Sherali Zeadally's research while affiliated with University of Kentucky and other places

Publications (554)

Article
Unmanned aerial vehicles (UAVs) are considered for disaster management to provide better coverage or help first responders provide advanced services. Furthermore, UAVs combined with mobile edge computing (MEC) capabilities, have recently emerged as a support for cloud computing by deploying UAV-assisted MEC at the network edge to reduce the latency...
Article
Sensing technology has long been an integral part of modern developments that have brought several benefits to various domains ranging from civil and military to commercial and healthcare applications. However, the sensor’s inadequate energy is the primary concern that affects their long-term sustainable operations and remote location deployment. T...
Article
The main challenges in sixth-generation (6G) communication networks are connection reliability, low transmission latency, massive low-powered connectivity, and ultra-high capacity. Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency...
Article
In recent years, we have witnessed growing interest in using deep learning to detect misinformation. This increased attention is being driven by deep learning technologies’ ability to accurately detect this misinformation. However, there is a diverse array of content that can be considered misinformation, such as fake news and satire. Similarly, in...
Article
The COVID-19 pandemic has exposed many organizational vulnerabilities to cyber threats, with ransomware being at the top of the list. These can be attributed mainly to consolidated accessibility as organizational vision to enable remote connectivity to their digital resources for maintaining uninterrupted and safe business operations. During the pe...
Article
The recent pandemic of COVID-19 has proven to be a test case for Unmanned Aerial Vehicles (UAVs). UAVs have shown great potential for plenty of applications in the face of this pandemic, but their scope of applications becomes limited due to the dependency on ground pilots. Irrespective of the application, it is imperative to have an autonomous pat...
Article
Full-text available
A wireless sensor network (WSN) is a network of tiny sensors deployed to collect data. These sensors are powered with batteries that have limited power. Recharging and/or replacement of these batteries, however, are not always feasible. Over the past few years, WSN applications are being deployed in diverse fields such as military, manufacturing, h...
Preprint
Full-text available
Imagine stepping into a virtual world that's as rich, dynamic, and interactive as our physical one. This is the promise of the Metaverse, and it's being brought to life by the transformative power of Generative Artificial Intelligence (AI). This paper offers a comprehensive exploration of how generative AI technologies are shaping the Metaverse, tr...
Article
Full-text available
Software application development is a complex activity which involves various actors and organizations in what is called the software supply chain. The evolution of the software supply chain led to numerous benefits such as profit maximization, code mutualization, and the optimization of lead times. However, the complexity of the software supply ch...
Article
Space–air–ground–sea integrated (SAGSI) networks are envisioned to connect satellite, aerial, ground, and sea networks to provide connectivity everywhere and all the time in sixth-generation (6G) networks. However, the success of SAGSI networks is constrained by several challenges including resource optimization when the users have diverse requirem...
Article
In a Distributed Denial of Service (DDoS) attack, a network of compromised devices is used to overwhelm a target with a flood of requests, making it unable to serve legitimate requests. The detection of these attacks is a challenging issue in cybersecurity, which has been addressed using Machine Learning (ML) and Deep Learning (DL) algorithms. Alth...
Article
Full-text available
The rapid growth of Information Communication Technologies (ICT) has impacted many ields. In this context, the supply chain has also quickly evolved toward the digital supply chain where digital and electronic technologies have been integrated into every aspect of its end-to-end process. This evolution provides numerous beneits such as proit maximi...
Preprint
Full-text available
Semantic communication is a new paradigm that exploits deep learning models to enable end-to-end communications processes, and recent studies have shown that it can achieve better noise resiliency compared with traditional communication schemes in a low signal-to-noise (SNR) regime. To achieve multiple access in semantic communication, we propose a...
Article
Full-text available
Non Fungible Tokens (NFTs) are among the most promising technologies that have emerged in recent years. NFTs enable the efficient verification and ownership management of digital assets and therefore, offer the means to secure them. NFT is similar to blockchain that was first used by the cryptocurrency and then by numerous other technologies. At fi...
Article
Metaverse is an evolving paradigm for the next-generation Internet, intends to provide 3D immersive experiences and self–sustaining virtual shared space by utilising a wide range of relevant technologies. Due to rapid advancement in technologies such as augmented reality (AR), mixed reality and virtual reality (VR) in real-time applications, metave...
