-
Article
Privacy-preserving V2I communication and secure authentication using ECC with physical unclonable function
In recent years, service provided based on the location has brought a tremendous change in our lives. However, one of the biggest challenges is to preserve users’ privacy which upon leakage could have disastro...
-
Article
Correction: Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
-
Article
Privacy preservation in the internet of vehicles using local differential privacy and IOTA ledger
With the growth in Vehicular Ad Hoc Network (VANET) technology, many vehicular devices are communicating with each other and with the edge nodes, generating a massive amount of data. One of the biggest challen...
-
Article
Open AccessAn infrastructure-assisted job scheduling and task coordination in volunteer computing-based VANET
Vehicular networks as the key enablers in Intelligent Transportation Systems (ITS) and the Internet of Things (IoT) are key components of smart sustainable cities. Vehicles as a significant component of smart ...
-
Article
Achieving data privacy for decision support systems in times of massive data sharing
The world is suffering from a new pandemic of Covid-19 that is affecting human lives. The collection of records for Covid-19 patients is necessary to tackle that situation. The decision support systems (DSS) a...
-
Article
Collaborative multi-agents in dynamic industrial internet of things using deep reinforcement learning
Sustainable cities are envisioned to have economic and industrial steps toward reducing pollution. Many real-world applications such as autonomous vehicles, transportation, traffic signals, and industrial auto...
-
Chapter
A Meta Sensor-Based Autonomous Vehicle Safety System for Collision Avoidance Using Li-Fi Technology
The primary objective of an autonomous vehicle (AV) is to provide a safe and driverless vehicle experience on the road. To accomplish collision free journey, an AV collects data from external entities such as ...
-
Article
Resource allocation in SDN based 5G cellular networks
The deployment and operation of Fifth Generation (5G) network is expected in 2020. The 5G aim to provide high throughput, reduced latency, increased capacity and a shift from service-orientation to user-orient...
-
Article
A reliability aware protocol for cooperative communication in cognitive radio networks
One of the challenging tasks in cognitive radio (CR) networks is to agree on a common control channel to exchange control information. This paper presents a novel medium access control (MAC) protocol for CR ne...
-
Chapter and Conference Paper
On Efficiency of Scrambled Image Forensics Service Using Support Vector Machine
Images can be a very good evidence during investigation of a crime scene. At the same time they can also contain very personal information which should not be exposed without the consent of the involved people
-
Chapter
Internet Traffic Flow Analysis in Fog Computing: An Experimental Case Study
Fog computing (FC) is a new model, which extends cloud computing services to the edge of computing networks. Different aspects of FC, such as security, have been extensively explored in the existing research. ...
-
Chapter
Big Data in Healthcare: A Survey
Big Data is all about procedures, processes, tools and techniques used which an organization can manipulate, create and manage very large amount of data and storage facilities. Healthcare is one of the biggest...
-
Chapter
Seven Pillars to Achieve Energy Efficiency in High-Performance Computing Data Centers
Nowadays, data centers and high-performance computing (HPC) systems are crucial for intensive computing environments. The energy efficiency in HPC is an evergreen problem. Moreover, energy-efficient design and...
-
Chapter
Scheduling Algorithms for High-Performance Computing: An Application Perspective of Fog Computing
High-performance computing (HPC) demands many computers to perform multiple tasks concurrently and efficiently. For efficient resource utilization and for better response time, different scheduling algorithms ...
-
Chapter
Exploring IoT Applications for Disaster Management: Identifying Key Factors and Proposing Future Directions
In the last few decades, disasters made a huge loss to human beings, natural resources, and other assets. As we are living in an era of technology, there can be no other way better than using ICT (information ...
-
Article
ESOT: a new privacy model for preserving location privacy in Internet of Things
The Internet of Things (IoT) means connecting everything with every other thing through the Internet. In IoT, millions of devices communicate to exchange data and information with each other. During communicat...
-
Chapter and Conference Paper
Online Signature Verification: A Survey on Authentication in Smartphones
Smart phones are advance generation of mobile phones. They enable us to access a large variety of services like data storages, voice communication, wireless connectivity etc. As the number of services increase...
-
Article
Open AccessErratum to: A survey on MAC protocols for complex self-organizing cognitive radio networks
-
Article
Open AccessA survey on MAC protocols for complex self-organizing cognitive radio networks
Complex self-organizing cognitive radio (CR) networks serve as a framework for accessing the spectrum allocation dynamically where the vacant channels can be used by CR nodes opportunistically. CR devices must...
-
Article
Conceivable security risks and authentication techniques for smart devices: A comparative evaluation of security practices
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligator...