Publications Archives - Sensor Systems and The Internet of Things /internetofthings/category/publications/ ĐÓ°ÉÔ­´´ University Tue, 03 Jun 2025 16:28:27 +0000 en-US hourly 1 https://wordpress.org/?v=6.3.1 IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations /internetofthings/2025/iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations/?utm_source=rss&utm_medium=rss&utm_campaign=iot-enabled-e-health-systems-navigating-security-challenges-and-strategic-recommendations Tue, 03 Jun 2025 16:28:27 +0000 /internetofthings/?p=2020 Ali Farhat, Mohannad Abu Issa, Abdelrahman Eldosouky, Mohamed Ibnkahla, Jason Jaskolka, and Ashraf Matrawy

The Internet of Things (IoT) facilitates the integration of diverse devices for data collection and exchange, significantly impacting various domains, including e-health. E-health systems leverage IoT to monitor patients’ health through smart medical devices, enabling local and remote data access. Despite the benefits, the increased connectivity introduces new cybersecurity risks, as malicious actors can exploit vulnerabilities to access sensitive patient information. Traditional security measures have mostly focused on securing individual devices through authentication and encryption. However, many medical devices lack built-in security features or the ability to be updated. To this end, this paper proposes a shift towards system-level security for e-health IoT systems, emphasizing the protection of the entire system rather than just the devices. The paper outlines best practices and recommendations to enhance security, improve interoperability, and address current gaps. These recommendations and guidelines are introduced to support medical institutions, device manufacturers, policymakers, and governments in developing robust security frameworks and policies. The recommendations are designed to be actionable across various levels of the e-health system, fostering secure and interoperable e-health solutions.

A. Farhat, M. A. Issa, A. Eldosouky, M. Ibnkahla, J. Jaskolka and A. Matrawy, “IoT-Enabled e-Health Systems: Navigating Security Challenges and Strategic Recommendations,” 2025 IEEE 22nd International Multi-Conference on Systems, Signals & Devices (SSD), Monastir, Tunisia, 2025, pp. 1-6, doi: 10.1109/SSD64182.2025.10990002.

For more details: 

]]>
Towards Intelligent Intent-based Network Slicing for IoT Systems: Enabling Technologies, Challenges, and Vision /internetofthings/2025/towards-intelligent-intent-based-network_slicing/?utm_source=rss&utm_medium=rss&utm_campaign=towards-intelligent-intent-based-network_slicing Mon, 19 May 2025 14:42:02 +0000 /internetofthings/?p=1996 Dana Haj Hussein, Mohamed Ibnkahla

The rapid integration of intelligence and automation into future Internet of Things (IoT) systems, empowered by Intent-based Networking (IBN) and Network Slicing (NS) technologies, is transforming the way novel services are envisioned and delivered. The automation capabilities of IBN depend significantly on key facilitators, including data management and resource management. A robust data management methodology is essential for leveraging large-scale data, encompassing service-specific and network-specific data, enabling IBN systems to extract insights and facilitate real-time decision-making. Another critical enabler involves deploying intent-based mechanisms within an NS system that translate and ensure user intents by mapping them to precise Management and Orchestration (MO) commands. Nevertheless, data management in IoT systems faces significant security and operational challenges due to the diverse range of services and technologies involved. Furthermore, intent-based resource management demands intelligent proactive, and adaptive MO mechanisms that can fulfill a wide range of intent requirements. Existing surveys within the field have focused on technology-specific advancements, often overlooking these challenges. In response, this paper defines Intelligent Intent-Based Network Slicing (I-IBNS) systems exemplifying the integration of intelligent IBN and NS for the MO of IoT systems. Furthermore, the paper surveys I-IBNS systems, focusing on two critical domains: resource management and data management. The resource management segment examines recent developments in IBN mechanisms within an NS system. Meanwhile, the second segment explores data management complexities within IoT networks. Moreover, the paper envisions the roles of intent, NS, and the IoT ecosystem, thereby laying the foundation for future research directions.

