Skip to main content

Research Repository

Advanced Search

A distributed task orchestration scheme in collaborative vehicular cloud edge networks (2022)
Journal Article
Mittal, S., Dudeja, R. K., Bali, R. S., & Aujla, G. S. (2022). A distributed task orchestration scheme in collaborative vehicular cloud edge networks. Computing, https://doi.org/10.1007/s00607-022-01119-9

The next generation vehicular networks would be expected to support a wide array of cutting edge applications concerning intelligent transportation system (ITS). Due to this reason, the scale and complexity of ITS-based compute-intensive tasks has ex... Read More about A distributed task orchestration scheme in collaborative vehicular cloud edge networks.

Round-competitive algorithms for uncertainty problems with parallel queries (2022)
Journal Article
Erlebach, T., Hoffmann, M., & de Lima, M. S. (2023). Round-competitive algorithms for uncertainty problems with parallel queries. Algorithmica, 85(2), 406-443. https://doi.org/10.1007/s00453-022-01035-6

In computing with explorable uncertainty, one considers problems where the values of some input elements are uncertain, typically represented as intervals, but can be obtained using queries. Previous work has considered query minimization in the sett... Read More about Round-competitive algorithms for uncertainty problems with parallel queries.

MapChain: A Blockchain-based Verifiable Healthcare Service Management in IoT-based Big Data Ecosystem (2022)
Journal Article
Demirbaga, U., & Aujla, G. S. (2022). MapChain: A Blockchain-based Verifiable Healthcare Service Management in IoT-based Big Data Ecosystem. IEEE Transactions on Network and Service Management, 19(4), 3896-3907. https://doi.org/10.1109/tnsm.2022.3204851

Internet of Things (IoT)-based Healthcare services, which are becoming more widespread today, continuously generate huge amounts of data which is often called big data. Due to the magnitude and intricacy of the data, it is difficult to find valuable... Read More about MapChain: A Blockchain-based Verifiable Healthcare Service Management in IoT-based Big Data Ecosystem.

Exploration of k-Edge-Deficient Temporal Graphs (2022)
Journal Article
Erlebach, T., & Spooner, J. T. (2022). Exploration of k-Edge-Deficient Temporal Graphs. Acta Informatica, 59(4), 387-407. https://doi.org/10.1007/s00236-022-00421-5

A temporal graph with lifetime L is a sequence of L graphs G1, . . . , GL, called layers, all of which have the same vertex set V but can have different edge sets. The underlying graph is the graph with vertex set V that contains all the edges that a... Read More about Exploration of k-Edge-Deficient Temporal Graphs.

On the Analysis and Evaluation of Proximity Based Load Balancing Policies (2022)
Journal Article
Panigrahy, N. K., Vasantam, T., Basu, P., Towsley, D., Swami, A., & Leung, K. K. (2022). On the Analysis and Evaluation of Proximity Based Load Balancing Policies. ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 7(2-4), Article 6. https://doi.org/10.1145/3549933

Distributed load balancing is the act of allocating jobs among a set of servers as evenly as possible. The static interpretation of distributed load balancing leads to formulating the load balancing problem as a classical balls and bins problem with... Read More about On the Analysis and Evaluation of Proximity Based Load Balancing Policies.

A comprehensive survey on software‐defined networking for smart communities (2022)
Journal Article
Chaudhary, R., Aujla, G. S., Kumar, N., & Chouhan, P. K. (2022). A comprehensive survey on software‐defined networking for smart communities. International Journal of Communication Systems, https://doi.org/10.1002/dac.5296

The need to provide services closer to the end-user proximity leads to the exchange of a large volume of data generated from the smart devices deployed at different geo-distributed sites. The massive amount of data generated from the smart devices ne... Read More about A comprehensive survey on software‐defined networking for smart communities.

Secure and Intelligent Service Function Chain for Sustainable Services in Healthcare Cyber Physical Systems (2022)
Journal Article
Cao, H., Jindal, A., Hu, H., Piran, M. J., & Yang, L. (2023). Secure and Intelligent Service Function Chain for Sustainable Services in Healthcare Cyber Physical Systems. IEEE Transactions on Network Science and Engineering, 10(5), 2674 - 2684. https://doi.org/10.1109/tnse.2022.3189546

The gradual integration of Internet of Things (IoT) devices has made the healthcare cyber physical systems (CPSs) ubiquitous and complex. Since IoT devices are heterogeneous, it is crucial to virtualize these devices in a general way so as to orchest... Read More about Secure and Intelligent Service Function Chain for Sustainable Services in Healthcare Cyber Physical Systems.

Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT using Proof of Learning Consensus Protocol (2022)
Journal Article
Qiu, C., Aujla, G. S., Jiang, J., Wen, W., & Zhang, P. (2023). Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT using Proof of Learning Consensus Protocol. IEEE Transactions on Industrial Informatics, 19(1), 900-909. https://doi.org/10.1109/tii.2022.3179272

Industrial Internet of Things (IIoT) and fifth generation (5G) network have fueled the development of Industry 4.0 by providing an unparalleled connectivity and intelligence to ensure timely (or real time) and optimal decision making. Under this umbr... Read More about Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT using Proof of Learning Consensus Protocol.

Resource-Efficient Seamless Transitions For High-Performance Multi-hop UAV Multicasting (2022)
Journal Article
Tu, W. (2022). Resource-Efficient Seamless Transitions For High-Performance Multi-hop UAV Multicasting. Computer Networks, 213, Article 109051. https://doi.org/10.1016/j.comnet.2022.109051

Many UAV-related applications require group communications between UAVs to reliably and efficiently deliver rich media content as well as to extend line-of-sight coverage between sky and ground. This paper is among the first to study fast yet resourc... Read More about Resource-Efficient Seamless Transitions For High-Performance Multi-hop UAV Multicasting.

