Sudip Misra

Sudip Misra
Indian Institute of Technology Kharagpur | IIT KGP · Department of Information Technology

About

565
Publications
86,977
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
14,368
Citations

Publications

Publications (565)
Article
Full-text available
In this work, we introduce a reliability-aware task service framework, named RATE, designed for fog-enabled Internet of Vehicle (IoV) environments. In RATE, each fog entity makes an efficient decision for task service while considering the task requirements and availability of the resources. Existing works focus mainly on delay and energy as the ma...
Article
This article proposes attribute-based broadcast proxy (ABP) re-encryption with coalitional game theory—a scheme to share encrypted cloud data with Internet of Things (IoT) devices. The scheme reduces the decryption costs on the receiver's side. In the case of sharing data with a subgroup of IoT devices, i.e., identities, where attributes satisfy a...
Article
This work presents the problem of optimal resource orchestration for green Sensor-as-a-Service (Se-aaS) in the presence of multiple sensor-cloud service providers (SCSPs) and vehicle owners (VOs). It leads to an oligopolistic market, where the shareholders may adopt unfair means to maximize revenue. Therefore, we consider the trust factors among th...
Article
Bacterial networks-based novel healthcare applications integrated with the Internet of Bio-Nano Things (IoBNT) have been on the rise, particularly due to their high efficacy in delivering drugs at targeted sites. Nevertheless, these networks are vulnerable to various cyber security risks such as unauthorized access, data tampering, and malicious at...
Article
Full-text available
In this work, we propose a real-time decision generation mechanism, termed as Dec-Safe, for delivering adaptive safety-linked decisions dynamically to the customers/users. None of the existing models on road transportation addressed the problems associated with the delivery of customized and safety-related information to the users. We introduce an...
Article
Full-text available
In the most severe COVID-19 cases, often the cytokine molecules produced by the immune system to fight off coronavirus infection become hyperactive. This leads to “cytokine storm", which is a serious adverse medical condition causing multiple organ failures. In this work, we propose a system model that captures the transmission of cytokines from th...
Article
One of the primary requirements in cellular-enabled multi-UAV Internet of Things (IoT) networks is to preserve data rates according to the IoT users’ (IUs) requirements. The mobility of IUs, 3D movement of UAVs, environmental conditions, and bandwidth allocation to the IUs increase the challenges to maintain the data rates due to the continual chan...
Article
In this paper, we propose a scheme, named P-VERSE, to prioritize the emergency vehicles in the absence of a traffic signal at a multiway intersection point on a road. We consider the emergency vehicles, such as ambulance, fire trucks, or police vehicles, as prioritized vehicles and provide them safe and quick passage. The traffic signal is a tradit...
Article
This paper proposes Coalitional Game-Based Broadcast Proxy Re-encryption in IoT a broadcast proxy re-encryption for adding new IoT devices. The proxy re-encryption is extended to broadcast proxy re-encryption to prevent re-calculation of the re-encryption key. However, the group of recipients needs to be pre-determined before the calculation of the...
Article
Full-text available
COVID-19-induced cytokine storm, which is formed due to the excessive secretion of cytokine molecules, causes multi-organ damage and subsequently, the death of COVID-19 patients. Mesenchymal Stem Cells (MSCs) are regarded as cellular vaccines to combat the hyper-inflammatory response to cytokine storms. However, determining the required dose of MSC...
Article
Mesenchymal stem cell (MSC)-derived exosomes are recognized as an unparalleled therapy for tissue damage rendered by COVID-19 infection and subsequent hyper-inflammatory immune response. However, the natural targeting mechanism of exosomes is challenging to detect the damaged tissue over long diffusion distances efficiently. The coordinated movemen...
Article
In social IoMT systems, resource-constrained devices face the challenges of limited computation, bandwidth, and privacy in the deployment of deep learning models. Federated learning (FL) is one of the solutions to user privacy and provides distributed training among several local devices. In addition, it reduces the computation and bandwidth of tra...
Article
Full-text available
In this paper, we propose and implement i-AVR, an Internet of Things (IoT)-based critical-aware system for point-of-care recommendation during ambulatory in-transits. The delay due to ambulances stuck in traffic congestion, disruptive roadways, and far-away hospitals restrain the smooth ambulance services. Therefore, in order to assist the time-cri...
