Skip to main content

Research Repository

Advanced Search

Outputs (145)

Uncovering hidden and complex relations of pandemic dynamics using an AI driven system (2024)
Journal Article
Demirbaga, U., Kaur, N., & Aujla, G. S. (2024). Uncovering hidden and complex relations of pandemic dynamics using an AI driven system. Scientific Reports, 14(1), Article 15433. https://doi.org/10.1038/s41598-024-65845-0

The COVID-19 pandemic continues to challenge healthcare systems globally, necessitating advanced tools for clinical decision support. Amidst the complexity of COVID-19 symptomatology and disease severity prediction, there is a critical need for robus... Read More about Uncovering hidden and complex relations of pandemic dynamics using an AI driven system.

Big Data Analytics: Theory, Techniques, Platforms, and Applications (2024)
Book
Demirbaga, Ü., Aujla, G. S., Jindal, A., & Kalyon, O. (2024). Big Data Analytics: Theory, Techniques, Platforms, and Applications. Springer Nature. https://doi.org/10.1007/978-3-031-55639-5

This book introduces readers to big data analytics. It covers the background to and the concepts of big data, big data analytics, and cloud computing, along with the process of setting up, configuring, and getting familiar with the big data analytics... Read More about Big Data Analytics: Theory, Techniques, Platforms, and Applications.

SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment (2024)
Journal Article
Singh, A., Chouhan, P. K., & Aujla, G. S. (2024). SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment. Ad Hoc Networks, 156, Article 103404. https://doi.org/10.1016/j.adhoc.2024.103404

There is a massive growth in the rate of heterogeneous devices configured in the Internet of Things (IoT) environment for efficient communication. The IoT devices are limited in resources, and there are no defined protocols in terms of security durin... Read More about SecureFlow: Knowledge and data-driven ensemble for intrusion detection and dynamic rule configuration in software-defined IoT environment.

Techno-Economic-Environmental Analysis for Net-Zero Sustainable Residential Buildings (2023)
Presentation / Conference Contribution
Garg, A., Aujla, G., & Sun, H. (2023). Techno-Economic-Environmental Analysis for Net-Zero Sustainable Residential Buildings. In 2023 IEEE PES Innovative Smart Grid Technologies Europe (ISGT EUROPE). https://doi.org/10.1109/ISGTEUROPE56780.2023.10408687

Carbon emissions are becoming a global concern responsible for climate change. The renewable energy sources (RESs) such as wind, solar, biomass are gaining importance to reduce emissions in the energy sector. However, these sources depend highly on v... Read More about Techno-Economic-Environmental Analysis for Net-Zero Sustainable Residential Buildings.

Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices (2023)
Journal Article
Su, J., Hong, Z., Ye, L., Liu, T., Liang, S., Ji, S., Aujla, G. S., Beyah, R., & Wen, Z. (online). Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices. IEEE Transactions on Consumer Electronics, 70(1), 4605 - 4616. https://doi.org/10.1109/tce.2023.3347651

As a typical representative of the Internet of Energy (IoE) intelligent era, consumer electronic (CE) devices continue to evolve at a remarkable pace. Computers, as typical and essential CE devices, have been instrumental in enhancing efficiency, com... Read More about Trustworthy IAP: An Intelligent Applications Profiler to Investigate Vulnerabilities of Consumer Electronic Devices.

Analyzing Impact of Data Uncertainty in Distributed Energy Resources using Bayesian Networks (2023)
Presentation / Conference Contribution
Garg;, A., Aujla, G., & Sun, H. (2023). Analyzing Impact of Data Uncertainty in Distributed Energy Resources using Bayesian Networks. In 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). https://doi.org/10.1109/SmartGridComm57358.2023.10333956

With the high penetration of distributed energy resources (DERs), distribution networks have become more prone to uncertainties associated with renewable energy sources (RESs). If not handled judiciously, these uncertainties may lead to interruption... Read More about Analyzing Impact of Data Uncertainty in Distributed Energy Resources using Bayesian Networks.

A Simulation-based Decision Support System for Urban Traffic Management (2023)
Presentation / Conference Contribution
Calvio, A., Jindal, A., Bujari, A., Aujla, G. S., & Foschini, L. (2023). A Simulation-based Decision Support System for Urban Traffic Management. In 2023 IEEE 28th International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD) (128-133). https://doi.org/10.1109/camad59638.2023.10478428

One common challenge faced by smart cities is traffic congestion, caused also unintentionally by city planners, which significantly impacts urban life and the environment. To address these issues, various strategies and approaches are explored, inclu... Read More about A Simulation-based Decision Support System for Urban Traffic Management.

