A comprehensive survey of security threats and their mitigation techniques for next‐generation SDN controllers
- Authors: Han, Tao , Jan, Syed , Tan, Zhiyuan , Usman, Muhammad , Jan, Mian , Khan, Rahim , Xu, Yongzhao
- Date: 2020
- Type: Text , Journal article
- Relation: Concurrency and computation Vol. 32, no. 16 (2020), p. n/a
- Full Text: false
- Reviewed:
- Description: Summary Software Defined Network (SDN) and Network Virtualization (NV) are emerged paradigms that simplified the control and management of the next generation networks, most importantly, Internet of Things (IoT), Cloud Computing, and Cyber‐Physical Systems. The Internet of Things (IoT) includes a diverse range of a vast collection of heterogeneous devices that require interoperable communication, scalable platforms, and security provisioning. Security provisioning to an SDN‐based IoT network poses a real security challenge leading to various serious security threats due to the connection of various heterogeneous devices having a wide range of access protocols. Furthermore, the logical centralized controlled intelligence of the SDN architecture represents a plethora of security challenges due to its single point of failure. It may throw the entire network into chaos and thus expose it to various known and unknown security threats and attacks. Security of SDN controlled IoT environment is still in infancy and thus remains the prime research agenda for both the industry and academia. This paper comprehensively reviews the current state‐of‐the‐art security threats, vulnerabilities, and issues at the control plane. Moreover, this paper contributes by presenting a detailed classification of various security attacks on the control layer. A comprehensive state‐of‐the‐art review of the latest mitigation techniques for various security breaches is also presented. Finally, this paper presents future research directions and challenges for further investigation down the line.
A distributed and anonymous data collection framework based on multilevel edge computing architecture
- Authors: Usman, Muhammad , Jan, Mian , Jolfaei, Alireza , Xu, Min , He, Xiangjian , Chen, Jinjun
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Transactions on Industrial Informatics Vol. 16, no. 9 (2020), p. 6114-6123
- Full Text: false
- Reviewed:
- Description: Industrial Internet of Things applications demand trustworthiness in terms of quality of service (QoS), security, and privacy, to support the smooth transmission of data. To address these challenges, in this article, we propose a distributed and anonymous data collection (DaaC) framework based on a multilevel edge computing architecture. This framework distributes captured data among multiple level-one edge devices (LOEDs) to improve the QoS and minimize packet drop and end-to-end delay. Mobile sinks are used to collect data from LOEDs and upload to cloud servers. Before data collection, the mobile sinks are registered with a level-two edge-device to protect the underlying network. The privacy of mobile sinks is preserved through group-based signed data collection requests. Experimental results show that our proposed framework improves QoS through distributed data transmission. It also helps in protecting the underlying network through a registration scheme and preserves the privacy of mobile sinks through group-based data collection requests. © 2005-2012 IEEE.
A Joint framework for QoS and QoE for video transmission over wireless multimedia sensor networks
- Authors: Usman, Muhammad , Ning, Yang , Jan, Mian , Xiangjian, He , Min, Xu , Kin-Man, Lam
- Date: 2018
- Type: Text , Journal article
- Relation: IEEE transactions on mobile computing Vol. 17, no. 4 (2018), p. 746-759
- Full Text: false
- Reviewed:
- Description: With the emergence of Wireless Multimedia Sensor Networks (WMSNs), the distribution of multimedia contents have now become a reality. Without proper management, the transmission of multimedia data over WMSNs affects the performance of networks due to excessive packet-drop. The existing studies on Quality of Service (QoS) mostly deal with simple Wireless Sensor Networks (WSNs) and as such do not account for an increasing number of sensor nodes and an increasing volume of data. In this paper, we propose a novel framework to support QoS in WMSNs along with a light-weight Error Concealment (EC) scheme. The EC schemes play a vital role to enhance Quality of Experience (QoE) by maintaining an acceptable quality at the receiving ends. The main objectives of the proposed framework are to maximize the network throughput and to cover-up the effects produced by dropped video packets. To control the data-rate, Scalable High efficiency Video Coding (SHVC) is applied at multimedia sensor nodes with variable Quantization Parameters (QPs). Multi-path routing is exploited to support real-time video transmission. Experimental results show that the proposed framework can efficiently adjust large volumes of video data under certain network distortions and can effectively conceal lost video frames by producing better objective measurements.