Article
Edge computing is a commonly used paradigm for providing low-latency computation services by locally deploying computation and storage resources close to the user equipments (UEs). Since the computation resource demand of the offloaded tasks of a UE is naturally a random variable, it is possible that the real-time computation capacity demand of a r...
Article
Semantic communication is a new paradigm that exploits deep learning models to enable end-to-end (E2E) communications processes, and recent studies have shown that it can achieve better noise resiliency compared with traditional communication schemes in a low signal-to-noise (SNR) regime. To achieve multiple access in semantic communication, we pro...
Article
Consumer electronics can support sixth-generation (6G) systems and their services, including ultra-reliable and low-latency communications (URLLC). In this context, unmanned aerial vehicles (UAVs) have become increasingly popular because they can: be dynamically positioned, take advantage of channel gains, and communicate directly via line-of-sight...
Article
More than 6 billion smartphones available worldwide can enable governments and public health organizations to develop apps to manage global pandemics. However, hackers can take advantage of this opportunity to target the public in nefarious ways through malware disguised as pandemics-related apps. A recent analysis conducted during the COVID-19 pan...
Article
Recent years have witnessed an increase in human life expectancy fueled by significant improvements in infrastructure, healthcare, and economies across the globe. Longer life spans have altered the world demographics resulting in a larger senior population compared with previous years. This trend has created the need for providing additional care a...
Article
Full-text available
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Article
In recent years, the introduction of new technologies and applications connected to the Internet has demonstrated the physical incapacity of current optical backbone networks in providing resources soon. One of the main proposals to deal with this problem today is space-division multiplexing elastic optical networks. However, to transport the massi...
Article
Cybersecurity has benefitted from Artificial Intelligence (AI) technologies for attack detection. However, recent advances in AI techniques, in tandem with their misuse, have outpaced parallel advancements in cyberattack classification methods that have been achieved through academic and industry-led efforts. We describe the shift in the evolution...
Article
Vehicular communication is one of the essential technologies for increasing road safety, traffic efficiency, and comfort for pedestrians and drivers. In this context, the internet of vehicles is an emerging paradigm. However, with advances in vehicular communication, security threats have also emerged. Several vulnerabilities exist in vehicular com...
Preprint
Autonomous cars have become increasingly popular in the last decade because of their numerous benefits, such as lower travel time, increased safety, and improved fuel economy. Many car manufacturing companies and tech giants are working on this technology to make fully autonomous automobiles or strengthen their existing driver-less cars. These cars...
Preprint
Full-text available
Reconfigurable meta-surfaces are emerging as a novel and revolutionizing technology to enable intelligent wireless environments. Due to the low cost, improved efficiency, and passive nature of reflecting elements, it is becoming possible to program and control the wireless environment. Since wireless physical layer technologies can generally adapt...
Article
Full-text available
In the context of current smart cities, Cooperative Intelligent Transportation Systems (C-ITS) represent one of the main use case scenarios that aim to improve peoples’ daily lives. Thus, during the last few years, numerous standards have been adopted to regulate such networks. Within a C-ITS, a large number of messages are exchanged continuously i...
Article
Smart agriculture integrates key information communication technologies with sensing technologies to provide effective and cost-efficient agricultural services. Smart agriculture leverages a wide range of advanced technologies, such as wireless sensor networks, Internet of things, robotics, agricultural bots, drones, artificial intelligence, and cl...
Article
Classical edge computing algorithms assume that the execution time is always known in resource allocation. However, in practice, the execution time in the edge server is hard to estimate due to the complex environment, especially in Internet of Vehicles (IoV), which makes resource allocation a significant challenge. To address this problem, we prop...
Article
We investigate how to provide Quality-of-Service (QoS) for diversified video flows. We design a fine-grained video traffic control mechanism that integrates traffic classification with path selection for video flows within the framework of SDN. For the design, we present a category-theoretic ontology log (olog) diagram model, which provides a novel...
Article
In the context of new emerging infectious diseases, it is more secure for old patients to be confined to their homes while still having medical assistance. Most existing facilities use Radio Frequency (RF) devices to monitor and measure vital signs of a patient and send them to appropriate medical services. But this technology can have bad side eff...
Article
Recently, the Internet of things (IoT) paradigm has proliferated all aspect of life. The improvements IoT has made in business and industry has raised the possibility of extending its use to underwater environments, which also impacts human life. Consequently, Internet of Underwater Things (IoUT) research is intensifying. As in IoT, to deploy a suc...
