Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Entire DC Network

Stable Matching Based Resource Allocation For Service Provider's Revenue Maximization In 5g Networks, Ajay Pratap, Sajal K. Das Nov 2022

Stable Matching Based Resource Allocation For Service Provider's Revenue Maximization In 5g Networks, Ajay Pratap, Sajal K. Das

Computer Science Faculty Research & Creative Works

5G technology is foreseen to have a heterogeneous architecture with the various computational capability, and radio-enabled service providers (SPs) and service requesters (SRs), working altogether in a cellular model. However, the coexistence of heterogeneous network model spawns several research challenges such as diverse SRs with uneven service deadlines, interference management, and revenue maximization of non-uniform computational capacities enabled SPs. Thus, we propose a coexistence of heterogeneous SPs and SRs enabled cellular 5G network and formulate the SPs' revenue maximization via resource allocation, considering different kinds of interference, data rate, and latency altogether as an optimization problem and further propose a …


Transcriptional Regulatory Network Topology With Applications To Bio-Inspired Networking: A Survey, Satyaki Roy, Preetam Ghosh, Nirnay Ghosh, Sajal K. Das Nov 2022

Transcriptional Regulatory Network Topology With Applications To Bio-Inspired Networking: A Survey, Satyaki Roy, Preetam Ghosh, Nirnay Ghosh, Sajal K. Das

Computer Science Faculty Research & Creative Works

The advent of the edge computing network paradigm places the computational and storage resources away from the data centers and closer to the edge of the network largely comprising the heterogeneous IoT devices collecting huge volumes of data. This paradigm has led to considerable improvement in network latency and bandwidth usage over the traditional cloud-centric paradigm. However, the next generation networks continue to be stymied by their inability to achieve adaptive, energy-efficient, timely data transfer in a dynamic and failure-prone environment - the very optimization challenges that are dealt with by biological networks as a consequence of millions of years …


Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger Oct 2022

Virtual Sensor Middleware: Managing Iot Data For The Fog-Cloud Platform, Fadi Almahamid, Hanan Lutfiyya, Katarina Grolinger

Electrical and Computer Engineering Publications

This paper introduces the Virtual Sensor Middleware (VSM), which facilitates distributed sensor data processing on multiple fog nodes. VSM uses a Virtual Sensor as the core component of the middleware. The virtual sensor concept is redesigned to support functionality beyond sensor/device virtualization, such as deploying a set of virtual sensors to represent an IoT application and distributed sensor data processing across multiple fog nodes. Furthermore, the virtual sensor deals with the heterogeneous nature of IoT devices and the various communication protocols using different adapters to communicate with the IoT devices and the underlying protocol. VSM uses the publish-subscribe design pattern …


Efficient Data Collection In Iot Networks Using Trajectory Encoded With Geometric Shapes, Xiaofei Cao, Sanjay Kumar Madria Oct 2022

Efficient Data Collection In Iot Networks Using Trajectory Encoded With Geometric Shapes, Xiaofei Cao, Sanjay Kumar Madria

Computer Science Faculty Research & Creative Works

The mobile edge computing (MEC) paradigm changes the role of edge devices from data producers and requesters to data consumers and processors. MEC mitigates the bandwidth limitation between the edge server and the remote cloud by directly processing the large amount of data locally generated by the network of the internet of things (IoT) at the edge. An efficient data-gathering scheme is crucial for providing quality of service (QoS) within MEC. To reduce redundant data transmission, this paper proposes a data collection scheme that only gathers the necessary data from IoT devices (like wireless sensors) along a trajectory. Instead of …


Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta Apr 2022

Machine Learning-Based Device Type Classification For Iot Device Re- And Continuous Authentication, Kaustubh Gupta

Department of Computer Science and Engineering: Dissertations, Theses, and Student Research

Today, the use of Internet of Things (IoT) devices is higher than ever and it is growing rapidly. Many IoT devices are usually manufactured by home appliance manufacturers where security and privacy are not the foremost concern. When an IoT device is connected to a network, currently there does not exist a strict authentication method that verifies the identity of the device, allowing any rogue IoT device to authenticate to an access point. This thesis addresses the issue by introducing methods for continuous and re-authentication of static and dynamic IoT devices, respectively. We introduce mechanisms and protocols for authenticating a …


Assessing Security Risks With The Internet Of Things, Faith Mosemann Apr 2022

Assessing Security Risks With The Internet Of Things, Faith Mosemann

Senior Honors Theses

For my honors thesis I have decided to study the security risks associated with the Internet of Things (IoT) and possible ways to secure them. I will focus on how corporate, and individuals use IoT devices and the security risks that come with their implementation. In my research, I found out that IoT gadgets tend to go unnoticed as a checkpoint for vulnerability. For example, often personal IoT devices tend to have the default username and password issued from the factory that a hacker could easily find through Google. IoT devices need security just as much as computers or servers …


