PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-based 6G Networking
(2021)
Journal Article
Soleymani, S. A., Goudarzi, S., Anisi, M. H., Movahedi, Z., Jindal, A., & Kama, N. (2021). PACMAN: Privacy-Preserving Authentication Scheme for Managing Cybertwin-based 6G Networking. IEEE Transactions on Industrial Informatics, 18(7), 4902-4911. https://doi.org/10.1109/tii.2021.3121505
Outputs (41)
Privacy & Cloud Services: Are We There Yet? (2021)
Presentation / Conference Contribution
Marikyan, D., Llanos, J., Barati, M., Aujla, G. S., Li, Y., Adu-Duodu, K., Tahir, S., Rana, O., Papagiannidis, S., Ranjan, R., & Carr, M. (2021, August). Privacy & Cloud Services: Are We There Yet?. Presented at 2021 IEEE International Conference on Service-Oriented System Engineering (SOSE), Oxford, United KingdomThe General Data Protection Regulation (GDPR) remains an important requirement for many electronic services which utilise user data. GDPR compliance verification for a cloud provider is aimed to confirm that personal data provided by a user is shared... Read More about Privacy & Cloud Services: Are We There Yet?.
Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios (2021)
Journal Article
Gulati, A., Aujla, G. S., Kumar, N., Garg, S., & Kaddoum, G. (2021). Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios. IEEE Internet of Things Magazine, 4(3), 34-40. https://doi.org/10.1109/iotm.2011.2000156The exponential increase in the number of connected devices in the network led to a paradigm shift from the traditional host-centric IP-based network architecture to a content-based paradigm, which eliminates the address-content bindings in tradition... Read More about Software-Defined Content Dissemination Scheme for Internet of Healthcare Vehicles in COVID-Like Scenarios.
Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities (2021)
Journal Article
Garg, S., Kaur, K., Kaddoum, G., Garigipati, P., & Aujla, G. S. (2021). Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities. IEEE Network, 35(5), 298-305. https://doi.org/10.1109/mnet.211.2000526With the exponential growth in the number of connected devices, in recent years there has been a paradigm shift toward mobile edge computing. As a promising edge technology, it pushes mobile computing, network control, and storage to the network edge... Read More about Security in IoT-Driven Mobile Edge Computing: New Paradigms, Challenges, and Opportunities.
A Vehicle Message Scheduling Scheme For Vehicle Trust Management (2021)
Presentation / Conference Contribution
Hu, Q., & Tu, W. (2021, December). A Vehicle Message Scheduling Scheme For Vehicle Trust Management. Presented at 2021 IEEE 46th Conference on Local Computer Networks (LCN)The trustworthiness of vehicle messages is a major focus in intelligent transportation research. Existing studies focus on enhancing the accuracy of vehicle trustworthiness evaluation, overlooking that the transmission performance may affect the qual... Read More about A Vehicle Message Scheduling Scheme For Vehicle Trust Management.
Orienting (Hyper)graphs Under Explorable Stochastic Uncertainty (2021)
Presentation / Conference Contribution
Bampis, E., Dürr, C., Erlebach, T., de Lima, M. S., Megow, N., & Schlöter, J. (2021, December). Orienting (Hyper)graphs Under Explorable Stochastic Uncertainty. Presented at 29th Annual European Symposium on Algorithms (ESA 2021), Lisbon, Portugal (Virtual Conference)Given a hypergraph with uncertain node weights following known probability distributions, we study the problem of querying as few nodes as possible until the identity of a node with minimum weight can be determined for each hyperedge. Querying a node... Read More about Orienting (Hyper)graphs Under Explorable Stochastic Uncertainty.
Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC (2021)
Journal Article
Murthy, A., Asghar, M. R., & Tu, W. (2022). Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC. Security and Privacy, 5(1), Article e184. https://doi.org/10.1002/spy2.184Advances in computing and compression technology, coupled with high-speed networks, has beaconed an era of video streaming on the Internet. This has led to a need to enhance the security of communications transporting data without degrading its perfo... Read More about Towards a data-driven framework for optimizing security-efficiency tradeoff in QUIC.
Exploration of k-Edge-Deficient Temporal Graphs (2021)
Presentation / Conference Contribution
Erlebach, T., & Spooner, J. T. (2021, December). Exploration of k-Edge-Deficient Temporal Graphs. Presented at WADS 2021: Algorithms and Data Structures
Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare (2021)
Journal Article
Barati, M., Aujla, G. S., Llanos, J. T., Duodu, K. A., Rana, O. F., Carr, M., & Rajan, R. (2022). Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare. IEEE Transactions on Industrial Informatics, 18(7), 4808-4819. https://doi.org/10.1109/tii.2021.3100152Emerging multi-tenant cloud computing ecosystems allow multiple applications to share virtualised pool of computing and networking resources. As a result such ecosystems are becoming increasingly prone to data privacy concerns (personal data leakages... Read More about Privacy-Aware Cloud Auditing for GDPR Compliance Verification in Online Healthcare.
