Abraham O. Fapojuwo’s research while affiliated with University of Calgary and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (58)


A Federated Meta Learning-Based Secure Data Consolidation Scheme for Industrial AIoT Leveraging Drone
  • Article

September 2024

·

36 Reads

IEEE Transactions on Vehicular Technology

·

·

Abraham O. Fapojuwo

Amidst the technological revolution, the convergence of Industrial Artificial Intelligence of Things (Industrial AIoT) signifies a profound transformation in industrial operations. Nonetheless, persistent concerns revolve around data privacy, security, and connectivity challenges. Drones emerge as pivotal aids for Industrial AIoTs, particularly in areas with limited connectivity. While Federated Learning (FL) and Meta-Learning (ML) address data privacy and adaptability, challenges like data heterogeneity, scarcity, model positioning, unauthorized data tampering, and cyber threats endure. To tackle these issues, this paper presents a Federated Meta-Learning (FML)-based secure data consolidation scheme, utilizing drones for data consolidation, especially in remote, poorly connected regions, followed by secure blockchain storage. It incorporates an Information Gain Ratio (IGR)-based feature selection method to manage data diversity, a two-phase authentication system merging XOR filtering and Chronological Nonce Authentication for entity validation, and secure model consolidation using Hampel filters and performance checks to validate model updates. A real-world proof of concept demonstrates superior performance compared to state-of-the-art literature.




Fig. 1. 5G three main service categories.
Fig. 2. 5G and B5G service categories.
Fig. 7. Network Data Analytics Function (NWDAF) integration for smart cities services in B5G, enabling intelligent resource management and slicing capabilities.
A Survey on Beyond 5G Network Slicing for Smart Cities Applications
  • Article
  • Full-text available

January 2024

·

313 Reads

·

8 Citations

IEEE Communications Surveys & Tutorials

Beyond fifth generation (B5G) is expected to tremendously improve network capabilities by using a higher frequency band compared to 5G, capable of delivering higher network capacity with much lower latency. It is expected that there will be around 30 billion connected objects by 2030, approximately 3.5 times the population then which underscores the pressing need for advanced network capabilities to support diverse applications ranging from smart transportation and energy management to healthcare and public safety. Network slicing enables sharing of network resources by transforming the physical network into logically independent networks, each specifically tailored to meet the requirements of heterogeneous services (e.g., Internet of things applications, gaming services, holographic communication). Each slice is an end-to-end logical network comprising network, compute, and storage resources. Softwarization and virtualization are the main drivers for innovation in B5G, enabling network developers and operators to develop network-aware applications to match customer demands. Smart cities vertical offers unique service characteristics, performance requirements, and technical challenges in B5G network slicing. Therefore, this paper provides a comprehensive survey on B5G network slicing use cases, synergies, practical implementations and applications based on their quality of service parameters for smart cities applications. The paper gives a detailed taxonomy of the B5G network slicing framework requirements, design, dynamic intra-slice and inter-slice resource allocation techniques, management and orchestration, artificial intelligence/machine learning-empowered network slicing designs, implementation testbeds, 3GPP specifications and projects/standards for B5G network slicing. Furthermore, the paper provides a thorough discussion on the technical challenges that can arise when implementing B5G network slicing for smart cities applications and offers potential solutions. Finally, the paper discusses B5G network slicing current and future research directions for smart cities applications.

Download


Guest Editorial Complex Cyber-Multitudinal-Physical Systems: Analysis, Decision-Making, and AI Applications

September 2023

·

11 Reads

IEEE Journal on Emerging and Selected Topics in Circuits and Systems

This Special Issue of the IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS) is dedicated to disseminating the latest research results and practical applications on the analysis and decision-making of complex cyber-multitudinal-physical systems (CMPSs).