A survey on big multimedia data processing and management in smart cities
- Authors: Usman, Muhammad , Jan, Mian , He, Xiangjian , Chen, Jinjun
- Date: 2019
- Type: Text , Journal article
- Relation: ACM computing surveys Vol. 52, no. 3 (2019), p. 1-29
- Full Text: false
- Reviewed:
- Description: Integration of embedded multimedia devices with powerful computing platforms, e.g., machine learning platforms, helps to build smart cities and transforms the concept of Internet of Things into Internet of Multimedia Things (IoMT). To provide different services to the residents of smart cities, the IoMT technology generates big multimedia data. The management of big multimedia data is a challenging task for IoMT technology. Without proper management, it is hard to maintain consistency, reusability, and reconcilability of generated big multimedia data in smart cities. Various machine learning techniques can be used for automatic classification of raw multimedia data and to allow machines to learn features and perform specific tasks. In this survey, we focus on various machine learning platforms that can be used to process and manage big multimedia data generated by different applications in smart cities. We also highlight various limitations and research challenges that need to be considered when processing big multimedia data in real-time.
A survey on representation learning efforts in cybersecurity domain
- Authors: Usman, Muhammad , Jan, Mian , He, Xiangjian , Chen, Jinjun
- Date: 2020
- Type: Text , Journal article
- Relation: ACM computing surveys Vol. 52, no. 6 (2020), p. 1-28
- Full Text: false
- Reviewed:
- Description: In this technology-based era, network-based systems are facing new cyber-attacks on daily bases. Traditional cybersecurity approaches are based on old threat-knowledge databases and need to be updated on a daily basis to stand against new generation of cyber-threats and protect underlying network-based systems. Along with updating threat-knowledge databases, there is a need for proper management and processing of data generated by sensitive real-time applications. In recent years, various computing platforms based on representation learning algorithms have emerged as a useful resource to manage and exploit the generated data to extract meaningful information. If these platforms are properly utilized, then strong cybersecurity systems can be developed to protect the underlying network-based systems and support sensitive real-time applications. In this survey, we highlight various cyber-threats, real-life examples, and initiatives taken by various international organizations. We discuss various computing platforms based on representation learning algorithms to process and analyze the generated data. We highlight various popular datasets introduced by well-known global organizations that can be used to train the representation learning algorithms to predict and detect threats. We also provide an in-depth analysis of research efforts based on representation learning algorithms made in recent years to protect the underlying network-based systems against current cyber-threats. Finally, we highlight various limitations and challenges in these efforts and available datasets that need to be considered when using them to build cybersecurity systems.
Adaptive capacity task offloading in multi-hop D2D-based social industrial IoT
- Authors: Ibrar, Muhammad , Wang, Lei , Akbar, Aamir , Jan, Mian , Balasubramanian, Venki , Muntean, Gabriel-Miro , Shah, Nadir
- Date: 2023
- Type: Text , Journal article
- Relation: IEEE Transactions on Network Science and Engineering Vol. 10, no. 5 (2023), p. 2843-2852
- Full Text: false
- Reviewed:
- Description: Traditional communication technologies such as cellular networks are facing problems to support high service quality when used for time-critical applications in an Industrial Internet-of-Things (IIoT) context, including real-time data transmission, route dependability, and scalability. To address these problems, device-to-device (D2D) communications based on social relationships can be used, which allow for task-offloading: resource-rich devices share unused computing resources with resource constraint devices. However, unbalanced task offloading in Social IIoT (SIIoT) might actually degrade the overall system performance, which is not desirable. In this paper, we propose an adaptive capacity task offloading solution for D2D-based social industrial IoT (ToSIIoT) which considers devices utilization ratio and strength of social relationships in order to improve resource utilization, increase QoS and achieve better task completion rate. The proposed approach consists of three aspects: social-aware relay selection in a multi-hop D2D communication context, choice of a resource-rich SIIoT device for task offloading, and adaptive redistribution of tasks. The paper proposes heuristic algorithms, as finding optimal solutions to the problems are NP-hard. Extensive experimental results show that the proposed ToSIIoT performs better than existing approaches in terms of utilization ratio, QoS violation, average execution delay, and task completion ratio. © 2013 IEEE.