RootPath: Root Cause and Critical Path Analysis to Ensure Sustainable and Resilient Consumer-Centric Big Data Processing under Fault Scenarios (2023)
Journal Article
Demirbaga, U., & Aujla, G. S. (2023). RootPath: Root Cause and Critical Path Analysis to Ensure Sustainable and Resilient Consumer-Centric Big Data Processing under Fault Scenarios. IEEE Transactions on Consumer Electronics, https://doi.org/10.1109/tce.2023.3329545

The exponential growth of consumer-centric big data has led to increased concerns regarding the sustainability and resilience of data processing systems, particularly in the face of fault scenarios. This paper presents an innovative approach integrat... Read More about RootPath: Root Cause and Critical Path Analysis to Ensure Sustainable and Resilient Consumer-Centric Big Data Processing under Fault Scenarios.

Negative Price Forecasting in Australian Energy Markets using gradient-boosted Machines: Predictive and Probabilistic Analysis (2023)
Presentation / Conference Contribution
Kaur, D., Aujla, G. S., & Mahmud, M. A. (2023). Negative Price Forecasting in Australian Energy Markets using gradient-boosted Machines: Predictive and Probabilistic Analysis. In 2023 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids (SmartGridComm). https://doi.org/10.1109/smartgridcomm57358.2023.10333879

With the integration of distributed energy resources such as roof-top solar panels and wind turbines into the grid, power generation can surpass demand-generation and thus, giving rise to the negative pricing, especially in the summer months. In this... Read More about Negative Price Forecasting in Australian Energy Markets using gradient-boosted Machines: Predictive and Probabilistic Analysis.

Intrusion Detection in Critical SD-IoT Ecosystem (2023)
Presentation / Conference Contribution
Algamdi, H., Aujla, G. S., Jindal, A., & Trehan, A. (2023). Intrusion Detection in Critical SD-IoT Ecosystem. In 2023 IEEE International Conference on Communications Workshops (ICC Workshops). https://doi.org/10.1109/iccworkshops57953.2023.10283685

The Internet of Things (IoT) connects physical objects with intelligent decision-making support to exchange information and enable various critical applications. The IoT enables billions of devices to connect to the Internet, thereby collecting and e... Read More about Intrusion Detection in Critical SD-IoT Ecosystem.

Cross-chain Transaction Validation using Lock-and-Key Method for Multi-System Blockchain (2023)
Presentation / Conference Contribution
Kumar, G., Lahiri, S., Dua, A., & Aujla, G. S. (2023). Cross-chain Transaction Validation using Lock-and-Key Method for Multi-System Blockchain. In 2023 IEEE International Conference on Communications Workshops (ICC Workshops). https://doi.org/10.1109/iccworkshops57953.2023.10283771

Blockchains have profoundly impacted finance and administration, but there are several issues with the current blockchain platforms, including a lack of system interoperability. Currently used blockchain application platforms only work within their n... Read More about Cross-chain Transaction Validation using Lock-and-Key Method for Multi-System Blockchain.

Federated-ANN based Critical Path Analysis and Health Recommendations for MapReduce Workflows in Consumer Electronics Applications (2023)
Journal Article
Demirbaga, U., & Aujla, G. S. (2023). Federated-ANN based Critical Path Analysis and Health Recommendations for MapReduce Workflows in Consumer Electronics Applications. IEEE Transactions on Consumer Electronics, 1-1. https://doi.org/10.1109/tce.2023.3318813

Although much research has been done to improve the performance of big data systems, predicting the performance degradation of these systems quickly and efficiently remains a significant challenge. Unfortunately, the complexity of big data systems is... Read More about Federated-ANN based Critical Path Analysis and Health Recommendations for MapReduce Workflows in Consumer Electronics Applications.

Trusted Explainable AI for 6G-Enabled Edge Cloud Ecosystem (2023)
Journal Article
Garg, S., Kaur, K., Aujla, G. S., Kaddoum, G., Garigipati, P., & Guizani, M. (2023). Trusted Explainable AI for 6G-Enabled Edge Cloud Ecosystem. IEEE Wireless Communications, 30(3), 163-170. https://doi.org/10.1109/mwc.016.220047

The journey to the next decade of smart cellular connectivity, sixth-generation (6G) networks, has already begun, even though 6G is still in its nascent stages and far from its deployment. In telecommunications, 6G networks have gained the attention... Read More about Trusted Explainable AI for 6G-Enabled Edge Cloud Ecosystem.