Article
In the study, we propose a double blockchain based vehicular system for optimizing data storage and securing communication in Internet of Vehicles (IoV) networks. We propose an incentive mechanism and a reputation system to reduce the selfish and distrustful behavior of IoV nodes. Moreover, we propose an encryption technique to protect the proposed...
Conference Paper
Full-text available
Wearables today play a key role in E-Health computing , with investments expected to exceed $70 billion by 2024. With the massive use of apps on wearable devices, it is crucial to improve safety when using wearables, considering that important information about user information is stored on these devices. We present SOMEONE ensemble learning, a set...
Article
Conventional data collection methods that use Wireless Sensor Networks (WSNs) suffer from disadvantages such as deployment location limitation, geographical distance, as well as high construction and deployment costs of WSNs. Recently, various efforts have been promoting mobile crowd-sensing (such as a community with people using mobile devices) as...
Article
Full-text available
Unmanned Aerial Vehicles (UAVs) have seen a significant increase in their commercial application because of various technological breakthroughs. As UAVs are typically used in open environments for purposes such as military applications, surveillance, and delivery of commodities, they rely primarily on the visual signals recorded by the flying UAV....
Article
Full-text available
Cellular vehicle-to-everything (V2X) communication is emerging as a feasible and cost-effective solution to support applications such as vehicle platooning, blind spot detection, parking assistance, and traffic management. To support these features, an increasing number of sensors are being deployed along the road in the form of roadside objects. H...
Article
Excessive speed is the leading cause of accidents on highways. The use of fixed road-side surveillance systems has proven ineffective because people take caution around only those locations. With more advanced technologies and exceptional manoeuvring capabilities, Unmanned Aerial Vehicles (UAVs) is a promising candidate for real-time monitoring of...
Article
Full-text available
Over the last few years, the explosive growth of Internet of Things (IoT) has revolutionized the way we live and interact with each other as well as with various types of systems and devices which form part of the Information Communication Technology (ICT) infrastructure. IoT is having a significant impact on various application domains including h...
Preprint
Digital twins, being the virtual replicas of their physical counterparts, share the expected functional requirements and operational behavior of the underlying systems. Due to this fact, digital twins may act as a potential source of data breaches. Attackers may exploit the valuable knowledge about the system accessible through digital twins to put...
Preprint
Full-text available
There is an urgent need to control global warming caused by humans to achieve a sustainable future. $CO_2$ levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The...
Article
Full-text available
There is an urgent need to control global warming caused by humans to achieve a sustainable future. CO 2 levels are rising steadily and while countries worldwide are actively moving toward the sustainability goals proposed during the Paris Agreement in 2015, we are still a long way to go from achieving a sustainable mode of global operation. The in...
Article
The advent of Blockchain and smart contracts is empowering many technologies and systems to automate commerce and facilitate the exchange, tracking and the provision of goods, data and services in a reliable and auditable way. Crowdsensing systems is one type of systems that have been receiving a lot of attention in the past few years. In crowdsens...
Article
Full-text available
The introduction of sensor technology in our daily lives has brought comfort, convenience, and improved health over the past few decades. Technological advances further expanded the use of medical sensors by reducing their size and costs. Medical sensors improve the intelligence and capabilities of healthcare services including, remote health monit...
Article
Full-text available
Long Range Wide Area Network (LoRaWAN) emerges to connect devices that require long-range and low-cost (bandwidth and power) communication services. In this context, the adoption of this technology brings new challenges due to the densification of IoT devices, which causes signal interference and affects the QoS directly. On the other hand, the LoR...
Article
Full-text available
Edge computing is a recent trend wherein a (large) number of Internet of Things (IoT) devices are being connected to the cloud via edge devices. Although edge devices generally have (slightly) more computing power than IoT devices, several strategies can help to improve performance and reduce energy consumption. The key research challenge here is h...
Article
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Article
As the amount of data generated by scaled systems in Electronic Medical Records (EMRs) and the Industrial Internet of Things (IIoT) keeps increasing, third-party servers are essential for data storage and manipulation, and with them come privacy concerns. Encrypting the uploaded data strips the server’s ability to search over it for keywords: a hig...