An AI-enabled lightweight data fusion and load optimization approach for internet of things
- Authors: Jan, Mian , Zakarya, Muhammad , Khan, Muhammad , Mastorakis, Spyridon , Balasubramanian, Venki
- Date: 2021
- Type: Text , Journal article
- Relation: Future Generation Computer Systems Vol. 122, no. (2021), p. 40-51
- Full Text: false
- Reviewed:
- Description: In the densely populated Internet of Things (IoT) applications, sensing range of the nodes might overlap frequently. In these applications, the nodes gather highly correlated and redundant data in their vicinity. Processing these data depletes the energy of nodes and their upstream transmission towards remote datacentres, in the fog infrastructure, may result in an unbalanced load at the network gateways and edge servers. Due to heterogeneity of edge servers, few of them might be overwhelmed while others may remain less-utilized. As a result, time-critical and delay-sensitive applications may experience excessive delays, packet loss, and degradation in their Quality of Service (QoS). To ensure QoS of IoT applications, in this paper, we eliminate correlation in the gathered data via a lightweight data fusion approach. The buffer of each node is partitioned into strata that broadcast only non-correlated data to edge servers via the network gateways. Furthermore, we propose a dynamic service migration technique to reconfigure the load across various edge servers. We assume this as an optimization problem and use two meta-heuristic algorithms, along with a migration approach, to maintain an optimal Gateway-Edge configuration in the network. These algorithms monitor the load at each server, and once it surpasses a threshold value (which is dynamically computed with a simple machine learning method), an exhaustive search is performed for an optimal and balanced periodic reconfiguration. The experimental results of our approach justify its efficiency for large-scale and densely populated IoT applications. © 2021 Elsevier B.V. *Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Venki Balasubramanian” is provided in this record**.
An improved congestion-controlled routing protocol for IoT applications in extreme environments
- Authors: Adil, Muhammad , Usman, Muhammad , Jan, Mian , Abulkasim, Hussein , Farouk, Ahmed , Jin, Zhanpeng
- Date: 2024
- Type: Text , Journal article
- Relation: IEEE Internet of Things Journal Vol. 11, no. 3 (2024), p. 3757-3767
- Full Text: false
- Reviewed:
- Description: The Internet of Things (IoT) has shown its presence in applications that require monitoring extreme environments, such as wildfires, military operations, and coastal areas, among others. In these applications, the IoT nodes are deployed in hazardous terrains where humanistic access is hard or not possible. Hence, to ensure reliable data transmission in these applications, novel routing protocols need to be designed due to the multihop nature of communication possessed by the deployed nodes. Currently, most of the routing protocols utilized by IoT nodes follow traditional approaches, which creates congestion and contention in the network. As a result, the network performance is degraded in terms of various communication metrics. To address this problem and improve the communication statistics in extreme environments, we propose a deep- Q -learning-enable-destination-sequenced distance-vector (DQL-DSDV) framework. DQL-DSDV focuses on selecting the next hop during communication. Initially, the DSDV protocol updates routing information for connected nodes. This information is subsequently utilized by the deep- Q -learning (DQL) algorithm to compute the next hop count. This computation is based on reward functions, known as Q-values, which are conceptualized as the distance between connected nodes by taking into account the traffic flow. These distinguishing operational features of DQL and DSDV ensure that DQL-DSDV minimizes the packet lost ratio, congestion, end-to-end delay, and communication cost with improved Quality of Service (QoS). During simulations, we observed significant improvement in these performance metrics, in the presence of the existing schemes. Despite that, we checked the computation complexity of the proposed approach with existing protocols, which demonstrated noteworthy outcomes just like the other metrics. © 2014 IEEE.