Compliance Checking of Cloud Providers: Design and Implementation (2023)
Journal Article
Barati, M., Adu-Duodu, K., Rana, O., Aujla, G. S., & Ranjan, R. (2023). Compliance Checking of Cloud Providers: Design and Implementation. Distributed Ledger Technologies: Research and Practice, 2(2), 1-20. https://doi.org/10.1145/3585538

The recognition of capabilities supplied by cloud systems is presently growing. Collecting or sharing healthcare data and sensitive information especially during the Covid-19 pandemic has motivated organizations and enterprises to leverage the upside... Read More about Compliance Checking of Cloud Providers: Design and Implementation.

GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment (2023)
Journal Article
Ahmad, H., & Aujla, G. S. (2023). GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment. Computers and Electrical Engineering, 109, https://doi.org/10.1016/j.compeleceng.2023.108747

With cloud-hosted web applications becoming ubiquitous, the security risks presented for user personal data that is migrated to the cloud are at an all-time high. When using a cloud-hosted web application, users only ever interact with web interfaces... Read More about GDPR compliance verification through a user-centric blockchain approach in multi-cloud environment.

Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City (2023)
Journal Article
Wen, W., Demirbaga, U., Singh, A., Jindal, A., Batth, R. S., Zhang, P., & Aujla, G. S. (2023). Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City. IEEE Internet of Things Journal, 10(21), 18571-18578. https://doi.org/10.1109/jiot.2023.3247640

With the increasing number of Internet of Things (IoT) devices being deployed and used in daily life, the load on computational devices has grown exponentially. This situation is more prevalent in smart cities where such devices are used for autonomo... Read More about Health Monitoring and Diagnosis for Geo-Distributed Edge Ecosystem in Smart City.

A distributed task orchestration scheme in collaborative vehicular cloud edge networks (2022)
Journal Article
Mittal, S., Dudeja, R. K., Bali, R. S., & Aujla, G. S. (2022). A distributed task orchestration scheme in collaborative vehicular cloud edge networks. Computing, https://doi.org/10.1007/s00607-022-01119-9

The next generation vehicular networks would be expected to support a wide array of cutting edge applications concerning intelligent transportation system (ITS). Due to this reason, the scale and complexity of ITS-based compute-intensive tasks has ex... Read More about A distributed task orchestration scheme in collaborative vehicular cloud edge networks.

MapChain: A Blockchain-based Verifiable Healthcare Service Management in IoT-based Big Data Ecosystem (2022)
Journal Article
Demirbaga, U., & Aujla, G. S. (2022). MapChain: A Blockchain-based Verifiable Healthcare Service Management in IoT-based Big Data Ecosystem. IEEE Transactions on Network and Service Management, 19(4), 3896-3907. https://doi.org/10.1109/tnsm.2022.3204851

Internet of Things (IoT)-based Healthcare services, which are becoming more widespread today, continuously generate huge amounts of data which is often called big data. Due to the magnitude and intricacy of the data, it is difficult to find valuable... Read More about MapChain: A Blockchain-based Verifiable Healthcare Service Management in IoT-based Big Data Ecosystem.

A comprehensive survey on software‐defined networking for smart communities (2022)
Journal Article
Chaudhary, R., Aujla, G. S., Kumar, N., & Chouhan, P. K. (2022). A comprehensive survey on software‐defined networking for smart communities. International Journal of Communication Systems, https://doi.org/10.1002/dac.5296

The need to provide services closer to the end-user proximity leads to the exchange of a large volume of data generated from the smart devices deployed at different geo-distributed sites. The massive amount of data generated from the smart devices ne... Read More about A comprehensive survey on software‐defined networking for smart communities.

Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT using Proof of Learning Consensus Protocol (2022)
Journal Article
Qiu, C., Aujla, G. S., Jiang, J., Wen, W., & Zhang, P. (2023). Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT using Proof of Learning Consensus Protocol. IEEE Transactions on Industrial Informatics, 19(1), 900-909. https://doi.org/10.1109/tii.2022.3179272

Industrial Internet of Things (IIoT) and fifth generation (5G) network have fueled the development of Industry 4.0 by providing an unparalleled connectivity and intelligence to ensure timely (or real time) and optimal decision making. Under this umbr... Read More about Rendering Secure and Trustworthy Edge Intelligence in 5G-Enabled IIoT using Proof of Learning Consensus Protocol.

