Loading [MathJax]/extensions/MathZoom.js
Yasser D. Al-Otaibi - IEEE Xplore Author Profile

Showing 1-20 of 20 results

Filter Results

Show

Results

Ensuring the smooth operation of road traffic is a momentous target in Intelligent Transportation Systems, which can be expedited by a secure and reliable Internet of Vehicles (IoV). As prominent carriers of the IoV, intelligent vehicles (IVs), that bear the promising potential for alleviating traffic congestion, have become the core road traffic participants. However, the mixed-traffic environmen...Show More
The rise of connected and autonomous vehicles signifies an era of intelligent transportation systems, where robust and continued network connectivity is essential for critical applications and enhanced in-vehicle Consumer Electronics (CE) experiences. Slicing at the network’s edge offers tailored and dedicated logical networks for diverse and low-latency vehicular demands, including Advanced Drive...Show More
The advent of 6G-enabled networks marks a transformative era in the Internet of Things (IoT), promising unparalleled connectivity and innovation. These networks are set to revolutionize the IoT landscape by offering remarkable capabilities, including ultra-high data speeds, ultra-low latency, and extensive network coverage and connectivity. However, optimizing such networks’ is a complex challenge...Show More
The technology of the Internet of Vehicles (IoV) and digital twins (DTs) is driving deeper connectivity between vehicles and road infrastructure. Through the data exchange of IoV and the simulation of DT technology, vehicle driving decisions, traffic management, and road planning are optimized. However, DT models contain a large amount of private vehicle data, causing the risk of privacy leakage. ...Show More
During the last few years, due to the COVID-19 pandemic, there has been a significant development of eHealth monitoring systems. However, most of the systems to date have been developed specifically for patient monitoring by nurses, physicians, and specialists. To keep attendants informed about the health status of their patients in the hospitals, we are developing an edge-enabled companion-side e...Show More
The convergence of blockchain and deep learning (DL) drives the intelligence of the Internet of Things (IoT) with security guarantees. However, the soaring resource consumption resulting from blockchain mining and DL model training has overwhelmed the extremely resource-constrained IoT. In this article, we first build a blockchain and DL-empowered cloud–edge orchestrated framework for an extremely...Show More
The rumors in the healthcare system have the attributes of fast spread and severe social influence. Even worse, it may cause the collapse of medical services and the death of many patients. To prevent its serious impact on society, the target of rumor suppression for the healthcare system is to restrain the spread of rumors (negative opinions) and maximize the spread of antirumors (positive opinio...Show More
Currently, with the widespread of the intelligent Internet of Things (IoT) in beyond 5G, wireless federated learning (WFL) has attracted a lot of attention to enable knowledge construction and sharing among a huge amount of distributed edge devices. However, under unstable wireless channel conditions, existing WFL schemes exist the following challenges: First, learning model parameters will be dis...Show More
Digital twin (DT) technology is being applied increasingly in the Internet of Vehicles environment, but it still faces many challenges in terms of efficiency and security. In the field of DT-based autonomous driving, many previous works have been done to study the efficient migration methods of DT models. But these works consider the migration process as a blackbox. We study the efficient migratio...Show More
Although modern Maritime Transportation Systems (MTS) have been extensively benefited from Internet of Things (IoT) technology, but still the risks and challenges in safety and reliability have increased substantially. The involvement of different maritime parties in the marine transportation flow scheduling and management further escalates these challenges. Thus, we need an IoT-based collaborativ...Show More
With the growing importance of green wireless communications, point-of-interest (POI) scheduling in the mobile social network (MSN) environment has become important in addressing the high demand for innovative scheduling solutions. To enhance feature expressions for the complicated structures in MSNs, this article explores a deep information, fusion-based POI scheduling system of the MSN environme...Show More
The next generation wireless network (NGWN) is undergoing an unprecedented revolution, in which trillions of machines, people, and objects are interconnected to realize the Internet of Everything (IoE). with the emergence of IoE services such as virtual reality, augmented reality, and industrial 5 G, the scarcity of radio resources becomes more serious. Moreover, there are hidden dangers of untrus...Show More
Energy harvesting (EH) is a promising and critical technology to mitigate the dilemma between the limited battery capacity and the increasing energy consumption in the Internet of everything. However, the current EH system suffers from energy-information cross threats, facing the overlapping vulnerability of energy deprivation and private information leakage. Although some existing works touch on ...Show More
The existing Underwater Internet of Things (UIoT) is based on the IP architecture, which is not conducive to the efficient storage and distribution of huge amounts of content generated in underwater. Actively pushing all content to users causes much unnecessary resource consumption in the UIoT. The information-centric networking (ICN) architecture opens new horizons up for these challenges. Howeve...Show More
The drone's open and untrusted environment may create problems for authentication and data sharing. To address this issue, we propose a blockchain-enabled efficient and secure data sharing model for 5G flying drones. In this model, blockchain and attribute-based encryption (ABE) are applied to ensure the security of instruction issues and data sharing. The authentication mechanism in the model emp...Show More
In Surveillance Wireless Sensor Networks (SWSN), the nodes are distributed at the borders to detect unauthorized intrusions. In such applications, as the nodes are usually equipped with limited batteries and the network area is harsh to be accessible for humans, energy efficiency is considered as one of the main issues in designing the sensor networks. In the last years, Wireless Rechargeable Sens...Show More
Satellite communication system is expected to play a vital role for realizing various remote Internet-of-Things (IoT) applications in sixth-generation vision. Due to unique characteristics of satellite environment, one of the main challenges in this system is to accommodate massive random access (RA) requests of IoT devices while minimizing their energy consumptions. In this article, we focus on t...Show More
One of the most promising application areas of the industrial Internet of Things (IIoT) is vehicular ad hoc networks (VANETs). VANETs are largely used by intelligent transportation systems to provide smart and safe road transport. To reduce the network burden, software-defined networks (SDNs) act as a remote controller. Motivated by the need for greener IIoT solutions, this article proposes an ene...Show More
Energy constraint is one of the main design issues of wireless sensor networks. Over the past few years, the concept of the wireless mobile charger (WMC) has been proposed in order to improve the energy efficiency of the networks. In such schemes, optimizing the moving trajectory and charging time of WMC are considered as two main problems. Several schemes attempt to optimize the moving trajectory...Show More
In the last years, due to the limited resources of consumer products, energy-saving is known as one of the design challenges of Wireless Sensor Networks (WSNs). Clustering is a practical technique to enhance the performance of the network including energy efficiency, network scalability, and network easier management. In cluster-based networks, the size of clusters has a key role in the network po...Show More