Data sharing in secure multimedia wireless sensor networks
- Authors: Usman, Muhammad , Jan, Mian , Xiangjian, He , Nanda, Priyadarsi
- Date: 2016
- Type: Text , Conference proceedings
- Relation: 2016 IEEE Trustcom/BigDataSE/ISPA;Tianjin, China; 23-26 August 2016 p. 590-597
- Full Text: false
- Reviewed:
- Description: The use of Multimedia Wireless Sensor Networks (MWSNs) is becoming common nowadays with a rapid growth in communication facilities. Similar to any other WSNs, these networks face various challenges while providing security, trust and privacy for user data. Provisioning of the aforementioned services become an uphill task especially while dealing with real-time streaming data. These networks operates with resource-constrained sensor nodes for days, months and even years depending on the nature of an application. The resource-constrained nature of these networks makes it difficult for the nodes to tackle real-time data in mission-critical applications such as military surveillance, forest fire monitoring, health-care and industrial automation. For a secured MWSN, the transmission and processing of streaming data needs to be explored deeply. The conventional data authentication schemes are not suitable for MWSNs due to the limitations imposed on sensor nodes in terms of battery power, computation, available bandwidth and storage. In this paper, we propose a novel quality-driven clustering-based technique for authenticating streaming data in MWSNs. Nodes with maximum energy are selected as Cluster Heads (CHs). The CHs collect data from member nodes and forward it to the Base Station (BS), thus preventing member nodes with low energy from dying soon and increasing life span of the underlying network. The proposed approach not only authenticates the streaming data but also maintains the quality of transmitted data. The proposed data authentication scheme coupled with an Error Concealment technique provides an energy-efficient and distortion-free real-time data streaming. The proposed scheme is compared with an unsupervised resources scenario. The simulation results demonstrate better network lifetime along with 21.34 dB gain in Peak Signal-to-Noise Ratio (PSNR) of received video data streams.
Error concealment for cloud-based and scalable video coding of hd videos
- Authors: Usman, Muhammad , He, Xiangjian , Lam, Kin-Man , Xu, Min , Bokhari, Syed , Chen, Jinjun , Jan, Mian
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE transactions on cloud computing Vol. 7, no. 4 (2019), p. 975-987
- Full Text: false
- Reviewed:
- Description: The encoding of HD videos faces two challenges: requirements for a strong processing power and a large storage space. One time-efficient solution addressing these challenges is to use a cloud platform and to use a scalable video coding technique to generate multiple video streams with varying bit-rates. Packet-loss is very common during the transmission of these video streams over the Internet and becomes another challenge. One solution to address this challenge is to retransmit lost video packets, but this will create end-to-end delay. Therefore, it would be good if the problem of packet-loss can be dealt with at the user's side. In this paper, we present a novel system that encodes and stores the videos using the Amazon cloud computing platform, and recover lost video frames on user side using a new Error Concealment (EC) technique. To efficiently utilize the computation power of a user's mobile device, the EC is performed based on a multiple-thread and parallel process. The simulation results clearly show that, on average, our proposed EC technique outperforms the traditional Block Matching Algorithm (BMA) and the Frame Copy (FC) techniques.
