet of Things (IoT) networks is to preserve data rates according to the IoT users’ (IUs) requirements. The mobility of IUs, 3D movement of UAVs, environmental conditions, and bandwidth allocation to the IUs increase the challenges to maintain the data rates due to the continual chan...
In this paper, we propose a scheme, named P-VERSE, to prioritize the emergency vehicles in the absence of a traffic signal at a multiway intersection point on a road. We consider the emergency vehicles, such as ambulance, fire trucks, or police vehicles, as prioritized vehicles and provide them safe and quick passage. The traffic signal is a tradit...
This paper proposes Coalitional Game-Based Broadcast Proxy Re-encryption in IoT a broadcast proxy re-encryption for adding new IoT devices. The proxy re-encryption is extended to broadcast proxy re-encryption to prevent re-calculation of the re-encryption key. However, the group of recipients needs to be pre-determined before the calculation of the...
COVID-19-induced cytokine storm, which is formed due to the excessive secretion of cytokine molecules, causes multi-organ damage and subsequently, the death of COVID-19 patients. Mesenchymal Stem Cells (MSCs) are regarded as cellular vaccines to combat the hyper-inflammatory response to cytokine storms. However, determining the required dose of MSC...
Mesenchymal stem cell (MSC)-derived exosomes are recognized as an unparalleled therapy for tissue damage rendered by COVID-19 infection and subsequent hyper-inflammatory immune response. However, the natural targeting mechanism of exosomes is challenging to detect the damaged tissue over long diffusion distances efficiently. The coordinated movemen...
In social IoMT systems, resource-constrained devices face the challenges of limited computation, bandwidth, and privacy in the deployment of deep learning models. Federated learning (FL) is one of the solutions to user privacy and provides distributed training among several local devices. In addition, it reduces the computation and bandwidth of tra...
In this paper, we propose and implement i-AVR, an Internet of Things (IoT)-based critical-aware system for point-of-care recommendation during ambulatory in-transits. The delay due to ambulances stuck in traffic congestion, disruptive roadways, and far-away hospitals restrain the smooth ambulance services. Therefore, in order to assist the time-cri...
In this work, we propose a condition-aware analytical framework—KEdge—for health condition recommendation in Internet of Things (IoT) based mobile healthcare systems. Procuring data from multiple sensors and making a singular assessment from them is a challenging task. KEdge overcomes such an issue by determining the severity of the patient by dete...
In this work, we propose phSDN, a programmable healthcare network architecture for resource-tailored management and on-demand allocation of analytic modules in Internet of Things (IoT) healthcare system. The identification, dynamic management of services, and fast analysis of healthcare data are a few challenges in existing remote healthcare monito...
LoRa technology endows unprecedented ability to connect isolated geographical landscapes and build community networks that serve specific purposes. As the network grows, coherent routing of messages becomes imperative to meet the network’s objectives and Quality of Service (QoS) requirements. However, despite the recent rise in research and develop...
The severe COVID-19 infection often leads to “Cytokine Release Syndrome (CRS)”, which is a serious adverse medical condition causing multiple organ failures. Anti-cytokine therapy has shown promising results for the treatment of the CRS. As part of the anti-cytokine therapy, the immuno-suppressants or anti-inflammatory drugs are infused to block th...
In this work, we propose a reconfigurable blockchain (BC) – “PerBlocks” – for handling data from heterogeneous activities and achieving scalability as well as throughput in the industrial environment. Typically, industries deal with pervasive deployment of various sensors, resulting in heterogeneous data with varying services. The adoption of conve...
In this paper, an end-to-end pricing mechanism, termed as Co-Safe, is proposed to gratify the sensor and vehicle owners (VOs) as well as the Safety Service Providers (SSPs) for the Safety-as-a-Service (Safe-aaS) platform. Safe-aaS platform delivers safety-linked decisions to the customers/users, based on their requirement. Practically, the service...
In this research work, we propose – UtilityChain –, a method for efficient resource allocation of miners involved in both mining and service-related activities. The aim of this approach is to enhance the miner's utility ( overall efficiency) in response to the increasing need for real-time data processing generated by IoT devices. The security of t...
A new scheme, Sustainability in Dominating Set (SID), to construct and maintain a sustainable and adaptive node disjoint weighted connected dominating set (CDS) is presented for solar energy harvesting-enabled Internet of Things (IoT) networks. The primary contribution of this work is the design of an approximation algorithm for CDS construction an...