I2UTS: An IoT based Intelligent Urban Traffic System (2021)
Presentation / Conference Contribution
Suresh Achari, V. P., Khanam, Z., Singh, A. K., Jindal, A., Prakash, A., & Kumar, N. (2021, December). I2UTS: An IoT based Intelligent Urban Traffic System. Presented at 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)
Internet of Energy for Smart Cities: Machine Learning Models and Techniques (2021)
Book
Machine Learning Models and Techniques. CRC Press
Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning (2021)
Journal Article
Cao, H., Aujla, G. S., Garg, S., Kaddoum, G., & Yang, L. (2021). Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning. IEEE Communications Standards Magazine, 5(2), 20-27. https://doi.org/10.1109/mcomstd.001.2000026n the 5G era, heterogeneous networks (Het-Nets) are designed for achieving data rates and customized service demands. To realize this, virtualization technologies are widely accepted as enablers for implementing 5G HetNets, aimed at managing and sche... Read More about Embedding Security Awareness for Virtual Resource Allocation in 5G Hetnets Using Reinforcement Learning.
Data-driven Energy Theft Detection in Modern Power Grids (2021)
Presentation / Conference Contribution
Althobaiti, A., Jindal, A., & Marnerides, A. K. (2021, December). Data-driven Energy Theft Detection in Modern Power Grids. Presented at Proceedings of the Twelfth ACM International Conference on Future Energy Systems
Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0 (2021)
Journal Article
Zhang, P., Gan, P., Aujla, G. S., & Batth, R. S. (2023). Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0. IEEE Internet of Things Journal, 10(4), 2784-2792. https://doi.org/10.1109/jiot.2021.3088577In the 5G era, the problem of data islands in various industries restricts the development of artificial intelligence technology, so data sharing is proposed. High-quality data sharing directly affects the effectiveness of machine learning models, bu... Read More about Reinforcement Learning for Edge Device Selection using Social Attribute Perception in Industry 4.0.
Service vs Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment (2021)
Journal Article
Singh, P., Kaur, A., Batth, R. S., Aujla, G. S., & Masud, M. (2022). Service vs Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment. IEEE Internet of Things Journal, 9(22), 22061-22070. https://doi.org/10.1109/jiot.2021.3082272Edge of Things (EoT) technology enables end-users participation with smart-sensors and mobile devices (such as smartphones, wearable devices) to the smart devices across the smart city. Trust management is the main challenge in EoT infrastructure to... Read More about Service vs Protection: A Bayesian Learning Approach for Trust Provisioning in Edge of Things Environment.
A Seamless and Efficient Transition Algorithm For Aerial Drone Multicasting (2021)
Presentation / Conference Contribution
Tu, W. (2021, December). A Seamless and Efficient Transition Algorithm For Aerial Drone Multicasting. Presented at 2021 IEEE 18th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NVDrone communications make use of line-of-sight coverage of drones to realise services that ground devices may not support. Many relevant applications such as video capture by drones and drone traffic management, require group communications between d... Read More about A Seamless and Efficient Transition Algorithm For Aerial Drone Multicasting.
Round-Competitive Algorithms for Uncertainty Problems with Parallel Queries (2021)
Presentation / Conference Contribution
Erlebach, T., Hoffmann, M., & de Lima, M. S. (2021, December). Round-Competitive Algorithms for Uncertainty Problems with Parallel Queries. Presented at 38th International Symposium on Theoretical Aspects of Computer Science (STACS 2021), Saarbrücken, Germany
Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications (2021)
Journal Article
Ren, X., Aujla, G. S., Jindal, A., Batth, R. S., & Zhang, P. (2023). Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications. IEEE Internet of Things Journal, 10(3), 2112 - 2120. https://doi.org/10.1109/jiot.2021.3064468Financial Technology have revolutionized the delivery and usage of the autonomous operations and processes to improve the financial services. However, the massive amount of data (often called as big data) generated seamlessly across different geograp... Read More about Adaptive Recovery Mechanism for SDN Controllers in Edge-Cloud supported FinTech Applications.
Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation (2021)
Journal Article
Garg, S., Aujla, G. S., Erbad, A., Rodrigues, J. J., Chen, M., & Wang, X. (2021). Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation. IEEE Network, 35(1), 16-19. https://doi.org/10.1109/mnet.2021.9355047Nowadays the deployment of drones/UAVs is not just limited to military and defense establishments; they are also widely deployed in geo-dispersed applications (environmental monitoring, rescue operation monitoring, road and traffic surveillance, natu... Read More about Guest Editorial: Blockchain Envisioned Drones: Realizing 5G-Enabled Flying Automation.
VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning (2021)
Journal Article
Wang, C., Batth, R. S., Zhang, P., Aujla, G. S., Duan, Y., & Ren, L. (2021). VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning. Computing, 103(6), 1061-1083. https://doi.org/10.1007/s00607-020-00883-wThe rapid development and deployment of network services has brought a series of challenges to researchers. On the one hand, the needs of Internet end users/applications reflect the characteristics of travel alienation, and they pursue different pers... Read More about VNE solution for network differentiated QoS and security requirements: from the perspective of deep reinforcement learning.