CALL for PAPERS-Special Issue IEEE EMERGING AND SELECTED TOPICS IN CIRCUITS AND SYSTEMS: Complex Cyber-Multitudinal-Physical Systems: Analysis, Decision-Making, and AI Applications

February 2023

·

110 Reads

IEEE JETCAS is a famous journal sponsored by the IEEE Circuits and Systems Society. For more information, please follow the link: https://ieeexplore.ieee.org/xpl/RecentIssue.jsp?punumber=5503868 To address the emerging challenges of modern complex systems and to promote the development of both novel classical and new AI-based research paradigms, we seek original papers with the latest research results and practical applications in the study of the analysis and decision-making of complex cyber-multitudinal-physical systems and the application of AI techniques. Topics of interest to this special issue include, but are not limited to: 1 Modeling and analysis of real-world complex cyber-multitudinal-physical systems, both bottom-up and top-down methodologies; 2 Control and decision-making strategies for real-world infrastructures in terms of complex cyber-multitudinal-physical systems; 3 Effects of coupling of heterogeneous multitudinal subsystems on system stability and operational robustness; 4 Novel stability and robustness assessment metrics and methods applicable to complex cyber-multitudinal-physical systems; 5 Applications of artificial intelligence techniques to stability improvement, robustness enhancement, and operational improvement of complex cyber-multitudinal-physical systems; 6 Applications of novel complex network-based analytical/control techniques to complex cyber-multitudinal-physical systems; 7 Novel applications in power grids, transportation systems, economics, social networks, communications networks, and other real-world complex connected systems.



Distributed Learning for 6G–IoT Networks: A Comprehensive Survey

June 2022

·

270 Reads

p>Smart services based on the Internet of Things (IoT) are likely to grow in popularity in the forthcoming years, necessitating the improvement of fifth-generation (5G) cellular networks upgrade of future networks from their present state. Despite the fact that the 5G cellular networks may manage a diversity of IoT services, they may not be able to fully meet the requirements of emerging smart applications due to their limitations that, in many cases, could be overcome by applying artificial intelligence (AI). Therefore, sixth–generation (6G) wireless technologies are being developed to address the limitations of 5G networks. Traditional machine learning (ML) techniques are driven in a centralized way. However, the huge volume of produced wireless data, the confidentiality concerns, and the growing computing competencies of wireless edge devices have led to the exposure of a promising solution in a decentralized way which is called distributed learning. This paper provides a comprehensive analysis of distributed learning (e.g., federated learning (FL), multi–agent reinforcement learning (MARL)–based FL framework) and how to deploy in an effective and efficient way for wireless networks. Moreover, we describe a timely comprehensive review of the role of FL in facilitating 6G enabling technologies, such as mobile edge computing, network slicing, satellite communications, terahertz links, blockchain, and semantic communications. Also, we identify and discuss several open research issues related to FL–empowered 6G wireless networks. In particular, we focus on FL for enabling an extensive range of smart services and applications. For each application, the main motivation for using FL along with the associated challenges and detailed examples for use scenarios are given. Regarding the AI techniques, we consider MARL–based FL framework tailored to the needs of future wireless networks for ensuring fast convergence and high model accuracy of large state and action spaces. Particularly, to manage the fast varying radio channels and limited radio resources (e.g., transmission power and radio spectrum) in a cellular communication environment, this article proposes a robust MARL–based FL framework to enable local users to perform distributed power allocation, mode selection, resource allocation, and interference management. Finally, the paper outlines several prospective upcoming research topics, aimed to create constructive incorporation of MARL–based FL framework for future wireless networks.</p


Citations (41)


... This customization is achieved through the allocation of dedicated network resources to ensure the necessary performance characteristics for each slice, in terms of bandwidth, latency, reliability, and security [4]- [6]. Quang A key challenge in network slicing is the problem of network slice embedding (NSE) [2], [3]. This involves mapping virtual network functions (VNFs) and their interconnections (called virtual links) onto the physical network infrastructure in an optimized manner. ...

Reference:

Network Slicing with Flexible VNF Order: A Branch-and-Bound Approach
A Survey on Beyond 5G Network Slicing for Smart Cities Applications

IEEE Communications Surveys & Tutorials

... They demonstrated a gain of OTFS-PAPR reduction up to 2.5 dB over the original OTFS signal with slight degradation in bit error rate (BER) performance. Also, an analysis of PAPR reduction techniques has been provided in [11] for adapted tone reservation (TR) in OTSM system performance. In [12], the PAPR is analyzed and minimized using the superimposed pilot scheme compared to conventional zero padded (ZP) pilot scheme. ...