Article
Wireless Sensor Network (WSN) plays a vital role in dealing with the challenging tasks of information management in Intelligent Transportation Systems (ITS). Current research has shown that the ever growing number of vehicles on the roads is making congestion worse, and many safety concerns are being addressed comprehensively by the WSN-based ITS....
Article
The path towards next-generation IoT is fundamentally characterized by artificial intelligence-based sensors. However, there are still some open issues, such as efficiency, accuracy, privacy, data trustworthiness, quality etc., that need to be addressed. Therefore, this special issue aims to solicit original papers to solve these issues. Finally, s...
Article
Full-text available
Over the years, software applications have captured a big market ranging from smart devices (smartphones, smart wearable devices) to enterprise resource management including Enterprise Resource Planning, office applications, and the entertainment industry (video games and graphics design applications). Protecting the copyright of software applicati...
Article
Full-text available
Software defined networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real time. SDN control plane enables innovation, and greatly s...
Article
Insecure cloud-native applications (CNAs) will continue to experience security compromises including data breaches due to their dynamic, complex, and varied threat landscape. We review current application security techniques, examine their benefits and shortcomings in the context of CNAs, and point out future research opportunities.
Article
Full-text available
Wearable sensing technologies are having a worldwide impact on the creation of novel business opportunities and application services that are benefiting the common citizen. By using these technologies, people have transformed the way they live, interact with each other and their surroundings, their daily routines, and how they monitor their health...
Article
Full-text available
Various Distributed Ledger Technologies (DLTs), such as Blockchain, have evolved significantly in recent years. These technologies provide a robust and effective solution for providing confidentiality, integrity, non-repudiation, authentication and transparency. While Blockchain has many advantages, it has various limitations as well, such as compl...
Article
Most IoT devices are battery powered and have limited power supplies. To ensure communication between two nodes, multi-hop transmissions over relays could be used. However, this communication cannot be achieved if the Signal-to-Noise Ratio (SNR) at the destination does not reach a reasonable threshold. Different relay selection approaches have been...
Article
Unmanned aerial vehicles (UAVs) are widely used in various applications such as surveillance, healthcare, rescue, and crowdsensing. However, the network management of these applications is quite challenging given the mobility of UAVs. In this scenario, network softwarization, which decouples the hardware from the network control functions, becomes...
Article
Advances in communications, smart transportation systems, and computer systems have recently opened up vast possibilities of intelligent solutions for traffic safety, convenience, and effectiveness. Artificial Intelligence (AI) is currently being used in various application domains because of its strong potential to help enhance conventional data-d...
Article
Full-text available
Medical health insurance fraud has been a major concern for the healthcare industry and governmental institutions. In the United States, the health insurance companies recorded a loss of tens of billions yearly due to healthcare fraud. Some types of fraud are at the risk of the patient’s health. This is because the system that performs the manual p...
Article
Full-text available
Fake check scam is one of the most common attacks used to commit fraud against consumers. This fraud is particularly costly for victims because they generally lose thousands of dollars as well as being exposed to judicial proceedings. Currently, there is no existing solution to authenticate checks and detect fake ones instantly. Instead, banks must...
Article
Over the years, the healthcare industry has transformed from being hospital-centric to patient-centric. This shift is mainly due to the convergence of emergent technologies such as Internet-of-Things (IoT)-based healthcare, Fifth-Generation (5G) assisted networking, and data-driven analytics through Artificial Intelligence (AI). The convergence, te...
Article
Full-text available
LoRaWAN is the most adopted communication technology for the Internet of Things (IoT) applications for enabling flexible, cost-effective long-range communication with low power consumption. The deployment of a wide range of IoT devices brings many benefits to many applications, but new challenges arise from the network point of view with this deplo...
Article
Today, there is a crucial need for precise monitoring and prediction of energy consumption at the building level using the latest technologies including Internet of Things (IoT) and data analytics to determine and enhance energy usage. Data-driven models could be used for energy consumption prediction. However, due to high non-linearity between the...
Article
Internet of Things (IoT)-enabled smart grids can achieve more reliable and high-frequency data collection and transmission compared with existing grids. However, this frequent data processing may consume a lot of bandwidth, and even put the user’s privacy at risk. Although many privacy-preserving data aggregation schemes have been proposed to solve...
Poster
Full-text available
CALL FOR PAPER: The workshop aims at bringing together scholars from academia and industry to discuss and present the latest research and findings on all the aspects of connectivity and interaction between moving objects/things. I encourage you to consider submitting a paper and joining us next year if this interests you.