In this paper, we present FedServ, a federated task service system for fog-enabled Internet of vehicles (IoV), using which we aim to minimize the delay of vehicle task service. FedServ considers different task service requirements such as delay, computation-intensiveness, processing units required, and energy consumption. The existing literature ma...
Internet-of-Things (IoT) systems generate massive data, but not all of them provide valuable information about an oddity in the monitored environment. Also, not all sensors in an IoT application require a constant operation, especially, in gently fluctuating environments. Hence, extensive bandwidth and power get wasted. As a result of the power was...
In this work, we present a solution toward facilitating dynamic encryption schemes—Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is a two-level fuzzy inference system (FIS) in the fog layer which offers customized encryption algorithm decisions to the IoT user devices based on the current configuration, data siz...
In this paper, we present a traffic engineering scheme for sustainable hybrid Software-Defined Networks (SDN) to reduce the overall energy consumption of the network and increase the amount of programmable traffic. Hybrid SDN involves both legacy and SDN switches because of the migration from a legacy network to an SDN. The primary reason for this...
In this paper, we propose an intelligent information management scheme – I2M – an two level delay-tolerant profile matching scheme for provisioning Internet-of-Everything (IoE) services in a Society 5.0. The primary aim of Society 5.0 is to provide seamless real-time IoE services using artificial intelligence (AI) and next-generation networks (NGNs...
In this work, we propose MobiTrust, a game theoretic pricing scheme, to address the problem of ensuring trust in the edge-enabled mobile sensor-cloud (MSC) architecture for vehicular Internet-of-Things (IoT). In the edge-enabled MSC, a sensor-cloud service provider (SCSP) utilises multiple sensor-equipped vehicular IoT-based devices belonging to di...
In this paper, we propose a smart bedsheet –i-Sheet– for remotely monitoring the health of the COVID-19 patients. Typically, real-time health monitoring is very crucial for COVID-19 patients to prevent their health from deteriorating. Conventional healthcare monitoring systems are manual and require patient input to start monitoring health. However...
In this paper, we propose a differential pricing scheme, named as
Diff-Price
, to deliver customized safety services to the users at an optimal price and maximizing the profit of Safety Service Provider (SSP) using the Safety-as-a-Service (Safe-aaS) platform. None of the existing pricing schemes addresses the dynamic variation of price as the typ...
In this work, we propose two lightweight access point (AP) localization and selection schemes, AP-Cov and improved AP-Cov (IAP-Cov), in IEEE 802.11-enabled IoT networks for reducing handover delay and maintaining uninterrupted connectivity during movement. The proposed scheme AP-Cov consists of two phases—the localization of APs and
a priori
sele...
In this article, we propose a dynamic decision caching mechanism (D2C), for provisioning customized safety-related decision to the end users. The end users may be vehicle owners, drivers, or any government organization. Typically, in a safety-as-a-service (Safe-aaS), these end users select certain parameters from the web portal. Based on these sele...
The resource constrained nature of IoT devices set about task offloading over the Internet for robust processing}. However, this increases the Turnaround Time (TAT) of the IoT services. High TATs may cause catastrophe in time-sensitive environments such as chemical and steel industries, vehicular networks, healthcare, and others. Moreover, the unre...
To meet the demands of new healthcare applications with high computation complexity, multi-access edge computing (MEC) is emerging as a key component of modern healthcare systems which provides rich computing services to the users. With the increase in the number of wireless body area network (WBAN) users requesting computing services, the computat...
In this work, we propose SemBox -- Semantic interoperability in a Box, to enable wireless on-the-go communication between heterogeneous wearable health monitoring devices. It can connect wirelessly to the health monitoring devices and receive their data packets. It uses a Mamdani-based fuzzy inference system with data pre-processing to classify the...
IoT deployments that have limited memories lack sustained computation power and have limited connectivity to the Internet due to intermittent last-mile connectivity, particularly in rural and remote locations. For maintaining congestion-free operations, most of the collected data from these networks are discarded, instead of being transmitted remot...
High propagation delay, high error probability, floating node mobility, and low data-rate, are the key challenges for Underwater Wireless Multimedia Sensor Networks (UMWSNs). In this paper, we propose RL-MAC, a Reinforcement Learning (RL)-based Medium Access Control (MAC) protocol for multimedia sensing in an Underwater Acoustic Network (UAN) envir...