Analysis of Adapted Tone Reservation PAPR Reduction Techniques in OTSM System
  • Citing Conference Paper
  • November 2023

... To tackle the issue of pilot contamination, researchers have proposed multiple approaches summarized in Table 1. Utilizing a weighted graph framework and implementing pilot contamination suppression techniques, several authors, such as those in [59][60][61], have effectively addressed the problem. Furthermore, authors in a study [62] proposed a distance-based pilot reassignment technique to address network congestion. ...

Suppressing Pilot Contamination for Massive Access in User-centric Cell-free Massive MIMO Systems
  • Citing Conference Paper
  • June 2022

... The UL policy includes a parameter for controlling a trade-off between average performance and fairness, while the DL policy employs two parameters for the same purpose. In [80], a power allocation scheme is proposed for the UL of a UE-centric CF mMIMO system, enhancing average SE and fairness performance while reducing UL transmission power. Lastly, in [81], two algorithms for DL MSR optimization based on weighted MMSE and fractional programming (FrP) are developed, along with a new FrP-based algorithm for MMF. ...

Uplink Power Allocation Scheme for User-Centric Cell-free Massive MIMO Systems
  • Citing Conference Paper
  • June 2022

... Starting the system with the Digital Signature System is the last target that can be performed when the secret key is too short, but the challenge-response protocol can eradicate it. The attack that can be caused by the vulnerability above is the Relay attack [180]. ...

Secrecy Outage Probability and Secrecy Capacity for Autonomous Driving in a Cascaded Rayleigh Fading Environment
  • Citing Conference Paper
  • September 2021

... Additionally, recent studies [42], [43] have also focused on the implementation of adaptive and directional antennas to optimize signal propagation and reception in full-duplex environments. Furthermore, the authors in [44], [45] have also focused on enhancing the energy efficiency of full-duplex backscatter systems by exploring energy-harvesting mechanisms. These approaches enable continuous, self-sustained operation, significantly reducing the reliance on frequent battery replacements. ...

Maximizing Secondary Users’ Sum-Throughput in an In-Band Full-Duplex Cognitive Wireless Powered Backscatter Communication Network
  • Citing Article
  • November 2021

IEEE Systems Journal

... We analyze the average achievable secrecy rate of mmWave communication networks. Based on Equation (9) and [38][39][40], the average secrecy rate can be lower bounded by the following: ...

Achievable secrecy rate analysis in mmWave ad hoc networks with multi‐array antenna transmission and artificial noise

... Strategies aimed at minimizing the impact of pilot contamination in CF-mMIMO networks through power control and pilot assignment have been proposed recently [26]- [30]. In both [27], [28], a preliminary phase during which a generic user equipment (UE) is associated with a subset of available APs, is followed by a practical strategy to assign orthogonal pilots to UEs aiming at reducing the mutual interference and improving the spectral efficiency. Conversely, the authors in [29] assume that all APs receive the signals of all UEs and develop a scalable and distributed pilot assignment mechanism via multi-agent reinforcement learning. ...

Granting Massive Access by Adaptive Pilot Assignment Scheme for Scalable Cell-free Massive MIMO Systems
  • Citing Conference Paper
  • April 2021

... Since both the mmWave and µWave have their own benefits, mmWave and µWave cellular networks are anticipated to coexist within cellular networks. In [22], a heterogeneous network (Het-Net) environment containing both the mmWave and µWave SBSs is considered. The authors maximized data access via cache resources and network success probability considering the data popularity profile and data sizes. ...

Popularity and Size-Aware Caching With Cooperative Transmission in Hybrid Microwave/ Millimeter Wave Heterogeneous Networks
  • Citing Article
  • March 2021

IEEE Transactions on Communications

... In general, security in the cache can be considered from different perspectives; for example, denial of service and jamming may disrupt the cache system performance and compromise the quality of service [27][28][29][30][31][32][33][34][35]. It is also essential to provide a service of secrecy and confidentiality to protect against eavesdropping [9][10][11][12][13][14] and to ensure data integrity in the presence of attacks like content tampering [15][16][17][18][19][20]. In addition, in highly decentralized systems such as Device-to-Device (D2D) communications, it is vital to combat selfish behavior and to encourage the participation of the users in the caching process to reap the benefits of the network edge caching [21][22][23][24][25][26]. ...

Secrecy Rate Performance of Cache-enabled Millimeter Wave Cellular Networks
  • Citing Conference Paper
  • November 2020