Article
The COVID-19 pandemic has affected all parts of our daily lives, including the way we interact, work, educate, travel, conduct business, deliver healthcare services, and many other activities. COVID-19 has resulted in millions of deaths and severely impacted the economies of many nations worldwide. The significant global impact of the pandemic thro...
Article
The Internet of Things (IoT) comprises physical/virtual networked objects that collect and exchange data with each other via the public Internet. As this exchange often takes place over public networks, many security attacks in an IoT environment are possible. First, we briefly review the security issues in the IoT environment. Next, we focus on re...
Preprint
Full-text available
Software Defined Networks (SDNs) have dramatically simplified network management. However, enabling pure SDNs to respond in real-time while handling massive amounts of data still remains a challenging task. In contrast, fog computing has strong potential to serve large surges of data in real-time. SDN control plane enables innovation, and greatly s...
Article
Hash functions have always attracted a lot of attention in modern cryptography because of their hard to invert nature. However, all previous constructions of cryptographic primitives face the threat of being broken by the recent advancements in quantum technology. The focus has thus shifted to developing cryptographic primitives on mathematical str...
Article
A major objective of vehicular networking is to improve road safety and reduce traffic congestion. The experience of individual vehicles on traffic conditions and travel situations can be shared with other vehicles for improving their route planning and driving decisions. Nevertheless, the frequent occurrence of adversary vehicles in the network ma...
Article
Full-text available
Long-Range Wide-Area Network (LoRaWAN) enables flexible long-range service communications with low power consumption which is suitable for many IoT applications. The densification of LoRaWAN, which is needed to meet a wide range of IoT networking requirements, poses further challenges. For instance, the deployment of gateways and IoT devices are wi...
Article
The ever-growing trend of making the traditional power grids smarter than before has resulted in their gradual evolution to more sophisticated grids, referred to as Smart Grids (SGs) Cyber-Physical Systems with complex networking technologies. The integration of Information and Communication Technologies with power grids fosters seamless data shari...
Article
Intrabody Nanonetworks (IBN) are composed of nanosensors that have tremendous potential to enable cellular level monitoring and precision in drug delivery and diagnosis. Nanoscale communication using Electromagnetic (EM) waves propagation in the Terahertz (THz) band suffers from molecular absorption noise that has been regarded as the leading cause...
Article
Full-text available
Fog computing is a promising technology that can provide storage and computational services to future 6G networks. To support the massive Internet of Things (IoT) applications in 6G, fog computing will play a vital role. IoT devices and fog nodes have energy limitations and hence, energy-efficient techniques are needed for storage and computation s...
Article
Full-text available
The rapid growth of the Internet of Things (IoT) has accelerated strong interests in the development of low-power wireless sensors. Today, wireless sensors are integrated within IoT systems to gather information in a reliable and practical manner to monitor processes and control activities in areas such as transportation, energy, civil infrastructu...
Article
The emergence of the fifth generation network (5G) has stimulated strong interest from academia and industry in enabling technologies such as vehicular networks. Despite the benefits of 5G, including ultra-low latency, flexibility, increased bandwidth, and scalability, 5G security is still a topic of debate to figure out whether it can fully suppor...
Article
Full-text available
Intelligent Transportation Systems (ITS) help improve the ever‐increasing vehicular flow and traffic efficiency in urban traffic to reduce the number of accidents. The generation of massive amounts of data generated by all the digital devices connected to the transportation network enables the creation of datasets to perform an in‐depth analysis of...
Article
Cloud computing is a network model of on-demand access for sharing configurable computing resource pools. Compared with traditional services’ architectures, cloud computing introduces new security challenges in secure service management and control, privacy protection, data integrity protection in distributed databases, data backup, and synchroniza...
Article
Recent advances in networking and mobile technologies such as 5G, long-term evolution (LTE), LiFi, wireless broadband (WiBro), WiFi-Direct, Bluetooth Low Energy (BLE) have paved the way for intelligent and smart services. With an average of more than 6.5 devices per person, a plethora of applications are being developed especially related to health...
Article
The emergence of highly productive Cyber-Physical Manufacturing systems has motivated researchers to focus on minimizing communication overheads and saving computing resources. Traditional building virtual machine methods using the web-service and sensor techniques require a lot of system resources and incur high overheads, which make these techniq...