Processing math: 100%
Juan Xian - IEEE Xplore Author Profile

Showing 1-25 of 417 results

Filter Results

Show

Results

The distributed Internet of Things (IoT) systems facilitate real-time services through the composition of loosely coupled microservices. The composed IoT service is the output of multiple microservices, executed at computationally capable edge or fog nodes, which we consider as the facility nodes (FNs). However, the service composition process in IoT microservice architectures is abstracted from t...Show More
This work addresses the problem of ensuring service availability, trust, and profitability in sensor-cloud architecture designed to Sensors-as-a-Service (Se-aaS) using IoT generated data. Due to the requirement of geographically distributed wireless sensor networks for Se-aaS, it is not always possible for a single Sensor-cloud Service Provider (SCSP) to meet the end-users requirements. To address...Show More
The heterogeneity in IoT-based health monitoring devices and communication protocols leads to diverse system designs and configurations resulting in uncertain outcomes. Most present-day eHealth approaches focus on optimizing the performance of already designed systems (hardware, network, and software) rather than optimizing the system design itself. A reliable eHealth monitoring system must use ap...Show More
Blockchain is highly dependent on network topology and routing paths for efficient operation. The speed and effectiveness of mining are impacted by network topology, as a well-defined routing path improves the speed of mining by the faster exchange of data for verification. However, high traffic on the path, caused by the exchange of messages among the miners leads to delays in the routing path an...Show More
The process of adding new blocks to a blockchain, known as mining, is an energy intensive task. This can be especially challenging over low-power Internet-of-Things (IoT) nodes with limited resources. Any blockchain protocol over IoT must consider the effect of mining on the actual power expenditure and performance of the nodes. In this work, we design a thorough experiment whereby we obtain an em...Show More
Airports, being high-risk zones, require robust passenger verification systems. However, current cloud-based facial recognition systems often suffer from single-point-of-failure vulnerabilities. To address this, a blockchain-based airport access mechanism is proposed utilizing Ethereum smart contracts. In this system, passengers requesting access have their facial embeddings verified by a distribu...Show More
This work proposes routeNow, a routing algorithm designed for wireless Software Defined Internet of Things by dynamic path relaxation based on real-time heuristic that always gives the best least hop path. This is aimed towards providing an alternative backup network for a smart hospital that functions independently on the failure of the primary hospital network. Given a pair of source and destina...Show More
The significant increase in mobile phone usage in the past few decades has resulted in various health hazards in individuals due to continuous exposure to radiation for a longer duration of time. To address the health hazards caused by mobile phone radiation, in this paper, we propose a mobile application (app)-based recommendation system to analyze smartphone usage patterns and Generative Artific...Show More
The future social metaverse traffic demands over 5G and beyond (B5G) networks can be supported by efficiently placing the user plane function (UPF). Third-generation partnership project (3GPP) standard mandates that all application traffic in B5G core network must be routed through a UPF before it can reach its destination. In this regard, we propose an optimal UPF placement algorithm, referred to...Show More
Bacterial networks-based novel healthcare applications integrated with the Internet of Bio-Nano Things (IoBNT) have been on the rise, particularly due to their high efficacy in delivering drugs at targeted sites. Nevertheless, these networks are vulnerable to various cyber security risks such as unauthorized access, data tampering, and malicious attacks from internal and external intruders. By lev...Show More
In this work, we propose “SocioLink”, a user-centric blockchain for the management of social media data. The current data management landscape faces various issues, including centralized control, data breaches, and limited data portability, which collectively erode user privacy and control over their personal information. User-centric solutions are potential responses to these issues; however, the...Show More
This work presents the problem of optimal resource orchestration for green Sensor-as-a-Service (Se-aaS) in the presence of multiple sensor-cloud service providers (SCSPs) and vehicle owners (VOs). It leads to an oligopolistic market, where the shareholders may adopt unfair means to maximize revenue. Therefore, we consider the trust factors among the SCSPs and the VOs and ensure high QoS to minimiz...Show More
