Jelena Mišić

ORCID: 0000-0002-1251-3730
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Wireless Networks and Protocols
  • Bluetooth and Wireless Communication Technologies
  • Blockchain Technology Applications and Security
  • Energy Efficient Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • IoT and Edge/Fog Computing
  • Cognitive Radio Networks and Spectrum Sensing
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Wireless Network Optimization
  • Advanced MIMO Systems Optimization
  • Wireless Body Area Networks
  • Cloud Computing and Resource Management
  • Wireless Communication Networks Research
  • Age of Information Optimization
  • Distributed systems and fault tolerance
  • Opportunistic and Delay-Tolerant Networks
  • Cooperative Communication and Network Coding
  • Caching and Content Delivery
  • Cryptography and Data Security
  • Power Line Communications and Noise
  • Distributed Sensor Networks and Detection Algorithms
  • Security in Wireless Sensor Networks
  • Energy Harvesting in Wireless Networks
  • Advanced Authentication Protocols Security
  • Privacy-Preserving Technologies in Data

Toronto Metropolitan University
2016-2025

University of Nis
2014-2023

Univerzitet Union Nikola Tesla
2023

Karolinska Institutet
2023

University of Glasgow
2022

University of Calabria
2022

University of Central Florida
2022

China Telecom (China)
2022

Huazhong University of Science and Technology
2022

Université d'Avignon et des Pays de Vaucluse
2022

Successful development of cloud computing paradigm necessitates accurate performance evaluation data centers. As exact modeling centers is not feasible due to the nature and diversity user requests, we describe a novel approximate analytical model for server farms solve it obtain estimation complete probability distribution request response time other important indicators. The allows operators determine relationship between number servers input buffer size, on one side, indicators such as...

10.1109/tpds.2011.199 article EN IEEE Transactions on Parallel and Distributed Systems 2011-07-26

As modern vehicles and distributed fog services advance apace, vehicular (VFSs) are being expected to span across multiple geo-distributed datacenters, which inevitably leads cross-datacenter authentication. Traditional authentication models not suitable for the scenario of high-speed moving accessing VFS, because these either ignored user privacy or delay requirement driving vehicles. This paper proposes a blockchain-assisted lightweight anonymous (BLA) mechanism is provisioned BLA can...

10.1109/jiot.2019.2892009 article EN IEEE Internet of Things Journal 2019-01-09

This article investigates a hierarchical aerial computing system, where both high-altitude platforms (HAPs) and unmanned vehicles (UAVs) provision computation services for ground devices (GDs). Different from the existing works which ignored UAV task offloading to HAPs suffered long transmission delay between GDs, in our UAVs are responsible collecting tasks generated by GDs. Considering limited resources constrained coverage, need cooperatively allocate their (including spectrum, caching,...

10.1109/jiot.2023.3240173 article EN IEEE Internet of Things Journal 2023-01-27

The performance of an IEEE 802.15.4 compliant network operating in the beacon enabled mode with both downlink and uplink traffic is analyzed through discrete time Markov chains theory M/G/1 queues. model considers acknowledged transmissions includes impact different parameters such as packet arrival rate, size, inactive period between beacons, number stations. We investigate nonsaturation region outline conditions under which abruptly goes to saturation. analysis stability queues shows that...

10.1109/tpds.2006.54 article EN IEEE Transactions on Parallel and Distributed Systems 2006-03-15

Accurate performance evaluation of cloud computing resources is a necessary prerequisite for ensuring that quality service parameters remain within agreed limits. In this paper, we employ both the analytical and simulation modeling to addresses complexity systems. Analytical model comprised distinct functional submodels, results which are combined in an iterative manner obtain solution with required accuracy. Our models incorporate important features centers such as batch arrival user...

10.1109/tpds.2012.280 article EN IEEE Transactions on Parallel and Distributed Systems 2013-09-27

In this paper, we propose an analytical performance model that addresses the complexity of cloud centers through distinct stochastic submodels, results which are integrated to obtain overall solution. Our incorporates important aspects such as pool management, compound requests (i.e., a set submitted by one user simultaneously), resource virtualization and realistic servicing steps. manner, not only detailed assessment center performance, but also clear insights into equilibrium arrangement...