Dynamic Bandwidth Slicing for Time-Critical IoT Data Streams in the Edge-Cloud Continuum (2022)
Journal Article
Habeeb, F., Alwasel, K., Noor, A., Jha, D. N., Alqattan, D., Li, Y., …Ranjan, R. (2022). Dynamic Bandwidth Slicing for Time-Critical IoT Data Streams in the Edge-Cloud Continuum. IEEE Transactions on Industrial Informatics, 18(11), 8017-8026. https://doi.org/10.1109/tii.2022.3169971

Edge computing has gained momentum in recent years, as complementary to cloud computing, for supporting applications (e.g. industrial control systems) that require Time-Critical communication guarantees. While edge computing can provide immediate ana... Read More about Dynamic Bandwidth Slicing for Time-Critical IoT Data Streams in the Edge-Cloud Continuum.

A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems (2022)
Journal Article
Zhang, P., Wang, Y., Aujla, G. S., Jindal, A., & Al-Otaibi, Y. D. (2023). A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems. IEEE Transactions on Intelligent Transportation Systems, 24(2), 2322 - 2331. https://doi.org/10.1109/tits.2022.3159485

Although modern Maritime Transportation Systems (MTS) have been extensively benefited from Internet of Things (IoT) technology, but still the risks and challenges in safety and reliability have increased substantially. The involvement of different ma... Read More about A Blockchain-Based Authentication Scheme and Secure Architecture for IoT-Enabled Maritime Transportation Systems.

CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics (2022)
Journal Article
Singh, M., Aujla, G. S., Bali, R. S., Batth, R. S., Singh, A., Vashisht, S., & Jindal, A. (2022). CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics. Computing, 104(7), 1589-1613. https://doi.org/10.1007/s00607-022-01064-7

With increase in the use of contactless deliveries during the times such as COVID-19 pandemic, the emphasis was to minimize the human presence to reduce the spread of virus. In this regard, drones are one promising alternative to be used as delivery... Read More about CovaDel: a blockchain-enabled secure and QoS-aware drone delivery framework for COVID-like pandemics.

Energy-Efficient Virtual Resource Allocation of Slices in Vehicles-Assisted B5G Networks (2022)
Journal Article
Cao, H., Zhao, H., Jindal, A., Aujla, G. S., & Yang, L. (2022). Energy-Efficient Virtual Resource Allocation of Slices in Vehicles-Assisted B5G Networks. IEEE Transactions on Green Communications and Networking, 6(3), 1408-1417. https://doi.org/10.1109/tgcn.2022.3159227

Academia community started the research beyond 5G (B5G) while 5G systems and networks are still being landed for large-scale commercial applications. In order to enhance the agility and flexibility attributes of B5G networks, network function virtual... Read More about Energy-Efficient Virtual Resource Allocation of Slices in Vehicles-Assisted B5G Networks.

Secure and pervasive communication framework using Named Data Networking for connected healthcare (2022)
Journal Article
Dudeja, R. K., Bali, R. S., & Aujla, G. S. (2022). Secure and pervasive communication framework using Named Data Networking for connected healthcare. Computers and Electrical Engineering, 100, Article 107806. https://doi.org/10.1016/j.compeleceng.2022.107806

Connected healthcare system is one of the most critical Internet of Things (IoT) applications offering numerous healthcare services. But it requires the next-generation technologies to collude with the IoT standards to provide prompt end-user service... Read More about Secure and pervasive communication framework using Named Data Networking for connected healthcare.

An optimal content indexing approach for named data networking in software‐defined IoT system (2022)
Journal Article
Dudeja, R. K., Singh, A., Bali, R. S., & Aujla, G. S. (2022). An optimal content indexing approach for named data networking in software‐defined IoT system. IET Smart Cities, 4(1), https://doi.org/10.1049/smc2.12023

The evolution of the Internet of Things (IoT) has increased the number of connected devices in the network. This has shifted the focus from IP-based network architecture towards content-centric networking (CCN). CCN eliminates the need for address-co... Read More about An optimal content indexing approach for named data networking in software‐defined IoT system.

Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem (2022)
Journal Article
Singh, M., Aujla, G. S., & Bali, R. S. (2022). Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem. Cluster Computing, 25(3), 2281-2302. https://doi.org/10.1007/s10586-021-03497-9

Internet of Drones (IoD) facilitates the autonomous operations of drones into every application (warfare, surveillance, photography, etc) across the world. The transmission of data (to and fro) related to these applications occur between the drones a... Read More about Derived blockchain architecture for security-conscious data dissemination in edge-envisioned Internet of Drones ecosystem.