A social fog-IoV network involves time-critical tasks because it is highly dynamic due to rapid changes in the network topology. Therefore, completing tasks within the allowable delay is a challenge for social fog-IoV networks. In this context, we present a latency-aware task offloading scheme, named LOAN, in a fog-enabled association-free social I...
This paper introduces an architecture – B2H – to enable a delay-tolerant public blockchain network (PBCN) in healthcare systems for Society 5.0. Healthcare systems in Society 5.0 envision an abstract paradigm that provides beyond health monitoring services to all the citizens of the society. These services include healthcare medical supply chain, c...
In this work, the problem of unbalanced data traffic in the presence of heterogeneous Internet of things (IoT) applications in software-defined data center networks (DCNs) is studied. In the existing literature, the presence of heterogeneous flows and switches and mobile IoT devices in software-defined DCN are not considered. Due to heterogeneity,...
One of the crucial challenges in networked Unmanned Aerial Vehicles (UAVs) is to configure them to serve as aerial base stations (BSs) for collecting data from distributed Internet of Things (IoT) devices in a region devoid of backbone connectivity. To address this challenge, it is required to compute optimized trajectories of UAVs to collect data...
This paper addresses the energy-aware controller placement problem (CPP) in Software-Defined Networking (SDN), considering the Internet of Things (IoT) flows. CPP involves partitioning the network into multiple subsets of switches with a single controller assigned to each subset. On the other hand, an energy-aware CPP reduces the energy consumption...
In this article, we propose a reliable and efficient medium access control (MAC) protocol, RE-MAC, for resource-constraint underwater acoustic multimedia communication systems. RE-MAC achieves scalability by utilizing a hybrid MAC protocol smartly, which takes advantage of contention, reservation, and null data packet (NDP) based channel access mec...
Industrial Internet of Things (IIoT) aims to achieve higher operational and management efficiencies by bridging machinery, equipment, human resources, and all other actors involved in an industrial environment. This bridging enables data flow over an often complex and heterogeneous communication network. It enables timely decision-making, which aff...
Internet of Bio-Nano Things-based molecular communication system in nanonetworks is deemed critical for various applications in futuristic health care technologies. In this work, we envisage a new research direction and coin the term—“BioBlock”—a blockchain-inspired nanonetworking security mechanism since the existing macro-scale security solutions...
In this work, we propose
Shadows
, a virtual blockchain (VC) for achieving parallel consensus and efficient management of data in industries by utilizing BC. Typically, industrial processes involve heterogeneous activities which require real-time consensus, managed execution, isolation, data sharing, accelerated computation, and efficient utiliza...
This work addresses the problem of optimal resource allocation for federated learning (FL) over wireless edge-networks to maximize the quality of Industrial Internet of Things (IIoT)-based services in terms of delay and revenue. The resource-constrained nature of IIoT devices necessitates the efficient utilization of their computation and communica...
Storing data from Industrial Internet of Things (IIoT) sensors in blockchain (BC) for monitoring the applications leads to management issues like bloating. The crux of this work is generating traces (the part of industrial data) using an ARIMA model and storing only the metadata over the network, resulting in reduced delay and managed data. We dete...
The deployment of software-defined wireless local area networks (SDWLANs) in hostile regions requires solar energy harvesting-enabled battery-powered access points (APs). The aforementioned APs replenish batteries and forward data flows by avoiding the problem of frequent energy outages. In this work, we propose a scheme called
SeamFlow
to place...
This work presents an efficient data-centric client selection approach, named DICE, to enable federated learning (FL) over distributed edge networks. Prior research focused on assessing the computation and communication ability of the client devices for selection in FL. On-device data quality, in terms of data volume and heterogeneity, across these...
The allocation of services from the cloud to edge servers in the Industrial Internet of Things (IIoT) emerges as a promising solution for providing time-critical services by shifting computation near sensor nodes while improving the energy cost of the cloud servers and energy consumption of sensor nodes. However, allocation of services faces challe...
This work addresses the problem of optimal resource allocation for provisioning green Sensor-as-a-Service (Se-aaS) in the presence of multiple sensor-cloud service providers (SCSPs) and vehicle owners (VOs) having heterogeneous sensors. To ensure high service availability, low carbon footprint, and optimal profit distribution, optimal usage of the...