10.1109/tpds.2012.182 article EN IEEE Transactions on Parallel and Distributed Systems 2012-06-27

We present an anonymous authentication and verification scheme for the IEEE Wireless Access in Vehicular Communications (WAVE)-based vehicular ad hoc networks (VANETs). Our contribution includes message efficient prioritized strategy periodic road safety messages. A variation of elliptic curve digital signature algorithm (ECDSA) is used combination with identity-based (ID-based) signature, where current position information on a vehicle utilized as ID corresponding vehicle. This waives need...

10.1109/tvt.2013.2238566 article EN IEEE Transactions on Vehicular Technology 2013-01-09

Deep Neural Networks (DNNs) have been gaining state-of-the-art achievement compared with many traditional Machine Learning (ML) models in diverse fields. However, adversarial examples challenge the further deployment and application of DNNs. Analysis has carried out for studying reasons DNNs' vulnerability to perturbation focused on model architecture. No research done investigating impact optimization algorithms (namely, optimizers DNNs) employed training DNN models' sensitivity examples....

10.1109/access.2019.2948658 article EN cc-by IEEE Access 2019-01-01

The consensus algorithm is an essential ingredient of any blockchain system. Many different mechanisms, such as practical Byzantine fault tolerance (PBFT), Proof-of-Work (PoW), Proof-of-Stake (PoS), and their many derivatives, have been proposed over the years, but complementary problems performance resilience to malicious behavior nodes yet be resolved in a satisfactory manner. In this work, we propose mechanism that integrates PoS with PBFT, which can effectively deal dishonest nodes, both...

10.1109/jiot.2023.3243189 article EN IEEE Internet of Things Journal 2023-02-07

Due to lack of an appropriate wireless technology which satisfies all the requirements Wireless Body Area Networks (WBANs) IEEE 802.15.6 Task Group introduced communication standard optimized for low power devices and operation on, in or around human body. In this work we develop analytical model performance evaluation 802.15.6-based WBAN under saturation condition error prone channel. We backoff procedure as specified employing a probabilistic approach. validate results with simulation...

10.1109/wcnc.2011.5779296 article EN IEEE Wireless Communications and Networking Conference 2011-03-01

In this paper, we evaluate the performance of cloud centers with high degree virtualization and Poisson batch task arrivals. To end, develop an analytical model validate it independent simulation model. Task service times are modeled a general probability distribution, but also accounts for deterioration due to workload at each node. The allows calculation important indicators such as mean response time, waiting time in queue, queue length, blocking probability, immediate service,...

10.1109/tpds.2012.318 article EN IEEE Transactions on Parallel and Distributed Systems 2013-10-28

In this paper, we investigate the performance of networks built from single-channel devices that use wireless access in vehicular environment protocols. We consider several traffic combinations, each which presents a mix classes, over control and service channels. Our results show time switching between channels causes synchronization backoff processes, increases frame collision probability, particular for small sizes contention windows. also evaluate impact interruption process by inactive...

10.1109/tvt.2011.2116052 article EN IEEE Transactions on Vehicular Technology 2011-02-18

We have developed an analytical model for a non-saturated IEEE 802.15.6 wireless body area network (WBAN) operating under error-prone channel. The most suitable vehicle improving performance was found to be the choice of access phase lengths based on traffic loads different user priorities (UPs). It also that deployment exclusive (EAP) is not necessary in typical WBAN; fact, short and random phases (EAP RAP, respectively) lead inefficient use available bandwidth. four (out eight available)...

10.1109/tpds.2015.2447528 article EN IEEE Transactions on Parallel and Distributed Systems 2015-06-19

A VANET that uses IEEE 802.11p EDCA mechanism is susceptible to a synchronization-based DDoS attack due periodicity of transmissions and small contention window sizes. To make things worse, neither the sender nor receivers periodic broadcasts will be aware since broadcast communications in do not have acknowledgements. In this paper, we analyze prospect attacks on vehicular propose mitigation techniques avoid such an attack.