D. H. Hussein and M. Ibnkahla, “Towards Intelligent Intent-based Network Slicing for IoT Systems: Enabling Technologies, Challenges, and Vision,” in IEEE Transactions on Network and Service Management, doi: 10.1109/TNSM.2025.3570052.

For more details: 

]]>
IEEE Internet of Things Journal: Interaction-aware Trust Management Scheme for IoT Systems With Machine Learning-Based Attack Detection /internetofthings/2025/interaction-aware-trust-management-scheme-for-iot-systems-with-machine-learning-based-attack-detection/?utm_source=rss&utm_medium=rss&utm_campaign=interaction-aware-trust-management-scheme-for-iot-systems-with-machine-learning-based-attack-detection Thu, 20 Mar 2025 18:31:30 +0000 /internetofthings/?p=1975 Ali Farhat, Abdelrahman Eldosouky, Mohamed Ibnkahla, and Ashraf Matrawy

The recent Internet of Things (IoT) adoption has revolutionized various applications while introducing significant security and privacy challenges. Traditional security solutions are unsuitable for IoT systems due to their dynamicity, heterogeneity, and resource constraints. Trust-based solutions are emerging as promising alternatives due to their ability to track the dynamic behavior in IoT systems. However, existing trust management schemes are implemented at the device level, raising several challenges, including device modification that compromises certification and scalability, increased network overhead, and higher device resource utilization. To address these challenges, this paper proposes a novel trust management scheme that shifts its implementation to a higher layer in the IoT system, specifically to the IoT access layer (e.g., gateway). The proposed scheme establishes trust based on typical device interactions with the gateway without requiring additional information from the device. It relies on objective attributes spanning communication, security, and advanced dimensions to compute the trust value of an IoT device. Additionally, an Artificial Neural Network (ANN) is integrated to determine if the device acts maliciously or behaves normally. Simulation results demonstrate a notable improvement in the detection rate, primarily due to incorporating the proposed ANN, compared to the threshold-based approaches in the literature. Overall, the improvements highlight the significant advantage of the proposed scheme’s robustness.

A. Farhat, A. Eldosouky, M. Ibnkahla and A. Matrawy, “Interaction-aware Trust Management Scheme for IoT Systems With Machine Learning-Based Attack Detection,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2025.3539646

For more details: 

]]>
2023 IEEE Globecom: IoT Trust Establishment Through System Level Interactions and Communication Attributes /internetofthings/2025/iot-trust-establishment-globecom/?utm_source=rss&utm_medium=rss&utm_campaign=iot-trust-establishment-globecom Thu, 20 Mar 2025 18:14:25 +0000 /internetofthings/?p=1971 Ali Farhat, Abdelrahman Eldosouky, Mohamed Ibnkahla, and Ashraf Matrawy

The integration of Internet of Things (loT)-based solutions in various applications introduced several challenges in security and privacy. Due to the nature of loT systems, traditional security solutions are not suitable for solving these challenges. Researchers introduced trust management as a viable solution due to its ability to track the dynamic behavior of loT devices. Compared to traditional security solutions, trust does not require an extensive amount of resources. Several loT trust solutions rely on distributed models that increase network overhead and consume additional energy. To this end, this work proposes a trust management scheme for loT systems that can be implemented at the access layer of loT systems. The proposed scheme establishes trust for loT devices through device-system interaction and communication attributes without requiring any additional information or modifications to the device. The trust value is computed using the trust attributes over a specific window size of interactions and using a forget factor. Simulation results show the ability of the proposed scheme to track the behavior of loT devices. Results also show that the proposed scheme maintains high performance in detecting persistent attacks compared to existing schemes from the literature, while improving the detection rate of ON-OFF attacks by 15%.

Farhat, A. Eldosouky, M. Ibnkahla and A. Matrawy, “IoT Trust Establishment Through System Level Interactions and Communication Attributes,” GLOBECOM 2023 – 2023 IEEE Global Communications Conference, Kuala Lumpur, Malaysia, 2023, pp. 5919-5924, doi: 10.1109/GLOBECOM54140.2023.10436821.