The emergence of new applications, such as online gaming and virtual reality, necessitates the underlying network capable of fulfilling high bandwidth and low latency requirements. The software-defined multipath routing is a viable approach to fulfill such quality-of-service (QoS) requirements by improving the data delivery performance through mult...
In this work, we propose Timed Loop Gears (TLG), as a distributed method for enabling
fragmented learning
in Resource-Constrained networked IoT edge devices. TLG identifies atomic operations (gears), such as feed-forward and back-propagation, necessary for training Machine Learning (ML) models. Each of these gears executes on a Fog Node (FN) excl...
Industrial Internet of Things (IIoT) and its applications have seen a paradigm shift since the advent of artificial intelligence and machine learning. However, these methods are mostly data-centric and lack flexibility. Brain-Computer Interface (BCI) is envisioned as an efficient solution that may overcome the shortcomings of data-centric technique...
We propose the adaptation of vibration-based condition monitoring systems and techniques, popularly used in industrial condition-based maintenance, for identifying the possibility of compromising the privacy of personal computing systems. This work exploits the automated fan-based heat dissipation features and read/write operations of disk-based st...
The next-generation cyber-physical systems (CPS) with heterogeneous applications have diverse quality-of-service (QoS) requirements in terms of throughput, end-to-end latency, and packet drop reliability. To meet such diverse QoS requirements, in this paper, we propose a QoS-aware traffic forwarding scheme in software-defined CPS. The proposed sche...
The recent advances in Internet-of-Things (IoT)-based healthcare systems pave the path for the development of body-to-body network (BBN), wherein a group of wireless body area network (WBAN) users collaborate and share their individual resources. Since these WBAN users have individual decision-making capabilities and are self-centric in nature, the...
Robust and reliable communication systems, whether based on Electro-Magnetic (EM) waves or light, fail to perform under water due to very high attenuation and changing visibility conditions. The present generation of systems designed for underwater communications relies mostly on acoustic waves, typically in the ultrasonic frequency range. In this...
This paper introduces a scheme for autonomous service exchange among multiple sensor-cloud service providers (SCSPs) in a sensor-cloud (SC) platform for Internet of Things (IoT) applications. Typically, SC offers Sensors-as-a-Service (SeaaS) using the concept of sensor virtualization for serving different IoT applications seamlessly in real-time. O...
In this article, we propose Fido, a fuzzy-based string comparison method for extracting content from data lakes in a camera-based Internet of Drones (IoD) environment. Data lakes support data dumping in their native format, which makes them suitable for real-time deployments such as IoD. However, parsing through these unstructured databases has its...
In this paper, we propose a Quality of Service (QoS)-aware pricing scheme, termed as Q-Safe, for provisioning safety-related decisions to the end-users. A Safe-aaS platform provides customized decisions to the end-users, as per their requirement. In this proposed pricing scheme, we consider the presence of multiple Safety Service Providers (SSPs) i...
In this paper, we propose a dynamic consensus-based blockchain system -A-Blocks -for efficiently managing the data produced by the sensors in an Industrial Internet of Things (IIoT) environment. Typically, industries deal with a heterogeneous set of data from a diverse range of sensors. Conventional blockchain adoptions are a popular choice in such...
This article addresses the joint switch and controller placement problem in a hybrid software-defined network (SDN), which is an intermediate step of transforming a traditional backbone network into a pure SDN. For a hybrid SDN, the quality of service (QoS) is a primary concern for ensuring service guarantee of a traditional network, while providin...
In this paper, we propose and design AuGrid, an LSTM-based model for geographically aware smart grid service providers, which predicts the hourly load requests from users. We also develop a pricing model which depends on the predictions obtained from AuGrid for deciding per unit cost of energy in contrast to the existing schemes that focused solely...
The body-to-body network (BBN), which enables a group of wireless body area network (WBAN) users to collaborate and share their individual network resources, has emerged as a promised technology for the Internet of things (IoT)-based healthcare system. In BBN, WBAN users with good Internet connectivity act as gateway users and help their nearby WBA...
In this paper, we study a body-to-body network (BBN) framework, which enables wireless body area network (WBAN) users located in close proximity to cooperate and share their network resources to improve the overall network performance. Our main aim is to design a distributed resource allocation mechanism that encourages each participating WBAN user...