Marginal and average weight-enabled data aggregation mechanism for the resource-constrained networks
- Authors: Jan, Syed , Khan, Rahim , Khan, Fazlullah , Jan, Mian , Balasubramanian, Venki
- Date: 2021
- Type: Text , Journal article
- Relation: Computer Communications Vol. 174, no. (2021), p. 101-108
- Full Text: false
- Reviewed:
- Description: In Wireless Sensor Networks (WSNs), data redundancy is a challenging issue that not only introduces network congestion but also consumes a considerable amount of sensor node resources. Data redundancy occurs due to the spatial and temporal correlation among the data gathered by the neighboring nodes. Data aggregation is a prominent technique that performs in-network filtering of the redundant data and accelerates the knowledge extraction by eliminating the correlated data. However, most of the data aggregation techniques have lower accuracy as they do not cater for erroneous data from faulty nodes and pose an open research challenge. To address this challenge, we have proposed a novel, lightweight, and energy-efficient function-based data aggregation approach for a cluster-based hierarchical WSN. Our proposed approach works at two levels, i.e., at the node level and at the cluster head level. At the node level, the data aggregation is performed using Exponential Moving Average (EMA) and a threshold-based mechanism is adopted to detect any outliers for improving the accuracy of aggregated data. At the cluster head level, we have employed a modified version of Euclidean distance function to provide highly-refined aggregated data to the base station. Our experimental results show that our approach reduces the communication cost, transmission cost, energy consumption at the nodes and cluster heads, and delivers highly-refined and fused data to the base station. © 2021 Elsevier B.V. **Please note that there are multiple authors for this article therefore only the name of the first 5 including Federation University Australia affiliate “Venki Balasubramaniam” is provided in this record**
P2DCA: A Privacy-preserving-based data collection and analysis framework for IoMT applications
- Authors: Usman, Muhammad , Jan, Mian , He, Xiangjian , Chen, Jinjun
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE journal on selected areas in communications Vol. 37, no. 6 (2019), p. 1222-1230
- Full Text: false
- Reviewed:
- Description: The concept of Internet of Multimedia Things (IoMT) is becoming popular nowadays and can be used in various smart city applications, e.g., traffic management, healthcare, and surveillance. In the IoMT, the devices, e.g., Multimedia Sensor Nodes (MSNs), are capable of generating both multimedia and non-multimedia data. The generated data are forwarded to a cloud server via a Base Station (BS). However, it is possible that the Internet connection between the BS and the cloud server may be temporarily down. The limited computational resources restrict the MSNs from holding the captured data for a longer time. In this situation, mobile sinks can be utilized to collect data from MSNs and upload to the cloud server. However, this data collection may create privacy issues, such as revealing identities and location information of MSNs. Therefore, there is a need to preserve the privacy of MSNs during mobile data collection. In this paper, we propose an efficient privacy-preserving-based data collection and analysis (P2DCA) framework for IoMT applications. The proposed framework partitions an underlying wireless multimedia sensor network into multiple clusters. Each cluster is represented by a Cluster Head (CH). The CHs are responsible to protect the privacy of member MSNs through data and location coordinates aggregation. Later, the aggregated multimedia data are analyzed on the cloud server using a counter-propagation artificial neural network to extract meaningful information through segmentation. Experimental results show that the proposed framework outperforms the existing privacy-preserving schemes, and can be used to collect multimedia data in various IoMT applications.
PAAL : a framework based on authentication, aggregation, and local differential privacy for internet of multimedia things
- Authors: Usman, Muhammad , Jan, Mian , Puthal, Deepak
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Internet of Things Journal Vol. 7, no. 4 (2020), p. 2501-2508
- Full Text:
- Reviewed:
- Description: Internet of Multimedia Things (IoMT) applications generate huge volumes of multimedia data that are uploaded to cloud servers for storage and processing. During the uploading process, the IoMT applications face three major challenges, i.e., node management, privacy-preserving, and network protection. In this article, we propose a multilayer framework (PAAL) based on a multilevel edge computing architecture to manage end and edge devices, preserve the privacy of end-devices and data, and protect the underlying network from external attacks. The proposed framework has three layers. In the first layer, the underlying network is partitioned into multiple clusters to manage end-devices and level-one edge devices (LOEDs). In the second layer, the LOEDs apply an efficient aggregation technique to reduce the volumes of generated data and preserve the privacy of end-devices. The privacy of sensitive information in aggregated data is protected through a local differential privacy-based technique. In the last layer, the mobile sinks are registered with a level-two edge device via a handshaking mechanism to protect the underlying network from external threats. Experimental results show that the proposed framework performs better as compared to existing frameworks in terms of managing the nodes, preserving the privacy of end-devices and sensitive information, and protecting the underlying network. © 2014 IEEE.