Article
Full-text available
In this work, we propose a condition-aware analytical framework—KEdge—for health condition recommendation in Internet of Things (IoT) based mobile healthcare systems. Procuring data from multiple sensors and making a singular assessment from them is a challenging task. KEdge overcomes such an issue by determining the severity of the patient by dete...
Article
Full-text available
In this work, we propose phSDN, a programmable healthcare network architecture for resource-tailored management and on-demand allocation of analytic modules in Internet of Things (IoT) healthcare system. The identification, dynamic management of services, and fast analysis of healthcare data are a few challenges in existing remote healthcare monito...
Article
Full-text available
LoRa technology endows unprecedented ability to connect isolated geographical landscapes and build community networks that serve specific purposes. As the network grows, coherent routing of messages becomes imperative to meet the network’s objectives and Quality of Service (QoS) requirements. However, despite the recent rise in research and develop...
Article
Full-text available
The severe COVID-19 infection often leads to “Cytokine Release Syndrome (CRS)”, which is a serious adverse medical condition causing multiple organ failures. Anti-cytokine therapy has shown promising results for the treatment of the CRS. As part of the anti-cytokine therapy, the immuno-suppressants or anti-inflammatory drugs are infused to block th...
Article
In this work, we propose a reconfigurable blockchain (BC) – “PerBlocks” – for handling data from heterogeneous activities and achieving scalability as well as throughput in the industrial environment. Typically, industries deal with pervasive deployment of various sensors, resulting in heterogeneous data with varying services. The adoption of conve...
Article
In this paper, an end-to-end pricing mechanism, termed as Co-Safe, is proposed to gratify the sensor and vehicle owners (VOs) as well as the Safety Service Providers (SSPs) for the Safety-as-a-Service (Safe-aaS) platform. Safe-aaS platform delivers safety-linked decisions to the customers/users, based on their requirement. Practically, the service...
Article
In this research work, we propose – UtilityChain –, a method for efficient resource allocation of miners involved in both mining and service-related activities. The aim of this approach is to enhance the miner's utility ( overall efficiency) in response to the increasing need for real-time data processing generated by IoT devices. The security of t...
Article
A new scheme, Sustainability in Dominating Set (SID), to construct and maintain a sustainable and adaptive node disjoint weighted connected dominating set (CDS) is presented for solar energy harvesting-enabled Internet of Things (IoT) networks. The primary contribution of this work is the design of an approximation algorithm for CDS construction an...
Article
Full-text available
In this paper, we present FedServ, a federated task service system for fog-enabled Internet of vehicles (IoV), using which we aim to minimize the delay of vehicle task service. FedServ considers different task service requirements such as delay, computation-intensiveness, processing units required, and energy consumption. The existing literature ma...
Article
Internet-of-Things (IoT) systems generate massive data, but not all of them provide valuable information about an oddity in the monitored environment. Also, not all sensors in an IoT application require a constant operation, especially, in gently fluctuating environments. Hence, extensive bandwidth and power get wasted. As a result of the power was...
Article
Full-text available
In this work, we present a solution toward facilitating dynamic encryption schemes—Constrained Encryption as a Service (CEaaS)—in fog-enabled IoT environments. CEaaS is a two-level fuzzy inference system (FIS) in the fog layer which offers customized encryption algorithm decisions to the IoT user devices based on the current configuration, data siz...
Article
Full-text available
In this paper, we present a traffic engineering scheme for sustainable hybrid Software-Defined Networks (SDN) to reduce the overall energy consumption of the network and increase the amount of programmable traffic. Hybrid SDN involves both legacy and SDN switches because of the migration from a legacy network to an SDN. The primary reason for this...
Article
In this paper, we propose an intelligent information management scheme – I2M – an two level delay-tolerant profile matching scheme for provisioning Internet-of-Everything (IoE) services in a Society 5.0. The primary aim of Society 5.0 is to provide seamless real-time IoE services using artificial intelligence (AI) and next-generation networks (NGNs...