For more details: 

]]>
2022 IEEE WCNC: An IoT-Aware VNF Placement Proof of Concept in a Hybrid Edge-Cloud Smart City Environment /internetofthings/2022/an-iot-aware-vnf-placement-proof-of-concept-in-a-hybrid-edge-cloud-smart-city-environment/?utm_source=rss&utm_medium=rss&utm_campaign=an-iot-aware-vnf-placement-proof-of-concept-in-a-hybrid-edge-cloud-smart-city-environment Mon, 16 May 2022 10:35:32 +0000 /internetofthings/?p=1856 Yousef Rafique, Aris Leivadeas, and Mohamed Ibnkahla

Network operators are faced with a strategic puzzle on how to balance limited resource availability, dynamic IoT traffic requirements, and dynamic IoT device behavior in an end-to-end communication paradigm. This work formally defines the IoT-aware Virtual Network Function (VNF) placement problem. We consider realistic IoT traffic statistics from a smart-city PoC to evaluate an indicative set of placement algorithms with different objective functions under static and dynamic traffic scenarios, to study their impact on the overall performance.

Y. Rafique, A. Leivadeas, and M. Ibnkahla, “An IoT-Aware VNF Placement Proof of Concept in a Hybrid Edge-Cloud Smart City Environment,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), Apr. 2022, pp. 1395–1400. doi: 10.1109/WCNC51071.2022.9772004.

For more details: 

]]>
2022 IEEE WCNC: Irradiance and Temperature Forecasting for Energy Harvesting Units in IoT Sensors using SARIMA-KF /internetofthings/2022/irradiance-and-temperature-forecasting-for-energy-harvesting-units-in-iot-sensors-using-sarima-kf/?utm_source=rss&utm_medium=rss&utm_campaign=irradiance-and-temperature-forecasting-for-energy-harvesting-units-in-iot-sensors-using-sarima-kf Mon, 16 May 2022 09:46:34 +0000 /internetofthings/?p=1860 Mohamed Azzam, Zied Bouida, and Mohamed Ibnkahla

Although the market valuation and adoption of IoT in various sectors is in an uptrend, the actual deployment is lagging when compared to the industrial forecasted data. The main reason behind this drawback is the lifespan of IoT devices due to their limited battery capacities. A solution to the problem is to deploy energy harvesting units (e.g., solar to replenish the batteries). However, due to the time varying availability of both irradiance and temperature and their effect on the power output, it is essential to predict both variables. To this end, we propose in this paper a prediction system that does not consume a lot of energy and that can be deployed on low computational nodes. This model consists of a Seasonal Auto Regressive Integrated Moving Average (SARIMA) with a Kalman filtering (KF) component. We build this model using an actual dataset for Ottawa, Ontario, Canada. We then demonstrate its effectiveness by presenting the results for randomly selected days in the Winter Season. In this context, we show that the SARIMA-KF outperforms the SARIMA in all scenarios with an average error reduction of 59.3%.

M. Azzam, Z. Bouida, and M. Ibnkahla, “Irradiance and Temperature Forecasting for Energy Harvesting Units in IoT Sensors using SARIMA-KF,” in 2022 IEEE Wireless Communications and Networking Conference (WCNC), Apr. 2022, pp. 1701–1706. doi: 10.1109/WCNC51071.2022.9771763.