Blockchain for the Internet of Drones: Applications, Challenges, and Future Directions (2021)
Journal Article
Singh, M. P., Aujla, G. S., & Bali, R. S. (2021). Blockchain for the Internet of Drones: Applications, Challenges, and Future Directions. IEEE Internet of Things Magazine, 4(4), 47-53. https://doi.org/10.1109/iotm.001.2100071

Drones, or unmanned aerial vehicles (UAVs), which started as a byproduct of military research, are passing through their most popular period and are being used on broader horizons, and more possibilities are being explored in commercial applications.... Read More about Blockchain for the Internet of Drones: Applications, Challenges, and Future Directions.

ReLeDP: Reinforcement-Learning-Assisted Dynamic Pricing for Wireless Smart Grid (2021)
Journal Article
Zhang, P., Wang, C., Aujla, G. S., & Batth, R. S. (2021). ReLeDP: Reinforcement-Learning-Assisted Dynamic Pricing for Wireless Smart Grid. IEEE Wireless Communications, 28(6), 62-69. https://doi.org/10.1109/mwc.011.2000431

The smart grid must ensure that power providers can obtain substantial benefits by selling energy, while at the same time, they need to consider the cost of consumers. To realize this win-win situation, the smart grid relies on dynamic pricing mechan... Read More about ReLeDP: Reinforcement-Learning-Assisted Dynamic Pricing for Wireless Smart Grid.

Leveraging Blockchain for Secure Drone-to-Everything Communications (2021)
Journal Article
Aujla, G. S., Vashisht, S., Garg, S., Kumar, N., & Kaddoum, G. (2021). Leveraging Blockchain for Secure Drone-to-Everything Communications. IEEE Communications Standards Magazine, 5(4), 80-87. https://doi.org/10.1109/mcomstd.0001.2100012

The popularity of drones has increased their deployment in a wide range of applications like commercial delivery, industrial systems, monitoring, surveillance, and surveys. The facility of fast deployment and cost effectiveness make drones a potentia... Read More about Leveraging Blockchain for Secure Drone-to-Everything Communications.

Drone-Edge Coalesce for Energy-Aware and Sustainable Service Delivery for Smart City Applications (2021)
Journal Article
Ren, X., Vashisht, S., Aujla, G. S., & Zhang, P. (2022). Drone-Edge Coalesce for Energy-Aware and Sustainable Service Delivery for Smart City Applications. Sustainable Cities and Society, 77, Article 103505. https://doi.org/10.1016/j.scs.2021.103505

In a typical smart city, drones can collect (or sense) massive amount of data, that is sent to a computing capability for further analysis to make useful decision making without human intervention. This data is relayed to the Cloud for processing and... Read More about Drone-Edge Coalesce for Energy-Aware and Sustainable Service Delivery for Smart City Applications.

Privacy & Cloud Services: Are We There Yet? (2021)
Presentation / Conference Contribution
Marikyan, D., Llanos, J., Barati, M., Aujla, G. S., Li, Y., Adu-Duodu, K., …Carr, M. (2021). Privacy & Cloud Services: Are We There Yet?. . https://doi.org/10.1109/sose52839.2021.00006

The General Data Protection Regulation (GDPR) remains an important requirement for many electronic services which utilise user data. GDPR compliance verification for a cloud provider is aimed to confirm that personal data provided by a user is shared... Read More about Privacy & Cloud Services: Are We There Yet?.

Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios (2021)
Journal Article
Gulati, A., Aujla, G. S., Kumar, N., Garg, S., & Kaddoum, G. (2021). Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios. IEEE Internet of Things Magazine, 4(3), 34-40. https://doi.org/10.1109/iotm.2011.2000156

The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in tradition... Read More about Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios.

Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities (2021)
Journal Article
Garg, S., Kaur, K., Kaddoum, G., Garigipati, P., & Aujla, G. S. (2021). Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities. IEEE Network, 35(5), 298-305. https://doi.org/10.1109/mnet.211.2000526

With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edge... Read More about Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities.

Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare (2021)
Journal Article
Barati, M., Aujla, G. S., Llanos, J. T., Duodu, K. A., Rana, O. F., Carr, M., & Rajan, R. (2022). Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare. IEEE Transactions on Industrial Informatics, 18(7), 4808-4819. https://doi.org/10.1109/tii.2021.3100152

Emerging multi-tenant cloud computing ecosystems allow multiple applications to share virtualised pool of computing and networking resources. As a result such ecosystems are becoming increasingly prone to data privacy concerns (personal data leakages... Read More about Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare.

RA-RL: Reputation-Aware Edge Device Selection Method based on Reinforcement Learning (2021)
Presentation / Conference Contribution
Dong, Y., Gan, P., Aujla, G. S., & Zhang, P. (2021). RA-RL: Reputation-Aware Edge Device Selection Method based on Reinforcement Learning. . https://doi.org/10.1109/wowmom51794.2021.00063

The development of smart technology and smart cities has solved the problem of data islands, but it has also brought about information security problems. Federated learning provides solutions to information security problems, which is a new machine l... Read More about RA-RL: Reputation-Aware Edge Device Selection Method based on Reinforcement Learning.

Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning (2021)
Journal Article
Cao, H., Aujla, G. S., Garg, S., Kaddoum, G., & Yang, L. (2021). Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning. IEEE Communications Standards Magazine, 5(2), 20-27. https://doi.org/10.1109/mcomstd.001.2000026

n the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and sche... Read More about Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning.

Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0 (2021)
Journal Article
Zhang, P., Gan, P., Aujla, G. S., & Batth, R. S. (2023). Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0. IEEE Internet of Things Journal, 10(4), 2784-2792. https://doi.org/10.1109/jiot.2021.3088577

In the 5G era, the problem of data islands in various industries restricts the development of artificial intelligence technology, so data sharing is proposed. High-quality data sharing directly affects the effectiveness of machine learning models, bu... Read More about Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0.

Service vs Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment (2021)
Journal Article
Singh, P., Kaur, A., Batth, R. S., Aujla, G. S., & Masud, M. (2022). Service vs Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment. IEEE Internet of Things Journal, 9(22), 22061-22070. https://doi.org/10.1109/jiot.2021.3082272

Edge of Things (EoT) technology enables end-users participation with smart-sensors and mobile devices (such as smartphones, wearable devices) to the smart devices across the smart city. Trust management is the main challenge in EoT infrastructure to... Read More about Service vs Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment.

Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications (2021)
Journal Article
Ren, X., Aujla, G. S., Jindal, A., Batth, R. S., & Zhang, P. (online). Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications. IEEE Internet of Things Journal, https://doi.org/10.1109/jiot.2021.3064468

Financial Technology have revolutionized the delivery and usage of the autonomous operations and processes to improve the financial services. However, the massive amount of data (often called as big data) generated seamlessly across different geograp... Read More about Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications.

Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation (2021)
Journal Article
Garg, S., Aujla, G. S., Erbad, A., Rodrigues, J. J., Chen, M., & Wang, X. (2021). Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation. IEEE Network, 35(1), 16-19. https://doi.org/10.1109/mnet.2021.9355047

Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natu... Read More about Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation.

VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning (2021)
Journal Article
Wang, C., Batth, R. S., Zhang, P., Aujla, G. S., Duan, Y., & Ren, L. (2021). VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning. Computing, 103(6), 1061-1083. https://doi.org/10.1007/s00607-020-00883-w

The rapid development and deployment of network services has brought a series of challenges to researchers. On the one hand, the needs of Internet end users/applications reflect the characteristics of travel alienation, and they pursue different pers... Read More about VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning.

Running Industrial Workflow Applications in a Software-defined Multi-Cloud Environment using Green Energy Aware Scheduling Algorithm (2020)
Journal Article
Wen, Z., Garg, S., Aujla, G. S., Alwasel, K., Puthal, D., Dustdar, S., …Rajan, R. (2021). Running Industrial Workflow Applications in a Software-defined Multi-Cloud Environment using Green Energy Aware Scheduling Algorithm. IEEE Transactions on Industrial Informatics, 17(8), 5645-5656. https://doi.org/10.1109/tii.2020.3045690

Industry 4.0 have automated the entire manufacturing sector (including technologies and processes) by adopting Internet of Things and Cloud computing. To handle the work-flows from Industrial Cyber-Physical systems, more and more data centers have be... Read More about Running Industrial Workflow Applications in a Software-defined Multi-Cloud Environment using Green Energy Aware Scheduling Algorithm.

IoV Scenario: Implementation of a Bandwidth Aware Algorithm in Wireless Network Communication Mode (2020)
Journal Article
Zhang, P., Wang, C., Aujla, G. S., Kumar, N., & Guizani, M. (2020). IoV Scenario: Implementation of a Bandwidth Aware Algorithm in Wireless Network Communication Mode. IEEE Transactions on Vehicular Technology, 69(12), https://doi.org/10.1109/tvt.2020.3035341

Wireless network communication has developed rapidly in recent years, especially in the field of Internet of vehicles (IoV). However, due to the limitations of traditional network architecture, resource scheduling in wireless network environment is s... Read More about IoV Scenario: Implementation of a Bandwidth Aware Algorithm in Wireless Network Communication Mode.