PAWN: a payload‐based mutual authentication scheme for wireless sensor networks
- Authors: Jan, Mian , Nanda, Priyadarsi , Usman, Muhammad , He, Xiangjian
- Date: 2017
- Type: Text , Journal article
- Relation: Concurrency and computation Vol. 29, no. 17 (2017), p. e3986-n/a
- Full Text: false
- Reviewed:
- Description: Summary Wireless sensor networks (WSNs) consist of resource‐starving miniature sensor nodes deployed in a remote and hostile environment. These networks operate on small batteries for days, months, and even years depending on the requirements of monitored applications. The battery‐powered operation and inaccessible human terrains make it practically infeasible to recharge the nodes unless some energy‐scavenging techniques are used. These networks experience threats at various layers and, as such, are vulnerable to a wide range of attacks. The resource‐constrained nature of sensor nodes, inaccessible human terrains, and error‐prone communication links make it obligatory to design lightweight but robust and secured schemes for these networks. In view of these limitations, we aim to design an extremely lightweight payload‐based mutual authentication scheme for a cluster‐based hierarchical WSN. The proposed scheme, also known as payload‐based mutual authentication for WSNs, operates in 2 steps. First, an optimal percentage of cluster heads is elected, authenticated, and allowed to communicate with neighboring nodes. Second, each cluster head, in a role of server, authenticates the nearby nodes for cluster formation. We validate our proposed scheme using various simulation metrics that outperform the existing schemes.
Performance evaluation of high definition video streaming over mobile ad hoc networks
- Authors: Usman, Muhammad , Jan, Mian , He, Xiangjian , Alam, Muhammad
- Date: 2018
- Type: Text , Journal article
- Relation: Signal processing Vol. 148, no. (2018), p. 303-313
- Full Text: false
- Reviewed:
- Description: A unique combinational approach of QoS and QoE for multimedia traffic in MANETs is proposed in this paper.•A feedback-based multi-path transmission strategy is adopted to minimize the data loss during HD video streaming.•An EC technique based on multi-threading-based parallel processing is used to recover the lost video frames.•We use multiple objective evaluation metrics to test the performance of the EC technique on recovered video frames.•Subjective analysis is combined with objective evaluation using subjective scores and statistical analysis to maintain QoE. Video Service Providers (VSPs) can collect and analyze an enormous amount of multimedia data from various cloud storage centers using real-time big data systems for supporting various online customers. The infrastructure-less nature of Mobile Ad Hoc Networks (MANETs) makes the video streaming a challenging task for VSPs. High packet-loss probability in MANETs can create a notable distortion in the received video quality. In this paper, High Definition (HD) videos are streamed over MANETs. First, a transmission model is designed followed by a distortion model to estimate network distortions, such as packet-loss rate and end-to-end delay. Based on the proposed models, a video streaming framework is designed to efficiently utilize the available bandwidth in MANETs, minimize the network distortions, and improve Quality of Service (QoS). Later, an Error Concealment (EC) technique is used to conceal the lost/dropped video frames to improve the Quality of Experience (QoE). Experimental results show that our proposed video streaming framework outperforms the state-of-the-art routing protocols designed for MANETs, such as Destination-Sequenced Distance Vector (DSDV) and Optimized Link Sate Routing (OLSR) protocols. In the end, both subjective and objective evaluations are performed to evaluate the perceptual quality of the concealed video data.