For more details: 

]]>
IEEE Internet of Things Journal: Edge-Based Federated Deep Reinforcement Learning for IoT Traffic Management /internetofthings/2022/edge-based-federated-deep-reinforcement-learning-for-iot-traffic-management/?utm_source=rss&utm_medium=rss&utm_campaign=edge-based-federated-deep-reinforcement-learning-for-iot-traffic-management Wed, 11 May 2022 23:49:00 +0000 /internetofthings/?p=1863 Abdallah Jarwan and Mohamed Ibnkahla

The wide adoption of large-scale Internet of Things (IoT) systems has led to an unprecedented increase in backhaul traffic congestion, making it critical to optimize traffic management at the network edge. In IoT systems, the backhaul network is supported by various backhauling technologies that have different characteristics. Also, the characteristics of the backhaul links can be sometimes time-varying and have an unknown state, due to external factors such as having the resources shared with other systems. It is the responsibility of the edge devices to be able to forward IoT traffic through the unknown-state backhaul network by selecting the suitable backhaul link for each collected data flow. To the best of our knowledge, this type of backhaul selection problem is not addressed in the literature. Therefore, there is a crucial need to develop intelligent approaches enabling edge devices to learn how to deal with unknown-state (partially observable) components of the backhaul network, which is the primary goal of this paper. We propose an edge-based backhaul selection technique for improving traffic delivery by exploiting multi-objective feedback on delivery performance. The proposed approach relies on the Advantage-Actor-Critic Deep Reinforcement Learning (DRL) methods. Moreover, to improve the DRL training performance in large-scale deployments of distributed IoT systems, Federated Learning (FL) is applied enabling multiple edge devices to collaborate in training a shared backhaul selection policy. The proposed Federated DRL (F-DRL) approach is able to solve the backhaul selection problem as verified and demonstrated through extensive simulations.

A. Jarwan and M. Ibnkahla, “Edge-Based Federated Deep Reinforcement Learning for IoT Traffic Management,” IEEE Internet of Things Journal, pp. 1–1, 2022, doi: 10.1109/JIOT.2022.3174469.

For more details: 

]]>
IEEE Internet of Things Journal Publication: Node Embedding for Security-Aware Clustering of Mobile Information-Centric Sensor Networks /internetofthings/2022/ieee-internet-of-things-journal-publication-node-embedding-for-security-aware-clustering-of-mobile-information-centric-sensor-networks/?utm_source=rss&utm_medium=rss&utm_campaign=ieee-internet-of-things-journal-publication-node-embedding-for-security-aware-clustering-of-mobile-information-centric-sensor-networks Sun, 20 Feb 2022 03:33:42 +0000 /internetofthings/?p=1617 Anastassia Gharib and Mohamed Ibnkahla

In cluster-based Information-Centric Wireless Sensor Networks (ICWSNs), mobile sensor nodes are grouped into clusters in rounds. In each cluster, a Cluster Head (CH) is selected, which collects, aggregates, and forwards locally sensed data to a sink node. CHs further store a copy of data for the round period to act as cache nodes and deliver data to mobile users upon requests. Nevertheless, clustering and securing mobile ICWSNs is challenging. This is because, in addition to sensor nodes’ and users’ mobility, sensor nodes are often resource-constrained. Therefore, clustering and security resource allocation in mobile ICWSNs should be carefully re-designed to ensure efficient ICWSN operation, data security, and timely data access to mobile users. This paper proposes a Node Embedding with Security Resource Allocation (NESRA) clustering algorithm for mobile ICWSNs in rounds. NESRA allocates security resources to sensor nodes based on the location, mobility, and energy resources available in the first step. An optimization problem is formulated to select CHs that maximizes network coverage and minimizes data delivery delay to mobile users in the second step. In the third step, NESRA utilizes network representation learning that embeds sensor nodes’ location, mobility, and expected energy expenditure features into a 2D space to form well-separated clusters of sensing nodes. Compared to existing works, NESRA achieves lower energy consumption, nodes’ death rate, and latency, and allows higher throughput and cache nodes’ utilization with stable data security. Still, NESRA has some challenges to overcome in high-mobility networks.

A. Gharib and M. Ibnkahla, “Node Embedding for Security-Aware Clustering of Mobile Information-Centric Sensor Networks,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2022.3152183.