Article
In this work, we propose MobiTrust, a game theoretic pricing scheme, to address the problem of ensuring trust in the edge-enabled mobile sensor-cloud (MSC) architecture for vehicular Internet-of-Things (IoT). In the edge-enabled MSC, a sensor-cloud service provider (SCSP) utilises multiple sensor-equipped vehicular IoT-based devices belonging to di...
Article
In this paper, we propose a smart bedsheet –i-Sheet– for remotely monitoring the health of the COVID-19 patients. Typically, real-time health monitoring is very crucial for COVID-19 patients to prevent their health from deteriorating. Conventional healthcare monitoring systems are manual and require patient input to start monitoring health. However...
Article
In this paper, we propose a differential pricing scheme, named as Diff-Price , to deliver customized safety services to the users at an optimal price and maximizing the profit of Safety Service Provider (SSP) using the Safety-as-a-Service (Safe-aaS) platform. None of the existing pricing schemes addresses the dynamic variation of price as the typ...
Article
In this work, we propose two lightweight access point (AP) localization and selection schemes, AP-Cov and improved AP-Cov (IAP-Cov), in IEEE 802.11-enabled IoT networks for reducing handover delay and maintaining uninterrupted connectivity during movement. The proposed scheme AP-Cov consists of two phases—the localization of APs and a priori sele...
Article
In this article, we propose a dynamic decision caching mechanism (D2C), for provisioning customized safety-related decision to the end users. The end users may be vehicle owners, drivers, or any government organization. Typically, in a safety-as-a-service (Safe-aaS), these end users select certain parameters from the web portal. Based on these sele...
Article
The resource constrained nature of IoT devices set about task offloading over the Internet for robust processing}. However, this increases the Turnaround Time (TAT) of the IoT services. High TATs may cause catastrophe in time-sensitive environments such as chemical and steel industries, vehicular networks, healthcare, and others. Moreover, the unre...
Article
Full-text available
To meet the demands of new healthcare applications with high computation complexity, multi-access edge computing (MEC) is emerging as a key component of modern healthcare systems which provides rich computing services to the users. With the increase in the number of wireless body area network (WBAN) users requesting computing services, the computat...
Article
Full-text available
In this work, we propose SemBox -- Semantic interoperability in a Box, to enable wireless on-the-go communication between heterogeneous wearable health monitoring devices. It can connect wirelessly to the health monitoring devices and receive their data packets. It uses a Mamdani-based fuzzy inference system with data pre-processing to classify the...
Article
Full-text available
IoT deployments that have limited memories lack sustained computation power and have limited connectivity to the Internet due to intermittent last-mile connectivity, particularly in rural and remote locations. For maintaining congestion-free operations, most of the collected data from these networks are discarded, instead of being transmitted remot...
Article
High propagation delay, high error probability, floating node mobility, and low data-rate, are the key challenges for Underwater Wireless Multimedia Sensor Networks (UMWSNs). In this paper, we propose RL-MAC, a Reinforcement Learning (RL)-based Medium Access Control (MAC) protocol for multimedia sensing in an Underwater Acoustic Network (UAN) envir...
Conference Paper
Full-text available
A social fog-IoV network involves time-critical tasks because it is highly dynamic due to rapid changes in the network topology. Therefore, completing tasks within the allowable delay is a challenge for social fog-IoV networks. In this context, we present a latency-aware task offloading scheme, named LOAN, in a fog-enabled association-free social I...
Article
This paper introduces an architecture – B2H – to enable a delay-tolerant public blockchain network (PBCN) in healthcare systems for Society 5.0. Healthcare systems in Society 5.0 envision an abstract paradigm that provides beyond health monitoring services to all the citizens of the society. These services include healthcare medical supply chain, c...
Chapter
In this work, the problem of unbalanced data traffic in the presence of heterogeneous Internet of things (IoT) applications in software-defined data center networks (DCNs) is studied. In the existing literature, the presence of heterogeneous flows and switches and mobile IoT devices in software-defined DCN are not considered. Due to heterogeneity,...
Article
One of the crucial challenges in networked Unmanned Aerial Vehicles (UAVs) is to configure them to serve as aerial base stations (BSs) for collecting data from distributed Internet of Things (IoT) devices in a region devoid of backbone connectivity. To address this challenge, it is required to compute optimized trajectories of UAVs to collect data...
