scispace - formally typeset
Search or ask a question

Showing papers by "Ata Ullah published in 2021"


Journal ArticleDOI
TL;DR: A survey of different data collection and secure transmission schemes where fog computing based architectures are considered is presented in this article, where fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio.
Abstract: Internet of medical things (IoMT) is getting researchers’ attention due to its wide applicability in healthcare Smart healthcare sensors and IoT enabled medical devices exchange data and collaborate with other smart devices without human interaction to securely transmit collected sensitive healthcare data towards the server nodes Alongside data communications, security and privacy is also quite challenging to securely aggregate and transmit healthcare data towards Fog and cloud servers We explored the existing surveys to identify a gap in literature that a survey of fog-assisted secure healthcare data collection schemes is yet contributed in literature This paper presents a survey of different data collection and secure transmission schemes where Fog computing based architectures are considered A taxonomy is presented to categorize the schemes Fog assisted smart city, smart vehicle and smart grids are also considered that achieve secure, efficient and reliable data collection with low computational cost and compression ratio We present a summary of these scheme along with analytical discussion Finally, a number of open research challenges are identified Moreover, the schemes are explored to identify the challenges that are addressed in each scheme

104 citations


Journal ArticleDOI
TL;DR: The Robust Cluster Based Routing Protocol (RCBRP) is presented to identify the routing paths where less energy is consumed to enhances the network lifespan and consumes less energy and balances the load by clustering the smart devices.
Abstract: The Internet of Things (IoT) is gaining attention because of its broad applicability, especially by integrating smart devices for massive communication during sensing tasks. IoT-assisted Wireless Sensor Networks (WSN) are suitable for various applications like industrial monitoring, agriculture, and transportation. In this regard, routing is challenging to nd an ef cient path using smart devices for transmitting the packets towards big data repositories while ensuring ef cient energy utilization. This paper presents the Robust Cluster Based Routing Protocol (RCBRP) to identify the routing paths where less energy is consumed to enhances the network lifespan. The scheme is presented in six phases to explore ow and communication. We propose the two algorithms: i) energy-ef cient clustering and routing algorithm and ii) distance and energy consumption calculation algorithm. The scheme consumes less energy and balances the load by clustering the smart devices. Our work is validated through extensive simulation using Matlab. Results elucidate the dominance of the proposed scheme is compared to counterparts in terms of energy consumption, the number of packets received at BS and the number of active and dead nodes. In the future, we shall consider edge computing to analyze the performance of robust clustering.

43 citations


Journal ArticleDOI
TL;DR: The concept of hybrid human-artificial intelligence (H-AI) into a semi-autonomous driving system is introduced and a theoretical architecture based on it is proposed, which provides a new perspective for the future development of autonomous driving.
Abstract: With the continuous development of Artificial Intelligence (AI), autonomous driving has become a popular research area. AI enables the autonomous driving system to make a judgment, which makes studies on autonomous driving reaches a period of booming development. However, due to the defects of AI, it is not easy to realize a general intelligence, which also limits the research on autonomous driving. In this paper, we summarize the existing architectures of autonomous driving and make a taxonomy. Then we introduce the concept of hybrid human-artificial intelligence (H-AI) into a semi-autonomous driving system. For making better use of H-AI, we propose a theoretical architecture based on it. Given our architecture, we classify and overview the possible technologies and illustrate H-AI's improvements, which provides a new perspective for the future development. Finally, we have identified several open research challenges to attract the researchers for presenting reliable solutions in this area of research.

29 citations


Journal ArticleDOI
TL;DR: In this article, the authors presented a systematic literature review (SLR) of the multiple security schemes for WBANs and identified a research question to analyze the possibility of several attacks while preserving the memory constraints.
Abstract: Advances in remote interchanges, the internet of nano things have empowered the wireless body area networks (WBAN) to end up a promising systems of networking standard. It involves interconnected tiny sensors to gather ongoing biomedical data and transmit over the network for further analysis. Due to possibility of active and passive number of attacks, the healthcare data security is quite essential and challenging. This paper presents the systematic literature review (SLR) of the multiple security schemes for WBAN. We have identified a research question to analyses the possibility of several attacks while preserving the memory constraints. We have performed quality valuation to ensure the relevance of schemes with the research question. Moreover, the schemes are considered from 2016 to 2020 to focus on recent work. In literature, several existing schemes are explored to identify how the security is enhanced for exchanging patients' healthcare data. The data security schemes using AES, ECC, SHA-1 and hybrid encryption are analyzed based on influential traits. Several methodologies for data security in WBAN are considered and the most appropriate methodologies are appraised. We also analyses the security for different attack scenarios.