PFARS : Enhancing throughput and lifetime of heterogeneous WSNs through power-aware fusion, aggregation, and routing scheme
- Authors: Khan, Rahim , Zakarya, Muhammad , Tan, Zhiyuan , Usman, Muhammad , Jan, Mian , Khan, Mukhtaj
- Date: 2019
- Type: Text , Journal article
- Relation: International Journal of Communication Systems Vol. 32, no. 18 (Dec 2019), p. 21
- Full Text:
- Reviewed:
- Description: Heterogeneous wireless sensor networks (WSNs) consist of resource-starving nodes that face a challenging task of handling various issues such as data redundancy, data fusion, congestion control, and energy efficiency. In these networks, data fusion algorithms process the raw data generated by a sensor node in an energy-efficient manner to reduce redundancy, improve accuracy, and enhance the network lifetime. In literature, these issues are addressed individually, and most of the proposed solutions are either application-specific or too complex that make their implementation unrealistic, specifically, in a resource-constrained environment. In this paper, we propose a novel node-level data fusion algorithm for heterogeneous WSNs to detect noisy data and replace them with highly refined data. To minimize the amount of transmitted data, a hybrid data aggregation algorithm is proposed that performs in-network processing while preserving the reliability of gathered data. This combination of data fusion and data aggregation algorithms effectively handle the aforementioned issues by ensuring an efficient utilization of the available resources. Apart from fusion and aggregation, a biased traffic distribution algorithm is introduced that considerably increases the overall lifetime of heterogeneous WSNs. The proposed algorithm performs the tedious task of traffic distribution according to the network's statistics, ie, the residual energy of neighboring nodes and their importance from a network's connectivity perspective. All our proposed algorithms were tested on a real-time dataset obtained through our deployed heterogeneous WSN in an orange orchard and also on publicly available benchmark datasets. Experimental results verify that our proposed algorithms outperform the existing approaches in terms of various performance metrics such as throughput, lifetime, data accuracy, computational time, and delay.
RaSEC : an intelligent framework for reliable and secure multilevel edge computing in industrial environments
- Authors: Usman, Muhammad , Jolfaei, Alireza , Jan, Mian
- Date: 2020
- Type: Text , Journal article
- Relation: IEEE Transactions on Industry Applications Vol. 56, no. 4 (2020), p. 4543-4551
- Full Text:
- Reviewed:
- Description: Industrial applications generate big data with redundant information that is transmitted over heterogeneous networks. The transmission of big data with redundant information not only increases the overall end-to-end delay but also increases the computational load on servers which affects the performance of industrial applications. To address these challenges, we propose an intelligent framework named Reliable and Secure multi-level Edge Computing (RaSEC), which operates in three phases. In the first phase, level-one edge devices apply a lightweight aggregation technique on the generated data. This technique not only reduces the size of the generated data but also helps in preserving the privacy of data sources. In the second phase, a multistep process is used to register level-two edge devices (LTEDs) with high-level edge devices (HLEDs). Due to the registration process, only legitimate LTEDs can forward data to the HLEDs, and as a result, the computational load on HLEDs decreases. In the third phase, the HLEDs use a convolutional neural network to detect the presence of moving objects in the data forwarded by LTEDs. If a movement is detected, the data is uploaded to the cloud servers for further analysis; otherwise, the data is discarded to minimize the use of computational resources on cloud computing platforms. The proposed framework reduces the response time by forwarding useful information to the cloud servers and can be utilized by various industrial applications. Our theoretical and experimental results confirm the resiliency of our framework with respect to security and privacy threats. © 1972-2012 IEEE.
SAMS: A seamless and authorized multimedia streaming framework for wmsn-based iomt
- Authors: Jan, Mian , Usman, Muhammad , He, Xiangjian , Ur Rehman, Ateeq
- Date: 2019
- Type: Text , Journal article
- Relation: IEEE internet of things journal Vol. 6, no. 2 (2019), p. 1576-1583
- Full Text: false
- Reviewed:
- Description: An Internet of Multimedia Things (IoMT) architecture aims to provide a support for real-time multimedia applications by using wireless multimedia sensor nodes that are deployed for a long-term usage. These nodes are capable of capturing both multimedia and nonmultimedia data, and form a network known as Wireless Multimedia Sensor Network (WMSN). In a WMSN, underlying routing protocols need to provide an acceptable level of Quality of Service (QoS) support for multimedia traffic. In this paper, we propose a Seamless and Authorized Streaming (SAMS) framework for a cluster-based hierarchical WMSN. The SAMS uses authentication at different levels to form secured clusters. The formation of these clusters allows only legitimate nodes to transmit captured data to their Cluster Heads (CHs). Each node senses the environment, stores captured data in its buffer, and waits for its turn to transmit to its CH. This waiting may result in an excessive packet-loss and end-to-end delay for multimedia traffic. To address these issues, a channel allocation approach is proposed for an intercluster communication. In the case of a buffer overflow, a member node in one cluster switches to a neighboring CH provided that the latter has an available channel for allocation. The experimental results show that the SAMS provides an acceptable level of QoS and enhances security of an underlying network.