Deep neuro‐fuzzy approach for risk and severity prediction using recommendation systems in connected health care (2020)
Journal Article
Sharma, D., Aujla, G. S., & Bajaj, R. (2021). Deep neuro‐fuzzy approach for risk and severity prediction using recommendation systems in connected health care. Transactions on Emerging Telecommunications Technologies, 32(7), Article e4159. https://doi.org/10.1002/ett.4159

Internet of Things (IoT) and Data science have revolutionized the entire technological landscape across the globe. Because of it, the health care ecosystems are adopting the cutting‐edge technologies to provide assistive and personalized care to the... Read More about Deep neuro‐fuzzy approach for risk and severity prediction using recommendation systems in connected health care.

Container-based load balancing for energy efficiency in software-defined edge computing environment (2020)
Journal Article
Singh, A., Aujla, G. S., & Bali, R. S. (2021). Container-based load balancing for energy efficiency in software-defined edge computing environment. Sustainable Computing: Informatics and Systems, 30, Article 100463. https://doi.org/10.1016/j.suscom.2020.100463

The workload generated by the Internet of Things (IoT)-based infrastructure is often handled by the cloud data centers (DCs). However, in recent time, an exponential increase in the deployment of the IoT-based infrastructure has escalated the workloa... Read More about Container-based load balancing for energy efficiency in software-defined edge computing environment.

DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem (2020)
Journal Article
Singh, P., Kaur, A., Aujla, G. S., Batth, R. S., & Kanhere, S. (2021). DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem. IEEE Internet of Things Journal, 8(16), 12569-12577. https://doi.org/10.1109/jiot.2020.3029248

Edge of Things (EoT) enables the seamless transfer of services, storage, and data processing from the cloud layer to edge devices in a large-scale distributed Internet of Things (IoT) ecosystems (e.g., Industrial systems). This transition raises the... Read More about DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem.

Blockchain-enabled secure communication for drone delivery: a case study in COVID-like scenarios (2020)
Presentation / Conference Contribution
Singh, M., Aujla, G. S., Bali, R. S., Vashisht, S., Singh, A., & Jindal, A. (2020). Blockchain-enabled secure communication for drone delivery: a case study in COVID-like scenarios. . https://doi.org/10.1145/3414045.3415937

COVID-19 made the world stop, with people trapped inside their homes and governments trying to restrict the public movement. However, to accomplish this, one big problem that emerged and outscored everything else was catering to the day to day necess... Read More about Blockchain-enabled secure communication for drone delivery: a case study in COVID-like scenarios.

COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain (2020)
Journal Article
Aujla, G. S., Barati, M., Rana, O., Dustdar, S., Noor, A., Llanos, J. T., …Ranjan, R. (2020). COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain. IEEE Internet Computing, 24(5), 45-53. https://doi.org/10.1109/mic.2020.3014484

The COVID19 Pandemic has highlighted our dependence on online services (from government, e-commerce/retail, and entertainment), often hosted over external cloud computing infrastructure. The users of these services interact with a web interface rathe... Read More about COM-PACE: Compliance-Aware Cloud Application Engineering Using Blockchain.

A Decoupled Blockchain Approach for Edge-envisioned IoT-based Healthcare Monitoring (2020)
Journal Article
Aujla, G. S., & Jindal, A. (2021). A Decoupled Blockchain Approach for Edge-envisioned IoT-based Healthcare Monitoring. IEEE Journal on Selected Areas in Communications, 39(2), 491-499. https://doi.org/10.1109/jsac.2020.3020655

The in-house health monitoring sensors form a large network of Internet of things (IoT) that continuously monitors and sends the data to the nearby devices or server. However, the connectivity of these IoT-based sensors with different entities leads... Read More about A Decoupled Blockchain Approach for Edge-envisioned IoT-based Healthcare Monitoring.

A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment (2020)
Journal Article
Singh, M., Aujla, G. S., & Bali, R. S. (2021). A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment. IEEE Transactions on Intelligent Transportation Systems, 22(7), 4404-4413. https://doi.org/10.1109/tits.2020.2997469

Drones are equipped with high-vision cameras, advanced sensors, and GPS receivers to deliver diverse services from high altitude thereby creating an airborne network. In this environment, physical things (drones, sensors, etc.,) are controlled using... Read More about A Deep Learning-Based Blockchain Mechanism for Secure Internet of Drones Environment.

BloomStore: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN (2020)
Journal Article
Singh, A., Batra, S., Aujla, G. S., Kumar, N., & Yang, L. T. (2020). BloomStore: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN. IEEE Transactions on Industrial Informatics, 16(10), 6252 - 6262. https://doi.org/10.1109/tii.2020.2966708

Software-defined networking (SDN) provides an efficient way of managing traffic load by shifting complex and rigid computing tasks to the centralized controller. It reduces the burden on the switches, task of which is to perform the routing based upo... Read More about BloomStore: Dynamic Bloom-Filter-based Secure Rule-Space Management Scheme in SDN.