Article
Full-text available
This paper addresses the energy-aware controller placement problem (CPP) in Software-Defined Networking (SDN), considering the Internet of Things (IoT) flows. CPP involves partitioning the network into multiple subsets of switches with a single controller assigned to each subset. On the other hand, an energy-aware CPP reduces the energy consumption...
Article
In this article, we propose a reliable and efficient medium access control (MAC) protocol, RE-MAC, for resource-constraint underwater acoustic multimedia communication systems. RE-MAC achieves scalability by utilizing a hybrid MAC protocol smartly, which takes advantage of contention, reservation, and null data packet (NDP) based channel access mec...
Article
Full-text available
Industrial Internet of Things (IIoT) aims to achieve higher operational and management efficiencies by bridging machinery, equipment, human resources, and all other actors involved in an industrial environment. This bridging enables data flow over an often complex and heterogeneous communication network. It enables timely decision-making, which aff...
Article
Internet of Bio-Nano Things-based molecular communication system in nanonetworks is deemed critical for various applications in futuristic health care technologies. In this work, we envisage a new research direction and coin the term—“BioBlock”—a blockchain-inspired nanonetworking security mechanism since the existing macro-scale security solutions...
Article
In this work, we propose Shadows , a virtual blockchain (VC) for achieving parallel consensus and efficient management of data in industries by utilizing BC. Typically, industrial processes involve heterogeneous activities which require real-time consensus, managed execution, isolation, data sharing, accelerated computation, and efficient utiliza...
Article
This work addresses the problem of optimal resource allocation for federated learning (FL) over wireless edge-networks to maximize the quality of Industrial Internet of Things (IIoT)-based services in terms of delay and revenue. The resource-constrained nature of IIoT devices necessitates the efficient utilization of their computation and communica...
Article
Storing data from Industrial Internet of Things (IIoT) sensors in blockchain (BC) for monitoring the applications leads to management issues like bloating. The crux of this work is generating traces (the part of industrial data) using an ARIMA model and storing only the metadata over the network, resulting in reduced delay and managed data. We dete...
Article
The deployment of software-defined wireless local area networks (SDWLANs) in hostile regions requires solar energy harvesting-enabled battery-powered access points (APs). The aforementioned APs replenish batteries and forward data flows by avoiding the problem of frequent energy outages. In this work, we propose a scheme called SeamFlow to place...
Article
This work presents an efficient data-centric client selection approach, named DICE, to enable federated learning (FL) over distributed edge networks. Prior research focused on assessing the computation and communication ability of the client devices for selection in FL. On-device data quality, in terms of data volume and heterogeneity, across these...
Article
The allocation of services from the cloud to edge servers in the Industrial Internet of Things (IIoT) emerges as a promising solution for providing time-critical services by shifting computation near sensor nodes while improving the energy cost of the cloud servers and energy consumption of sensor nodes. However, allocation of services faces challe...
Article
This work addresses the problem of optimal resource allocation for provisioning green Sensor-as-a-Service (Se-aaS) in the presence of multiple sensor-cloud service providers (SCSPs) and vehicle owners (VOs) having heterogeneous sensors. To ensure high service availability, low carbon footprint, and optimal profit distribution, optimal usage of the...
Article
The emergence of new applications, such as online gaming and virtual reality, necessitates the underlying network capable of fulfilling high bandwidth and low latency requirements. The software-defined multipath routing is a viable approach to fulfill such quality-of-service (QoS) requirements by improving the data delivery performance through mult...
Article
In this work, we propose Timed Loop Gears (TLG), as a distributed method for enabling fragmented learning in Resource-Constrained networked IoT edge devices. TLG identifies atomic operations (gears), such as feed-forward and back-propagation, necessary for training Machine Learning (ML) models. Each of these gears executes on a Fog Node (FN) excl...
Article
Industrial Internet of Things (IIoT) and its applications have seen a paradigm shift since the advent of artificial intelligence and machine learning. However, these methods are mostly data-centric and lack flexibility. Brain-Computer Interface (BCI) is envisioned as an efficient solution that may overcome the shortcomings of data-centric technique...