For more details: 

]]>
IEEE Internet of Things Journal Publication: Information-Oriented Traffic Management for Energy-Efficient and Loss-Resilient IoT Systems /internetofthings/2022/ieee-internet-of-things-journal-publication-information-oriented-traffic-management-for-energy-efficient-and-loss-resilient-iot-systems/?utm_source=rss&utm_medium=rss&utm_campaign=ieee-internet-of-things-journal-publication-information-oriented-traffic-management-for-energy-efficient-and-loss-resilient-iot-systems Wed, 26 Jan 2022 05:30:55 +0000 /internetofthings/?p=1588 Abdallah Jarwan, Ayman Sabbah, and Mohamed Ibnkahla

Internet-of-Things (IoT) systems are driven by the massive data generation at the sensing layer. Most of data management protocols in the sensing layer target optimizing different Quality-of-Service (QoS) metrics such as data rate, packet loss, and delay, while taking the limitations of Wireless Sensing Networks (WSNs) into consideration. However, it is also critical to consider improving the quality of collected data, especially when the WSNs are congested by delay-sensitive data packets, leading to high packet loss. While Value-of-Information (VoI), which represents data freshness and time-relevance, is commonly used to define data value, it does not provide a notion of data recoverability and tolerance-to-loss. In this paper, the main contribution is to develop data management schemes to cope with inevitable data loss by identifying the data portion with a higher value to the overlaying applications. We also develop a novel metric that is referred to as Information-Content (IC), quantifying the amount of information in data. The IC is defined such that data holding information of low-probable events have higher IC than data holding information of high-probable events. In this context, the VoI and IC are exploited in developing information-oriented traffic forwarding and reduction schemes to ensure that all dropped packets are more accurately recoverable through a traffic recovery scheme, and therefore the running applications are not disrupted. Through extensive Monte-Carlo simulations, we show that the proposed information-oriented data management improves the performance in terms of data congestion, lifetime, packet loss, delay, and data recovery accuracy.

A. Jarwan, A. Sabbah and M. Ibnkahla, “Information-Oriented Traffic Management for Energy-Efficient and Loss-Resilient IoT Systems,” in IEEE Internet of Things Journal, doi: 10.1109/JIOT.2021.3132925.

For more details: 

]]>
2021 IEEE Globecom Workshops (GC Wkshps): ĐÓ°ÉÔ­´´-Cisco IoT Testbed: Architecture, Features, and Applications /internetofthings/2022/2021-globecom-carleton-cisco-testbed/?utm_source=rss&utm_medium=rss&utm_campaign=2021-globecom-carleton-cisco-testbed Tue, 25 Jan 2022 21:20:43 +0000 /internetofthings/?p=1736 Zied Bouida, Ismael AlShiab, Yousef Rafique, Abdallah Jarwan, Manishkumar Moorjmalani, Sajib Kumar Kuri, and Mohamed Ibnkahla

The ĐÓ°ÉÔ­´´-Cisco Internet of Things (IoT) testbed is being built at ĐÓ°ÉÔ­´´ University’s IoT Lab. Hosting diverse applications, the testbed adopts a layered approach composed of four layers: Sensing, Edge, Fog, and Cloud layers. The IoT testbed is distributed over multiple sites at ĐÓ°ÉÔ­´´ University’s Campus and the City of Ottawa. In this paper, we first present the architecture and the features of the testbed. Then, we give an overview of the applications running on the testbed and their underlying techniques and protocols. In particular, we highlight the use of Edge computing and data analytics in selected applications. We also present the testbed’s deployment challenges and the proposed solutions.

Z. Bouida, I. AlShiab, Y. Rafique, A. Jarwan, M. Moorjmalani, S. K. Kuri, and M. Ibnkahla, “ĐÓ°ÉÔ­´´-Cisco IoT Testbed: Architecture, Features, and Applications,” Proc. 2021 GlobeCom Workshop on Experimental wireless platforms and testbeds for computing, communication and networking research, pp. 1-6, Madrid, Spain, Dec 2021.

For more details: 

]]>