TRUTH: Trust and Authentication Scheme in 5G-IIoT (2022)
Journal Article
Soleymani, S. A., Goudarzi, S., Anisi, M. H., Cruickshank, H., Jindal, A., & Kama, N. (2023). TRUTH: Trust and Authentication Scheme in 5G-IIoT. IEEE Transactions on Industrial Informatics, 19(1), 880-889. https://doi.org/10.1109/tii.2022.3174718

Due to the extremely important role of data in the Industrial Internet of Things (IIoT) network, trust and security of data are among the major concerns. In this study, we develop a cloud-integrated 5G-IIoT network architecture enabled by a three-par... Read More about TRUTH: Trust and Authentication Scheme in 5G-IIoT.

Parameterized temporal exploration problems (2022)
Conference Proceeding
Erlebach, T., & Spooner, J. T. (2022). Parameterized temporal exploration problems. In J. Aspnes, & O. Michail (Eds.), . https://doi.org/10.4230/lipics.sand.2022.15

In this paper we study the fixed-parameter tractability of the problem of deciding whether a given temporal graph G admits a temporal walk that visits all vertices (temporal exploration) or, in some problem variants, a certain subset of the vertices.... Read More about Parameterized temporal exploration problems.

Dynamic Bandwidth Slicing for Time-Critical IoT Data Streams in the Edge-Cloud Continuum (2022)
Journal Article
Habeeb, F., Alwasel, K., Noor, A., Jha, D. N., Alqattan, D., Li, Y., …Ranjan, R. (2022). Dynamic Bandwidth Slicing for Time-Critical IoT Data Streams in the Edge-Cloud Continuum. IEEE Transactions on Industrial Informatics, 18(11), 8017-8026. https://doi.org/10.1109/tii.2022.3169971

Edge computing has gained momentum in recent years, as complementary to cloud computing, for supporting applications (e.g. industrial control systems) that require Time-Critical communication guarantees. While edge computing can provide immediate ana... Read More about Dynamic Bandwidth Slicing for Time-Critical IoT Data Streams in the Edge-Cloud Continuum.

A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems (2022)
Journal Article
Zhang, P., Wang, Y., Aujla, G. S., Jindal, A., & Al-Otaibi, Y. D. (2023). A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2322 - 2331. https://doi.org/10.1109/tits.2022.3159485

Although modern Maritime Transportation Systems (MTS) have been extensively benefited from Internet of Things (IoT) technology, but still the risks and challenges in safety and reliability have increased substantially. The involvement of different ma... Read More about A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems.

CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics (2022)
Journal Article
Singh, M., Aujla, G. S., Bali, R. S., Batth, R. S., Singh, A., Vashisht, S., & Jindal, A. (2022). CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics. Computing, 104(7), 1589-1613. https://doi.org/10.1007/s00607-022-01064-7

With increase in the use of contactless deliveries during the times such as COVID-19 pandemic, the emphasis was to minimize the human presence to reduce the spread of virus. In this regard, drones are one promising alternative to be used as delivery... Read More about CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics.

Energy-Efficient Virtual Resource Allocation of Slices in Vehicles-Assisted B5G Networks (2022)
Journal Article
Cao, H., Zhao, H., Jindal, A., Aujla, G. S., & Yang, L. (2022). Energy-Efficient Virtual Resource Allocation of Slices in Vehicles-Assisted B5G Networks. IEEE Transactions on Green Communications and Networking, 6(3), 1408-1417. https://doi.org/10.1109/tgcn.2022.3159227

Academia community started the research beyond 5G (B5G) while 5G systems and networks are still being landed for large-scale commercial applications. In order to enhance the agility and flexibility attributes of B5G networks, network function virtual... Read More about Energy-Efficient Virtual Resource Allocation of Slices in Vehicles-Assisted B5G Networks.

Car-Sharing between Two Locations: Online Scheduling with Flexible Advance Bookings (2022)
Journal Article
Luo, K., Erlebach, T., & Xu, Y. (2022). Car-Sharing between Two Locations: Online Scheduling with Flexible Advance Bookings. Discrete Applied Mathematics, 313, 53-66. https://doi.org/10.1016/j.dam.2022.01.016

We study an online scheduling problem that is motivated by applications such as car-sharing. Users submit ride requests, and the scheduler aims to accept requests of maximum total profit using a single server (car). Each ride request specifies the pi... Read More about Car-Sharing between Two Locations: Online Scheduling with Flexible Advance Bookings.

Secure and pervasive communication framework using Named Data Networking for connected healthcare (2022)
Journal Article
Dudeja, R. K., Bali, R. S., & Aujla, G. S. (2022). Secure and pervasive communication framework using Named Data Networking for connected healthcare. Computers and Electrical Engineering, 100, Article 107806. https://doi.org/10.1016/j.compeleceng.2022.107806

Connected healthcare system is one of the most critical Internet of Things (IoT) applications offering numerous healthcare services. But it requires the next-generation technologies to collude with the IoT standards to provide prompt end-user service... Read More about Secure and pervasive communication framework using Named Data Networking for connected healthcare.

A throughput optimal scheduling policy for a quantum switch (2022)
Conference Proceeding
Vasantam, T., & Towsley, D. (2022). A throughput optimal scheduling policy for a quantum switch. In P. R. Hemmer, & A. L. Migdall (Eds.), Quantum Computing, Communication, and Simulation II. https://doi.org/10.1117/12.2616950

We study a quantum switch that creates shared end-to-end entangled quantum states to multiple sets of users that are connected to it. Each user is connected to the switch via an optical link across which bipartite Bell-state entangled states are gene... Read More about A throughput optimal scheduling policy for a quantum switch.