- UAV Applications and Optimization
- IoT and Edge/Fog Computing
- Vehicular Ad Hoc Networks (VANETs)
- Opportunistic and Delay-Tolerant Networks
- Mobile Ad Hoc Networks
- Advanced Wireless Communication Technologies
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Blockchain Technology Applications and Security
- Advanced MIMO Systems Optimization
- Software-Defined Networks and 5G
- Distributed Control Multi-Agent Systems
- Energy Harvesting in Wireless Networks
- Advanced Authentication Protocols Security
- Wireless Communication Networks Research
- Energy Efficient Wireless Sensor Networks
- Smart Grid Security and Resilience
- Caching and Content Delivery
- Digital Transformation in Industry
- Privacy-Preserving Technologies in Data
- Advanced Wireless Communication Techniques
- PAPR reduction in OFDM
- Cooperative Communication and Network Coding
- IoT Networks and Protocols
- IPv6, Mobility, Handover, Networks, Security
Queen's University Belfast
2019-2025
Vivekananda Global University
2023-2025
Lovely Professional University
2025
Chitkara University
2024
Institute of Engineering
2011-2024
Guru Angad Dev Veterinary and Animal Sciences University
2024
Shobhit University
2023-2024
Sant Longowal Institute of Engineering and Technology
2024
Sharda University
2024
Birla Institute of Technology, Mesra
2024
Modern day wireless networks have tremendously evolved driven by a sharp increase in user demands, continuously requesting more data and services. This puts significant strain on infrastructure based macro cellular due to the inefficiency handling these traffic cost effectively. A viable solution is use of unmanned aerial vehicles (UAVs) as intermediate nodes between small cell tiers for improving coverage boosting capacity. letter investigates problem demand UAV assignment over geographical...
Data have always been a major priority for businesses of all sizes. Businesses tend to enhance their ability in contextualizing data and draw new insights from it as the itself proliferates with advancement technologies. Federated learning acts special form privacy-preserving machine technique can contextualize data. It is decentralized training approach privately collecting provided by mobile devices, which are located at different geographical locations. Furthermore, users benefit...
Wind turbines are one of the primary sources renewable energy, which leads to a sustainable and efficient energy solution. It does not release any carbon emissions pollute our planet. The wind farms monitoring power generation prediction is complex problem due unpredictability speed. Consequently, it limits decision management team plan consumption in an effective way. Our proposed model solves this challenge by utilizing 5G-Next Generation-Radio Access Network (5G-NG-RAN) assisted...
Many of the devices used in Internet-of-Things (IoT) applications are energy-limited, and thus supplying energy while maintaining seamless connectivity for IoT is considerable importance. In this context, we propose a simultaneous wireless power transfer information transmission scheme with support from reconfigurable intelligent surface (RIS)-aided unmanned aerial vehicle (UAV) communications. particular, first phase, harvest UAV through transfer; then second collects data transmission. To...
The Dynamic Source Routing (DSR) algorithm computes a new route when packet loss occurs. DSR does not have an in‐built mechanism to determine whether the was result of congestion or node failure causing compute route. This leads inefficient energy utilization is used in wireless sensor networks. In this work, we exploit cross‐layer optimization techniques that extend improve its routing efficiency by minimizing frequency recomputed routes. Our proposed approach enables initiate discovery...
The blockchain is a safe, reliable and innovative mechanism for managing numerous vehicles seeking connectivity.However, following the principles of blockchain, number transactions required to update ledgers pose serious issues as these may consume maximum available energy.To resolve this, an efficient model presented in this letter which capable handling energy demands blockchainenabled Internet Vehicles (IoV) by optimally controlling through distributed clustering.Numerical results suggest...
Non-orthogonal multiple access (NOMA) is a rapidly emerging paradigm with the capability to improve spectral efficiency of data-driven, intelligence inspired, and highly digitized sixth-generation (6G) wireless networks. In backdrop ever-evolving NOMA techniques, this article presents novel resource optimization framework for maximizing (SE) Internet-of-things (IoT) networks using power domain NOMA. The proposed considers limited number frequency blocks in IoT network provides an optimal...
Mobile edge computing (MEC) reduces the computational distance between source and servers by fortifying near-user site evaluations of data for expedited communications, using caching. Caching provides ephemeral storage on designated low-latency transmissions. However, with network following a hierarchical layout, even can be impacted overheads associated maintaining perpetual connection other factors (e.g., those relating to reliability underpinning network). Prior solutions study as factor...
With an enormous range of applications, the Internet Things (IoT) has magnetized industries and academicians from everywhere. IoT facilitates operations through ubiquitous connectivity by providing access to all devices with computing capabilities. evolution wireless infrastructure, focus simple been shifted smart, connected mobile (M-IoT) platforms, which can enable low-complexity, low-cost efficient sensors, machines, even crowdsourcing. All these be grouped under a common term M-IoT. Even...
Urban networks aim at facilitating users for better experience and services through smart platforms such as the Intelligent Transportation System (ITS). ITS focuses on information acquisition, sensing, contrivance control, data processing forwarding to ground devices via user-specific application-interfaces. The utility of is further improved Internet Things (IoT), which supports “Connectivity All”. One key applications IoT-ITS urban surveillance. Current surveillance in performed fixed...
Modern fog network architectures, empowered by IoT applications and 5G communications technologies, are characterized the presence of a huge number mobile nodes, which undergo frequent handovers, introducing significant load on involved entities. Considering distributed flat nature these DMM can be only viable option for efficiently managing handovers in scenarios. The existing solutions capable providing smooth but lack robustness from security point view. Indeed, depends external...
In this letter, an optimal placement and distribution of cooperative unmanned aerial vehicles (UAVs) in the next generation heterogeneous networks is presented order to optimize overall network delays. The positioning issue formulated as a minimax facility problem, which then resolved using entropy nets by formation algorithm. effectiveness proposed approach demonstrated terms significant gains including increased UAV accuracy reduced delays allocation.
Unmanned Aerial Vehicles (UAV)-based civilian or military applications become more critical to serving and/or missions. The significantly increased attention on UAV also has led security concerns particularly in the context of networked UAVs. Networked UAVs are vulnerable malicious attacks over open-air radio space and accordingly intrusion detection systems (IDSs) have been naturally derived deal with vulnerabilities attacks. In this paper, we briefly survey state-of-the-art IDS mechanisms...
Abstract Remote patient monitoring and data management have gained much popularity in recent years because of their enhanced access to low‐cost healthcare services. A cloud‐based system provides numerous solutions for collecting offers on‐demand well‐managed reports patients providers. However, it equally suffers from single‐point failure, security, privacy, non‐transparency issues with the data, impacting continuity system. To resolve such concerns, this article proposes an artificial...
Nowadays, many people are facing the problem of arthritis. Regular monitoring and consultation joint health from a specialist can help patients with this chronicle disease. The ratio orthopedic doctors to arthritis is low, worldwide. Use smart devices support healthcare industry lot. Motivated by these facts, here we propose an architecture track hand movements patient. For regular arthritis, fog cloud gateways for real-time response generation used. Thread protocol Bayesian network...
This paper addresses the problem of minimising latency in computation offloading with digital twin (DT) wireless edge networks for industrial Internet-of-Things (IoT) environment via ultra-reliable and low communications (URLLC) links. The considered DT-aided provide a powerful computing framework to enable computation-intensive services, where DT is used model capacity servers optimise resource allocation entire system. objective function comprised local processing latency, URLLC-based...
The concept of digital twin (DT) is constantly revealing as a key enabling technology for the deployment mobile communication services envisaged sixth-generation (6G) Internet-of-Things (IoT). This paper aims at providing comprehensive review current state-of-the-art DT-enabled 6G oriented network services. main characteristics this new and its critical aspects are highlighted. An overview requirements innovative envisioned firstly provided, emphasizing how DT represents complementary them....
The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with ability improve quality life by broadening user experience while enabling crucial solutions such near real-time remote diagnostics. However, privacy and security problems remain largely unresolved safety area. Various rule-based methods have been considered recognize aberrant behaviors IoMT demonstrated high accuracy misbehavior detection appropriate for lightweight IoT devices....
Quantum computing is envisaged as an evolving paradigm for solving computationally complex optimization problems with a large-number factorization and exhaustive search. Recently, there has been proliferation growth of the size multi-dimensional datasets, input-output space dimensionality, data structures. Hence, conventional machine learning approaches in training processing face huge limited capabilities to support sixth-generation (6G) networks highly dynamic applications services. Under...
With the advanced development of digital twin (DT), mobile virtual reality, augmented and tactile internet, metaverse has re-emerged as a new form internet. However, it is still long way off from fully achieving immersive pervasive experience. First foremost, wireless communications, networking, computing for DT are in their infancy, especially, to achieve stringent quality-of-service (QoS) requirements terms very high data rate, ultra-high success reception minimal latency. Recently,...
Clerodendrum glandulosum extract reduced silver nanoparticles were prepared by in situ technique within chitosan-PEG hydrogel matrix and characterized for its vitro vivo diabetic wound healing activities.
The communication in the Smart Home Internet of Things (SH-IoT) comprising various electronic devices and sensors is very sensitive crucial. In addition, key requirements SH-IoT include channel security, handover support, mobility management, consistent data rates. Proxy mobile IPv6 (PMIPv6) considered as one core solutions to handle extreme mobility; however, default PMIPv6 cannot ensure performance enhancement scenarios, i.e., Route Optimization (RO). existing security protocols for...