26 citations


Journal ArticleDOI
TL;DR: In this article, the authors present an extensive overview of different continuous object tracking schemes which involve energy efficiency, boundary detection, communication, data aggregation, and network structural design in literature with the aid of featuring taxonomy.
Abstract: With the new age of data innovation, the Internet of Things (IoT) proliferation has drawn enormous thought and has applied to help applications in different fields i.e., natural assurance, military observing, and industrial applications. WSNs are the essential segment of IoT for monitoring as well as tracking. The most preeminent applications provide confinement and identification of continuous objects i.e. wildfire, toxic gas, bio synthetics concoctions, and so forth. In the case of continuous objects such as fire and toxic gases are detected to identify the boundary of damage and alert teams for rescue efforts. It is also helpful in identifying safe paths for rescue. We have investigated various existing surveys that carried out different concepts associated with continuous object tracking and find out the deficit of boundary detection of object. In order to replete the present cleft of analysis, we have inspected various current state-of-the-art works on boundary detection of a continuous object that has yet not been added to the current writing. This paper presents an extensive overview of different continuous object tracking schemes which involve energy efficiency, boundary detection, communication, data aggregation, and network structural design in literature with the aid of featuring taxonomy. We summarized, compared, and classified these schemes along with their analysis and performance. Moreover, for further evaluation mechanism, strengths and weaknesses of these schemes are presented. Finally, various state-of-the-art open research challenges are identified. Moreover, there is a need to overcome these challenges through novel and reliable arrangements by the researchers.

16 citations


Journal ArticleDOI
TL;DR: In this paper, the authors proposed an efficient and secure data transmission and aggregation (ESDTA) scheme to enhance aggregation efficiency and data security in the Internet of Medical Things (IoMT) by employing the Secure Message Aggregation (SMA) algorithm and Secure Message Decryption (SMD) algorithm at the Mobile Node (MN) and Fog Node (FN).
Abstract: Internet of Medical Things (IoMT) is becoming an essential part of remote health monitoring due to the evolution of medical wireless sensors and intelligent communication technologies. IoT-based healthcare applications are employed in the medical centers to provide continuous health monitoring of a patient. However, recent smart medical devices have limited resources to handle the huge amount of healthcare data. IoMT faces several challenging issues, like security, privacy, anonymity, and interoperability. In data aggregation and communication, the privacy and security of medical information is a demanding task. Therefore, we proposed a suitable scheme to overcome the limitations of existing research studies. This paper presents an Efficient and Secure Data Transmission and Aggregation (ESDTA) scheme to enhance aggregation efficiency and data security. Our proposed work provides secure data aggregation and data forwarding of healthcare parameter values by employing the Secure Message Aggregation (SMA) algorithm and Secure Message Decryption (SMD) algorithm at the Mobile Node (MN) and Fog Node (FN), respectively. From a security perspective, the proposed scheme preserves the data integrity and also protect against several security threats like data fabrication and replay attack. The proposed scenario is simulated through simulation tool NS 2.35. The simulation results prove that aggregation at the MN effectively reduces transmission and communication costs. Furthermore, the effective computation at the FN minimizes the storage and computational cost at the cloud server. Thus, the analysis of the proposed scheme shows the supremacy of our proposed work. We compare our scheme with other related secure data aggregation-based schemes in terms of communication cost, energy consumption, resilience, storage and computational cost.

15 citations


Journal ArticleDOI
TL;DR: In this paper, a fog-assisted congestion avoidance approach for Smooth Message Dissemination (SMD) is presented, which selects the appropriate next-hop node using layered model.

10 citations