Article
Full-text available
We propose the adaptation of vibration-based condition monitoring systems and techniques, popularly used in industrial condition-based maintenance, for identifying the possibility of compromising the privacy of personal computing systems. This work exploits the automated fan-based heat dissipation features and read/write operations of disk-based st...
Article
The next-generation cyber-physical systems (CPS) with heterogeneous applications have diverse quality-of-service (QoS) requirements in terms of throughput, end-to-end latency, and packet drop reliability. To meet such diverse QoS requirements, in this paper, we propose a QoS-aware traffic forwarding scheme in software-defined CPS. The proposed sche...
Article
Full-text available
The recent advances in Internet-of-Things (IoT)-based healthcare systems pave the path for the development of body-to-body network (BBN), wherein a group of wireless body area network (WBAN) users collaborate and share their individual resources. Since these WBAN users have individual decision-making capabilities and are self-centric in nature, the...
Article
Robust and reliable communication systems, whether based on Electro-Magnetic (EM) waves or light, fail to perform under water due to very high attenuation and changing visibility conditions. The present generation of systems designed for underwater communications relies mostly on acoustic waves, typically in the ultrasonic frequency range. In this...
Conference Paper
This paper introduces a scheme for autonomous service exchange among multiple sensor-cloud service providers (SCSPs) in a sensor-cloud (SC) platform for Internet of Things (IoT) applications. Typically, SC offers Sensors-as-a-Service (SeaaS) using the concept of sensor virtualization for serving different IoT applications seamlessly in real-time. O...
Article
Full-text available
In this article, we propose Fido, a fuzzy-based string comparison method for extracting content from data lakes in a camera-based Internet of Drones (IoD) environment. Data lakes support data dumping in their native format, which makes them suitable for real-time deployments such as IoD. However, parsing through these unstructured databases has its...
Article
In this paper, we propose a Quality of Service (QoS)-aware pricing scheme, termed as Q-Safe, for provisioning safety-related decisions to the end-users. A Safe-aaS platform provides customized decisions to the end-users, as per their requirement. In this proposed pricing scheme, we consider the presence of multiple Safety Service Providers (SSPs) i...
Article
Full-text available
In this paper, we propose a dynamic consensus-based blockchain system -A-Blocks -for efficiently managing the data produced by the sensors in an Industrial Internet of Things (IIoT) environment. Typically, industries deal with a heterogeneous set of data from a diverse range of sensors. Conventional blockchain adoptions are a popular choice in such...
Article
Full-text available
This article addresses the joint switch and controller placement problem in a hybrid software-defined network (SDN), which is an intermediate step of transforming a traditional backbone network into a pure SDN. For a hybrid SDN, the quality of service (QoS) is a primary concern for ensuring service guarantee of a traditional network, while providin...
Article
Full-text available
In this paper, we propose and design AuGrid, an LSTM-based model for geographically aware smart grid service providers, which predicts the hourly load requests from users. We also develop a pricing model which depends on the predictions obtained from AuGrid for deciding per unit cost of energy in contrast to the existing schemes that focused solely...
Article
Full-text available
The body-to-body network (BBN), which enables a group of wireless body area network (WBAN) users to collaborate and share their individual network resources, has emerged as a promised technology for the Internet of things (IoT)-based healthcare system. In BBN, WBAN users with good Internet connectivity act as gateway users and help their nearby WBA...
Article
Full-text available
In this paper, we study a body-to-body network (BBN) framework, which enables wireless body area network (WBAN) users located in close proximity to cooperate and share their network resources to improve the overall network performance. Our main aim is to design a distributed resource allocation mechanism that encourages each participating WBAN user...
Article
This paper explores the concept of AI-based Communication-as-a-Service (ACUTE) to reduce transmission delay and energy consumption, while transmitting data from end-devices to the cloud in the context of 5.0. 5.0 revolutionizes connected living with the help of a unified system that provides fully automated and end-to-end services, while addressing...