This paper explores the concept of AI-based Communication-as-a-Service (ACUTE) to reduce transmission delay and energy consumption, while transmitting data from end-devices to the cloud in the context of 5.0. 5.0 revolutionizes connected living with the help of a unified system that provides fully automated and end-to-end services, while addressing...
In this paper, we propose a microservices and deep learning-based scheme, termed as Micro-Safe, for provisioning Safety-as-a-Service (Safe-aaS) in a 6G environment. A Safe-aaS infrastructure provides customized safety-related decisions dynamically to the registered end-users. As the decisions are time-sensitive in nature, the generation of these de...
Software-defined IoT (SDIoT) is a promising approach to address the requirements of the Internet of Things (IoT), such as network management, Quality of Service (QoS), and resource utilization. The advantages of SDIoT are facilitated by the separation of the data- and the control-planes using
flow-rules
, that allow fine-grained control over indi...
Internet of Things (IoT) is a network of heterogeneous physical devices connected over the Internet. Each of the devices is capable of collecting and processing data. Due to the connection with the Internet, the IoT devices become more susceptible to attacks by malicious nodes, which may result in privacy loss and security breaches. Thus, network s...
In this work, we propose SEGA, a secured edge gateway microservices architecture for Industrial IoT-based monitoring of machines in industries. SEGA allows for the secured collection, transmission, and temporary storage of data within the edge network. A KNN-based analytics module hosted on the edge gateway processes time-sensitive machine monitori...
Due to the lack of unified standards in the Internet of Things (IoT), heterogeneity in terms of protocol and packet types exist. In such a case, accurate traffic identification using port-based and payload-based solutions are not suitable for flow processing in Software-Defined IoT (SD-IoT). In this article, we propose
iAcceSD
, an intelligent Ac...
An enormous amount of data processing occurs at the cloud and edge to carry out different kinds of analytics in Industrial Internet of Things (IIoT). To deal with the analytics using such a huge amount of IIoT data, different Deep Learning (DL)-based analytical models are deployed. The learning process in an analytical model needs to follow a relia...
This paper introduces the concept of context-aware attribute learning with cipher policy-attribute based encryption (CP-ABE) to preserve the privacy of users’ information in IoT-enabled 5.0. The concept of 5.0 pioneers an abstract system unifying different smart environments (SEs) to provide seamless services to the citizens. While serving differen...
In this paper, we propose a dynamic load balancing scheme, EdgeSafe, for provisioning
Safety-as-a-Service
(Safe-aaS) (Roy et al., 2018). Typically, in a Safe-aaS infrastructure, the sensor nodes are either static or mobile in nature. With the variation in the geographical location of the vehicles, the sensor nodes attached to them attain mobility...
In this work, we propose a dynamic decision query mapping mechanism, DQ-Map, for provisioning Safety-as-a-Service (Safe-aaS) (Roy
et al.
, 2018). A Safe-aaS infrastructure provides customized safety-related decisions simultaneously to multiple end-users. We consider road transportation as the application scenario of Safe-aaS and termed the safety...
In this paper, we propose a Software-defined fog architecture, named as Soft-Health, to serve various IoT-based healthcare applications. The health conditions of the patients fluctuate over time. Further, specialized medical care may not always be available in all healthcare facilities. The use of Wireless Body Area Network (WBAN) for continuous pa...
In this work, we propose Soft-Safe, a Software Defined Safety-as-a-Service (Safe-aaS) model for provisioning safety-related decisions to the registered end-users. In Safe-aaS, the end-users register to the infrastructure, provide their initial and destination location, select certain decision parameters, and make payment through a Web portal. As th...
Traditionally, sensor networks are surmised to enhance safety in underground mines by providing consistent monitoring of the conditions. However, to cope with the frequent condition changes of such a hostile environment, we need a specific network architecture for the deployed nodes to enable dynamic decision making. In this article, we argue that...
In this article, we propose a two-step distributed horizontal architecture for computation offloading in a fog-enabled Internet of Things environment—HD-Fog—to minimize the overall energy consumption, and latency while executing hard real-time applications. HD stands for the horizontal distribution of the tasks in the fog layer. Each sensor in the...
In this paper, we propose a delay-aware Q-learning-based routing algorithm - XiA - for sending data from users to nearest Access Points (APs) through Unmanned Aerial Vehicle (UAV) swarms communicating using 6G technology. These UAVs assist the ground networks in overcoming communication voids while maneuvering through different demographics. Howeve...