Dynamic Qos/Qoe-Aware Reliable Service Composition Framework For Edge Intelligence, Vahideh Hayyolalam, Safa Otoum, Öznur Özkasap Mar 2022

Dynamic Qos/Qoe-Aware Reliable Service Composition Framework For Edge Intelligence, Vahideh Hayyolalam, Safa Otoum, Öznur Özkasap

All Works

Edge intelligence has become popular recently since it brings smartness and copes with some shortcomings of conventional technologies such as cloud computing, Internet of Things (IoT), and centralized AI adoptions. However, although utilizing edge intelligence contributes to providing smart systems such as automated driving systems, smart cities, and connected healthcare systems, it is not free from limitations. There exist various challenges in integrating AI and edge computing, one of which is addressed in this paper. Our main focus is to handle the adoption of AI methods on resource-constrained edge devices. In this regard, we introduce the concept of Edge devices …


Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal Jan 2022

Crowdsensing Application On Coalition Game Using Gps And Iot Parking In Smart Cities, Hasan Abu Hilal, Narmeen Abu Hilal, Ala’ Abu Hilal, Tariq Abu Hilal

All Works

This paper provides an overview of crowdsensing and some of its applications. Crowdsensing is a part of the collecting data situations also; it’s built on a data system on multiple customer interactions. Moreover, writing the general information of the smart cities can be used to boost to received number frequency to send messages. This work mentioned the Crowdsensing layers that describe Mobile crowdsensing. The article focuses on crowdsensing layers, developed an application in Coalition Game using crowdsensing in terms of GPS. In addition, this paper discussed the Mobile crowdsensing system and how important the cloud is in serving the wireless …


Software Engineering Approaches For Tinyml Based Iot Embedded Vision: A Systematic Literature Review, Shashank Bangalore Lakshman, Nasir U. Eisty Jan 2022

Software Engineering Approaches For Tinyml Based Iot Embedded Vision: A Systematic Literature Review, Shashank Bangalore Lakshman, Nasir U. Eisty

Computer Science Faculty Publications and Presentations

Internet of Things (IoT) has catapulted human ability to control our environments through ubiquitous sensing, communication, computation, and actuation. Over the past few years, IoT has joined forces with Machine Learning (ML) to embed deep intelligence at the far edge. TinyML (Tiny Machine Learning) has enabled the deployment of ML models for embedded vision on extremely lean edge hardware, bringing the power of IoT and ML together. However, TinyML powered embedded vision applications are still in a nascent stage, and they are just starting to scale to widespread real-world IoT deployment. To harness the true potential of IoT and ML, …


Trajectory Design For Uav-Based Data Collection Using Clustering Model In Smart Farming, Tariq Qayyum, Zouheir Trabelsi, Asad Malik, Kadhim Hayawi Jan 2022

Trajectory Design For Uav-Based Data Collection Using Clustering Model In Smart Farming, Tariq Qayyum, Zouheir Trabelsi, Asad Malik, Kadhim Hayawi

All Works

Unmanned aerial vehicles (UAVs) play an important role in facilitating data collection in remote areas due to their remote mobility. The collected data require processing close to the end-user to support delay-sensitive applications. In this paper, we proposed a data collection scheme and scheduling framework for smart farms. We categorized the proposed model into two phases: data collection and data scheduling. In the data collection phase, the IoT sensors are deployed randomly to form a cluster based on their RSSI. The UAV calculates an optimum trajectory in order to gather data from all clusters. The UAV offloads the data to …


Multimedia Security And Privacy Protection In The Internet Of Things: Research Developments And Challenges, Wencheng Yang, Song Wang, Jiankun Hu, Nickson M. Karie Jan 2022

Multimedia Security And Privacy Protection In The Internet Of Things: Research Developments And Challenges, Wencheng Yang, Song Wang, Jiankun Hu, Nickson M. Karie

Research outputs 2022 to 2026

With the rapid growth of the internet of things (IoT), huge amounts of multimedia data are being generated from and/or exchanged through various IoT devices, systems and applications. The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT. First, we classify multimedia data into different types and security levels according to application areas. Then, we analyse and discuss the existing multimedia data protection …


Improving Age Of Information With Interference Problem In Long-Range Wide Area Networks, Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das Jan 2022

Improving Age Of Information With Interference Problem In Long-Range Wide Area Networks, Preti Kumari, Hari Prabhat Gupta, Tanima Dutta, Sajal K. Das

Computer Science Faculty Research & Creative Works

Low Power Wide Area Networks (LPWAN) offer a promising wireless communications technology for Internet of Things (IoT) applications. Among various existing LPWAN technologies, Long-Range WAN (LoRaWAN) consumes minimal power and provides virtual channels for communication through spreading factors. However, LoRaWAN suffers from the interference problem among nodes connected to a gateway that uses the same spreading factor. Such interference increases data communication time, thus reducing data freshness and suitability of LoRaWAN for delay-sensitive applications. To minimize the interference problem, an optimal allocation of the spreading factor is requisite for determining the time duration of data transmission. This paper proposes a …