Security and blockchain convergence with internet of multimedia things : current trends, research challenges and future directions
- Authors: Jan, Mian , Cai, Jinjin , Gao, Xiang-Chuan , Khan, Fazlullah , Mastorakis, Spyridon , Usman, Muhammad , Alazab, Mamoun , Watters, Paul
- Date: 2021
- Type: Text , Journal article
- Relation: Journal of Network and Computer Applications Vol. 175, no. (2021), p.
- Full Text:
- Reviewed:
- Description: The Internet of Multimedia Things (IoMT) orchestration enables the integration of systems, software, cloud, and smart sensors into a single platform. The IoMT deals with scalar as well as multimedia data. In these networks, sensor-embedded devices and their data face numerous challenges when it comes to security. In this paper, a comprehensive review of the existing literature for IoMT is presented in the context of security and blockchain. The latest literature on all three aspects of security, i.e., authentication, privacy, and trust is provided to explore the challenges experienced by multimedia data. The convergence of blockchain and IoMT along with multimedia-enabled blockchain platforms are discussed for emerging applications. To highlight the significance of this survey, large-scale commercial projects focused on security and blockchain for multimedia applications are reviewed. The shortcomings of these projects are explored and suggestions for further improvement are provided. Based on the aforementioned discussion, we present our own case study for healthcare industry: a theoretical framework having security and blockchain as key enablers. The case study reflects the importance of security and blockchain in multimedia applications of healthcare sector. Finally, we discuss the convergence of emerging technologies with security, blockchain and IoMT to visualize the future of tomorrow's applications. © 2020 Elsevier Ltd
Smart sensing-enabled decision support system for water scheduling in orange orchard
- Authors: Khan, Rahim , Zakarya, Muhammad , Balasubramanian, Venki , Jan, Mian , Menon, Varun
- Date: 2021
- Type: Text , Journal article
- Relation: IEEE Sensors Journal Vol. 21, no. 16 (2021), p. 17492-17499
- Full Text:
- Reviewed:
- Description: The scarcity of water resources throughout the world demands its optimum utilization in various sectors. Smart Sensing-enabled irrigation management systems are the ideal solutions to ensure the optimum utilization of water resources in the agriculture sector. This paper presents a wireless sensor network-enabled Decision Support System (DSS) for developing a need-based irrigation schedule for the orange orchard. For efficient monitoring of various in-field parameters, our proposed approach uses the latest smart sensing technology such as soil moisture, leaf-wetness, temperature and humidity. The proposed smart sensing-enabled test-bed was deployed in the orange orchard of our institute for approximately one year and successfully adjusted its irrigation schedule according to the needs and demands of the plants. Moreover, a modified Longest Common SubSequence (LCSS) mechanism is integrated with the proposed DSS for distinguishing multi-valued noise from the abrupt changing scenarios. To resolve the concurrent communication problem of two or more wasp-mote sensor boards with a common receiver, an enhanced RTS/CTS handshake mechanism is presented. Our proposed DSS compares the most recently refined data with pre-defined threshold values for efficient water management in the orchard. Irrigation activity is scheduled if water deficit criterion is met and the farmer is informed accordingly. Both the experimental and simulation results show that the proposed scheme performs better in comparison to the existing schemes. © 2001-2012 IEEE.