Guest Editorial: Special Section on Intelligent Informatics for Edge of Things in Smart Industrial Ecosystem (2019)
Journal Article
Zomaya, A. Y., Kumar, N., Rodrigues, J. J. P. C., & Aujla, G. S. (2020). Guest Editorial: Special Section on Intelligent Informatics for Edge of Things in Smart Industrial Ecosystem. IEEE Transactions on Industrial Informatics, 16(3), 1933-1937. https://doi.org/10.1109/tii.2019.2956047

The papers in this special section focus on intelligent informatics for the edge of things in smart industrial ecosystems. In the recent years, Internet of Thing (IoT) has been widely deployed in numerous areas ranging from the development of smart c... Read More about Guest Editorial: Special Section on Intelligent Informatics for Edge of Things in Smart Industrial Ecosystem.

Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks (2019)
Journal Article
Garg, S., Aujla, G. S., Kumar, N., & Batra, S. (2019). Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks. IEEE Consumer Electronics Magazine, 8(6), 35-41. https://doi.org/10.1109/mce.2019.2941345

Unmanned aerial vehicles (UAVs) networks are attack-prone networks due to high mobility and distributed nature. Most of the existing approaches focus on prevention instead of analyzing the security vulnerabilities. For an efficient analysis, the inte... Read More about Tree-Based Attack–Defense Model for Risk Assessment in Multi-UAV Networks.

Dynamic Embedding and Quality of Service-Driven Adjustment for Cloud Networks (2019)
Journal Article
Cao, H., Wu, S., Aujla, G. S., Wang, Q., Yang, L., & Zhu, H. (2020). Dynamic Embedding and Quality of Service-Driven Adjustment for Cloud Networks. IEEE Transactions on Industrial Informatics, 16(2), 1406 - 1416. https://doi.org/10.1109/tii.2019.2936074

Cloud computing built on virtualization technologies can provide Internet service providers (SPs) with elastic virtualized node and link resources. SPs can outsource their virtualized resources as customized virtual networks (VNs) to end users. Hence... Read More about Dynamic Embedding and Quality of Service-Driven Adjustment for Cloud Networks.

An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers (2019)
Journal Article
Kaur, K., Garg, S., Kumar, N., Aujla, G. S., Choo, K. R., & Obaidat, M. S. (2020). An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers. IEEE Systems Journal, 14(1), 1195 - 1205. https://doi.org/10.1109/jsyst.2019.2921592

Grid frequency support is one of the most challenging problems, since minor variations in it may lead to huge financial losses. This problem becomes even more challenging with the horizontal and vertical expansion of modern cloud data centers (DCs).... Read More about An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.

ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System (2019)
Journal Article
Kumar, N., Aujla, G. S., Das, A. K., & Conti, M. (2019). ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System. IEEE Transactions on Industrial Informatics, 15(12), 6572 - 6582. https://doi.org/10.1109/tii.2019.2922697

The devices in smart grids (SG) transfer data to a utility center (UC) or to the remote control centers. Using these data, the energy balance is maintained between consumers and the grid. However, this flow of data may be tampered by the intruders, w... Read More about ECCAuth: A Secure Authentication Protocol for Demand Response Management in a Smart Grid System.

Edge Computing-Based Security Framework for Big Data Analytics in VANETs (2019)
Journal Article
Garg, S., Singh, A., Kaur, K., Aujla, G. S., Batra, S., Kumar, N., & Obaidat, M. (2019). Edge Computing-Based Security Framework for Big Data Analytics in VANETs. IEEE Network, 33(2), 72-81. https://doi.org/10.1109/mnet.2019.1800239

With the exponential growth of technologies such as IoT, edge computing, and 5G, a tremendous amount of structured and unstructured data is being generated from different applications in the smart citiy environment in recent years. Thus, there is a n... Read More about Edge Computing-Based Security Framework for Big Data Analytics in VANETs.

Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions (2018)
Journal Article
Chaudhary, R., Aujla, G. S., Kumar, N., & Zeadally, S. (2019). Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions. IEEE Internet of Things Journal, 6(3), 4897 - 4909. https://doi.org/10.1109/jiot.2018.2878707

Due to its widespread popularity and usage in many applications (smart transport, energy management, e-healthcare, smart ecosystem, and so on), the Internet of Things (IoT) has become popular among end users over the last few years. However, with an... Read More about Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions.