Daniel S. Fowler

ORCID: 0000-0001-6730-2802
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Malware Detection Techniques
  • Wireless Communication Security Techniques
  • Software Testing and Debugging Techniques
  • Cryptographic Implementations and Security
  • Millimeter-Wave Propagation and Modeling
  • Quantum Information and Cryptography
  • Advanced MIMO Systems Optimization
  • Autonomous Vehicle Technology and Safety
  • Advanced Bandit Algorithms Research
  • Opportunistic and Delay-Tolerant Networks
  • Information and Cyber Security
  • Quality and Safety in Healthcare
  • Sustainable Supply Chain Management
  • Network Security and Intrusion Detection
  • Antenna Design and Analysis
  • Adversarial Robustness in Machine Learning
  • Bluetooth and Wireless Communication Technologies
  • Quantum Computing Algorithms and Architecture
  • Occupational Health and Safety Research
  • Military and Defense Studies
  • Supply Chain Resilience and Risk Management
  • Blockchain Technology Applications and Security
  • Molecular Communication and Nanonetworks
  • Distributed systems and fault tolerance

University of Warwick
2022-2024

IRD Fuel Cells (Denmark)
2024

Coventry University
2017-2019

There is increasing computational complexity within the connected car, and with advent of autonomous vehicles, how do manufacturers test for cyber-security assurance? The fuzz a successful black box testing method that hackers have used to find security weaknesses in various domains. Therefore, should test, mentioned (without any details) SAE J3061, be applied more widely into vehicle systems development process help reduce vulnerabilities? To investigate this question custom fuzzer was...

10.1109/dsn-w.2018.00070 article EN 2018-06-01

Modern automotive platforms are cyber-physical in nature and increasingly connected. Cybersecurity testing of such is expensive carries safety concerns, making it challenging to perform tests for vulnerabilities refine test methodologies. We propose a testbed, built over Controller Area Network (CAN) simulator, validate against real-world demonstration weakness vehicle using aftermarket On Board Diagnostic (OBD) scanners (dongles).

10.1109/icst.2017.62 article EN 2017-03-01

There is a need for new tools and techniques to aid automotive engineers performing cybersecurity testing on connected car systems. This in order support the principle of secure-by-design. Our research has produced method construct useful security tooling tests. It been used implement Controller Area Network (CAN) fuzz (a dynamic test) via prototype CAN fuzzer. The black-box laboratory vehicle's display ECU demonstrates value fuzzer field, revealing bugs software, weaknesses systems design.

10.1109/qrs-c.2019.00015 article EN 2019-07-01

Abstract An external disruptor to a manufacturing process (e.g., supply chain failure, or cyber‐attack) can affect more than factory's output; it have wider societal concerns, raising the issue of industrial resilience at different levels. In this work, is revisited, reviewing applicability concept domain, particularly smart factories enabled by newer digital technologies. The meaning within shown be composed several factors that operate three levels (macro, meso, and micro). been united...

10.1002/jsc.2555 article EN cc-by-nc-nd Strategic Change 2023-09-29

Abstract The evolution of Connected and Autonomous Vehicles (CAVs) promises improvements in our travel experience the potential to enhance road safety reduce environmental impact. This will be utilising highly diverse traffic environments that enable several advanced mobility applications. A secure, efficient, reliable, resilient communications infrastructure is required support developments these CAV systems. Next generation telecommunication networks seamlessly integrate terrestrial,...

10.1049/qtc2.12070 article EN cc-by IET Quantum Communication 2023-09-05

Millimeter-wave (mmWave) carriers are an essential building block of fifth-generation (5G) systems. Satisfactory performance the communications over mmWave spectrum requires alignment between signal beam transmitter and receiver, achieved via training protocols. Nevertheless, is vulnerable to jamming attacks, where attacker intends send signals different spatial directions confuse legitimate nodes. This paper focuses on defending against this attack in smart factories a moving Automated...

10.1109/tifs.2023.3265341 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Next generation communications will require the exploration of alternatives to existing technologies enable end-to-end connections for secure data exchange. 5G presents advanced connectivity opportunities even remote rural areas. However, platforms benefit from complementary methods enhance network capabilities and fulfill trust requirements. Due high throughput links, high-beam directivity, energy efficiency, free-space optics (FSO) is an alternative solution with potential deliver...

10.1109/mcom.001.2300813 article EN IEEE Communications Magazine 2024-10-01

Factory automation design engineers building the Smart can use wireless 5G broadband networks for added flexibility. New Radio builds upon previous cellular communications standards to include technology "massive machine-type communication" and "ultra-reliable low-latency communication". In this work, authors augment an automated guided vehicle with additional capabilities (e.g., streaming high-resolution video enabling long-distance teleoperation), increasing mobile applications industrial...

10.1109/ojies.2023.3291234 article EN cc-by-nc-nd IEEE Open Journal of the Industrial Electronics Society 2023-01-01

Abstract Quantum‐based technologies will provide system engineers with new capabilities for securing data communications. The UK AirQKD project has implemented a Free‐Space Optical Quantum Key Distribution (QKD) to enable the continuous generation of symmetric encryption keys. One use cases generated keys is secure Vehicle‐to‐Everything (V2X) V2X applications would benefit from certificate‐free security provided by QKD post‐quantum society. How FSO‐QKD could integrate into architecture...

10.1049/qtc2.12067 article EN cc-by IET Quantum Communication 2023-08-25

This paper presents sub-6 GHz channel measurements using a directional antenna at the transmitter and or omnidirectional receiver 4.145 in sparse dense industrial environments for line-of-sight scenario. Furthermore, first measured over-the-air error vector magnitude (EVM) results depending on different 5G new radio modulation coding schemes (MCSs of16 QAM, 64 QAM 256 QAM) are provided. From measurement campaigns, path loss exponents (PLE) an environment 1.24/1.39 1.35/1.5, respectively. PLE...

10.1109/access.2022.3227052 article EN cc-by IEEE Access 2022-01-01

We provide a practical implementation of free space optical quantum key distribution (FSO-QKD) system within vehicle-to-infrastructure (V2I) application developed under the Innovate UK AirQKD project. The FSO-QKD provides secure encryption keys that serve as foundation for communications throughout V2I to address known concerns over security. This document includes summaries generation process and deployed technology. Subsequently, high-level view design, experiment, its execution are...

10.3390/vehicles5040086 article EN cc-by Vehicles 2023-11-04

Modern vehicles are opening up, with wireless interfaces such as Bluetooth integrated in order to enable comfort and safety features. Furthermore a plethora of aftermarket devices introduce additional connectivity which contributes the driving experience. This opens vehicle potentially malicious attacks, could have negative consequences regards safety. In this paper, we survey from threat intelligence perspective gain insight into conditions during real world driving. We do two ways:...

10.1109/dsn-w.2017.22 article EN 2017-06-01

Increasing the linear modulation range

10.1109/icit58233.2024.10540753 article EN 2022 IEEE International Conference on Industrial Technology (ICIT) 2024-03-25

Terahertz (THz) frequency technology holds great promise for enabling high data rates and low latency, essential manufacturing applications within Industry 4.0. To achieve these, beam training is necessary to enable MIMO communications without the need explicit channel state information (CSI). In this context, Multi-Armed Bandit (MAB) algorithms are able facilitate online learning decision-making in training, eliminating necessity extensive offline collection. paper, we introduce three...

10.1109/icit58233.2024.10540692 article EN 2022 IEEE International Conference on Industrial Technology (ICIT) 2024-03-25

10.1049/icp.2024.2527 article EN IET conference proceedings. 2024-09-06
Coming Soon ...