Article
Full-text available
In this paper, we propose a microservices and deep learning-based scheme, termed as Micro-Safe, for provisioning Safety-as-a-Service (Safe-aaS) in a 6G environment. A Safe-aaS infrastructure provides customized safety-related decisions dynamically to the registered end-users. As the decisions are time-sensitive in nature, the generation of these de...
Article
Software-defined IoT (SDIoT) is a promising approach to address the requirements of the Internet of Things (IoT), such as network management, Quality of Service (QoS), and resource utilization. The advantages of SDIoT are facilitated by the separation of the data- and the control-planes using flow-rules , that allow fine-grained control over indi...
Article
Internet of Things (IoT) is a network of heterogeneous physical devices connected over the Internet. Each of the devices is capable of collecting and processing data. Due to the connection with the Internet, the IoT devices become more susceptible to attacks by malicious nodes, which may result in privacy loss and security breaches. Thus, network s...
Article
In this work, we propose SEGA, a secured edge gateway microservices architecture for Industrial IoT-based monitoring of machines in industries. SEGA allows for the secured collection, transmission, and temporary storage of data within the edge network. A KNN-based analytics module hosted on the edge gateway processes time-sensitive machine monitori...
Article
Full-text available
Due to the lack of unified standards in the Internet of Things (IoT), heterogeneity in terms of protocol and packet types exist. In such a case, accurate traffic identification using port-based and payload-based solutions are not suitable for flow processing in Software-Defined IoT (SD-IoT). In this article, we propose iAcceSD , an intelligent Ac...
Article
An enormous amount of data processing occurs at the cloud and edge to carry out different kinds of analytics in Industrial Internet of Things (IIoT). To deal with the analytics using such a huge amount of IIoT data, different Deep Learning (DL)-based analytical models are deployed. The learning process in an analytical model needs to follow a relia...
Article
This paper introduces the concept of context-aware attribute learning with cipher policy-attribute based encryption (CP-ABE) to preserve the privacy of users’ information in IoT-enabled 5.0. The concept of 5.0 pioneers an abstract system unifying different smart environments (SEs) to provide seamless services to the citizens. While serving differen...
Article
In this paper, we propose a dynamic load balancing scheme, EdgeSafe, for provisioning Safety-as-a-Service (Safe-aaS) (Roy et al., 2018). Typically, in a Safe-aaS infrastructure, the sensor nodes are either static or mobile in nature. With the variation in the geographical location of the vehicles, the sensor nodes attached to them attain mobility...
Article
In this work, we propose a dynamic decision query mapping mechanism, DQ-Map, for provisioning Safety-as-a-Service (Safe-aaS) (Roy et al. , 2018). A Safe-aaS infrastructure provides customized safety-related decisions simultaneously to multiple end-users. We consider road transportation as the application scenario of Safe-aaS and termed the safety...
Article
In this paper, we propose a Software-defined fog architecture, named as Soft-Health, to serve various IoT-based healthcare applications. The health conditions of the patients fluctuate over time. Further, specialized medical care may not always be available in all healthcare facilities. The use of Wireless Body Area Network (WBAN) for continuous pa...
Article
In this work, we propose Soft-Safe, a Software Defined Safety-as-a-Service (Safe-aaS) model for provisioning safety-related decisions to the registered end-users. In Safe-aaS, the end-users register to the infrastructure, provide their initial and destination location, select certain decision parameters, and make payment through a Web portal. As th...
Article
Traditionally, sensor networks are surmised to enhance safety in underground mines by providing consistent monitoring of the conditions. However, to cope with the frequent condition changes of such a hostile environment, we need a specific network architecture for the deployed nodes to enable dynamic decision making. In this article, we argue that...
Article
Full-text available
In this article, we propose a two-step distributed horizontal architecture for computation offloading in a fog-enabled Internet of Things environment—HD-Fog—to minimize the overall energy consumption, and latency while executing hard real-time applications. HD stands for the horizontal distribution of the tasks in the fog layer. Each sensor in the...
Article
Full-text available
In this paper, we propose a delay-aware Q-learning-based routing algorithm - XiA - for sending data from users to nearest Access Points (APs) through Unmanned Aerial Vehicle (UAV) swarms communicating using 6G technology. These UAVs assist the ground networks in overcoming communication voids while maneuvering through different demographics. Howeve...