10.1109/glocom.2012.6503256 article EN 2015 IEEE Global Communications Conference (GLOBECOM) 2012-12-01

The articles in this special section focus on vehicular cloud computing platforms (CVCC). As a platform, connected (CVCC), which seamlessly combines and VANETs, has been recently proposed to accelerate the adoption of extends traditional infrastructure consisting majority stationary nodes edge vehicles. CVCC is mobile paradigm that consists in-motion vehicles cooperating with each other achieve bunch practical applications, such as collaborative package delivery information dissemination....

10.1109/mnet.2018.8370870 article EN IEEE Network 2018-05-01

The Unmanned Aerial Vehicles (UAVs) play a significant role to alleviate the negative impacts of disasters by providing essential assistance rescue and evacuation operations in affected areas. Then, reliability UAV connections accuracy exchanged information are critical parameters. In this paper, we propose networking security architecture for disaster surveillance system. scheme involves two-tier cluster network based on IEEE 802.11ah, which can provide traffic isolation between tiers....

10.3390/info10020043 article EN cc-by Information 2019-01-29

Vehicular fog computing (VFC) complements vehicular cloud as a promising solution for accommodating the surge of mobile traffic and reducing latency. This paper considers service (VFS) provided by (VF), which is formed on-the-fly integrating storage resources parked vehicles. VF dynamicity, due to vehicles' random arrivals departures, poses number challenges reliable secure VFS provision client We propose novel mechanism consists construction method access ensure reliability security without...

10.1109/jiot.2018.2855718 article EN IEEE Internet of Things Journal 2018-07-13

IEEE 802.11ah protocol is specifically designed to provide network connectivity a large number of energy efficient heterogeneous quality service (QoS) Internet things (IoT) devices. Restricted access window (RAW) mechanism the an innovative feature that aims at reducing medium contention by slotting beacon interval and allowing limited nodes contend in specific slot. In this paper, we evaluate important control (MAC) layer performance metrics differentiated QoS IoT RAW mechanism. Our...

10.1109/tvt.2019.2897127 article EN IEEE Transactions on Vehicular Technology 2019-02-05

This work proposes Practical Byzantine Fault Tolerance (PBFT) ordering service needed for block formation in permissioned blockchain environments. Contrary to current PBFT implementations that only provide a single point of entry the service, we allow each node act as an and conducts consensus process including new record distributed ledger. To ensure atomicity insertion ledger, have developed bandwidth reservation protocol uses modification CSMA/CA regulate access broadcast medium formed by...

10.1109/tvt.2020.3048291 article EN IEEE Transactions on Vehicular Technology 2020-12-30

In this paper, we provide a comprehensive analytical model for Bitcoin's blockchain distribution network. Components of the are derived from recent measurements and business analysis reports. We data algorithm using branching processes in network with random node connectivity. Then, apply Jackson to entire which individual nodes operate as priority M/G/1 queuing systems. Data arrival is modeled non-homogeneous Poisson process where rate delivery protocol. Within performance results, present...

10.1109/tnse.2019.2928716 article EN IEEE Transactions on Network Science and Engineering 2019-07-16

Selfish mining strategy allows miners to gain unfair advantage and excess revenue in Bitcoin network, but it also disrupts the normal operation of network. In this work, we analyze impact selfish behavior on network through a number performance indicators such as connectivity, block arrival rate, node response time, delivery time for honest blocks, respectively. We discuss probability unintentional well intentional forks. have found that is noticeable, extreme cases, disproportional or their...

10.1109/tnse.2021.3050034 article EN IEEE Transactions on Network Science and Engineering 2021-01-01

This paper investigates a dual-unmanned aerial vehicle (UAV) aided communication system to improve the security of between ground devices and UAVs. Different from existing works which ignored mobility just considered one-way UAVs, we allow be mobile consider bi-directional ground-UAV security. Specifically, one UAV server communicates with devices, other jammer is invoked confuse eavesdroppers. Our objective maximize worst-case average secrecy rate by joint optimization trajectory sender...

10.1109/tvt.2022.3184804 article EN IEEE Transactions on Vehicular Technology 2022-06-20
Coming Soon ...