Deep Learning (DL) methods such as Convolutional Neural Network (CNN) learning approaches are used to extract features from images through convolution operation. These features are widely used for image classification, object detection or segmentations tasks. But a high testing accuracy needs lot of input images for training, whereas a human brain can do similar tasks with a few training samples. ...Show More
In this work, we introduce a reliability-aware task service framework, named RATE, designed for fog-enabled Internet of Vehicle (IoV) environments. In RATE, each fog entity makes an efficient decision for task service while considering the task requirements and availability of the resources. Existing works focus mainly on delay and energy as the main factor of decision-making. However, in a mobile...Show More
This article proposes attribute-based broadcast proxy (ABP) re-encryption with coalitional game theory—a scheme to share encrypted cloud data with Internet of Things (IoT) devices. The scheme reduces the decryption costs on the receiver's side. In the case of sharing data with a subgroup of IoT devices, i.e., identities, where attributes satisfy a particular access policy, and the cardinality of I...Show More
In this research work, we propose – UtilityChain –, a method for efficient resource allocation of miners involved in both mining and service-related activities. The aim of this approach is to enhance the miner's utility (overall efficiency) in response to the increasing need for real-time data processing generated by IoT devices. The security of the data is a crucial matter of concern, and the int...Show More
In this paper, an end-to-end pricing mechanism, termed as Co-Safe, is proposed to gratify the sensor and vehicle owners (VOs) as well as the Safety Service Providers (SSPs) for the Safety-as-a-Service (Safe-aaS) platform. Safe-aaS platform delivers safety-linked decisions to the customers/users, based on their requirement. Practically, the service regions of the SSPs are confined and may overlap w...Show More
This work proposes an optimal pricing scheme, named PCAM, for Camera-Network-as-a-Service (CNaaS) platform to characterize the complex monetary transactions among the participating actors. In CNaaS, a camera-network service provider (CNSP) delivers different applications to multiple end-users (EUs) in the form of Virtual Camera Netorks (VCNs) in exchange for usage-based service charge. On the othe...Show More
Mesenchymal stem cell (MSC)-derived exosomes are recognized as an unparalleled therapy for tissue damage rendered by COVID-19 infection and subsequent hyper-inflammatory immune response. However, the natural targeting mechanism of exosomes is challenging to detect the damaged tissue over long diffusion distances efficiently. The coordinated movement of exosomes is desired for successful identifica...Show More
The shared medium and multihop nature of wireless multimedia sensor networks (WMSNs) involving scalar and camera sensor (CS) nodes poses fundamental challenges to the design of an effective scheme, which can offer, reliable packet delivery, and resource allocation across different network flows. These flows are incurred by multiple events occurring concurrently in the monitored region in presence ...Show More
The severe COVID-19 infection often leads to “Cytokine Release Syndrome (CRS)”, which is a serious adverse medical condition causing multiple organ failures. Anti-cytokine therapy has shown promising results for the treatment of the CRS. As part of the anti-cytokine therapy, the immuno-suppressants or anti-inflammatory drugs are infused to block the release of cytokine molecules. However, determin...Show More
In this work, we propose a reconfigurable blockchain (BC)—“PerBlocks”—for handling data from heterogeneous activities and achieving scalability as well as throughput in the industrial environment. Typically, industries deal with the pervasive deployment of various sensors, resulting in heterogeneous data with varying services. The adoption of conventional BC satisfies transparency, immutability, a...Show More
Due to the increasing number of service requests from the vehicles, the load at the road side units (RSUs) increases, which affects the delay-sensitive vehicle services. In Internet of Vehicles (IoV), the vehicles can communicate directly with other vehicles and take help from the vehicles to cooperatively accomplish a task. However, it is very challenging to cooperatively execute a task in an IoV...Show More
Stress has become an increasing concern among college students. Passive sensing techniques allow the extraction of stress-related parameters from a student. These techniques use highly resource-intensive machine learning algorithms to predict the stress levels of a student from these parameters. However, the current techniques do not provide any social communication solution for students suffering...Show More
The advent of Internet of Things (IoT) has resulted in a massive influx of data from remote networks, with big data originators located at the edge of the Internet. Software-Defined Networking (SDN) has recently emerged as an effective tool for centralized network control, including access nodes, to manage and optimize the flow of data generated by a vast number of IoT devices. However, remote and...Show More