Prashant Pillai

ORCID: 0000-0002-5314-5030
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Satellite Communication Systems
  • IPv6, Mobility, Handover, Networks, Security
  • Advanced Wireless Network Optimization
  • Mobile Agent-Based Network Management
  • Smart Grid Energy Management
  • IoT and Edge/Fog Computing
  • Wireless Communication Networks Research
  • Power Line Communications and Noise
  • Advanced MIMO Systems Optimization
  • Cooperative Communication and Network Coding
  • Microgrid Control and Optimization
  • Energy Efficient Wireless Sensor Networks
  • Smart Grid Security and Resilience
  • Blockchain Technology Applications and Security
  • IoT Networks and Protocols
  • Electric Vehicles and Infrastructure
  • Green IT and Sustainability
  • Network Security and Intrusion Detection
  • Advanced Battery Technologies Research
  • Advanced Wireless Communication Technologies
  • Mobile Ad Hoc Networks
  • Telecommunications and Broadcasting Technologies
  • Cloud Data Security Solutions
  • Wireless Networks and Protocols
  • Security in Wireless Sensor Networks

University of Wolverhampton
2018-2024

Torrens University Australia
2020

University of Bradford
2009-2018

Oxford Brookes University
2017-2018

University of Delhi
2014

University of Surrey
2009

Università Cattolica del Sacro Cuore
1979

Future 5G mobile communication systems are expected to integrate different radio access technologies, including the satellite component. Within framework, terrestrial services can be augmented with development of HTS and new mega-constellations meeting requirements, such as high bandwidth, low latency, increased coverage rural areas, air, seas. This article provides an overview current initiatives projects followed by a proposed architecture for networks where SDN/NFV approach facilitates...

10.1109/mnet.2018.1800037 article EN IEEE Network 2018-09-01

The birth of beyond 5G (B5G) and emerge 6G have made personal industrial operations more reliable, efficient, profitable, accelerating the development next-generation Internet Things (IoT). We know, one most important key performance indicators in is smart network architecture, massive IoT applications, energy-efficient ubiquity networks rely mainly on intelligence automation for applications. This article addresses energy consumption problem with a system model dynamic architecture or...

10.1109/jiot.2020.3035608 article EN IEEE Internet of Things Journal 2020-11-03

Software-defined networks (SDNs) offer robust network architectures for current and future Internet of Things (IoT) applications. At the same time, SDNs constitute an attractive target cyber attackers due to their global view programmability. One major vulnerabilities typical SDN is susceptibility Distributed Denial Service (DDoS) flooding attacks. DDoS attacks can render controllers unavailable underlying infrastructure, causing service disruption or a complete outage in many cases. In this...

10.1109/access.2021.3109490 article EN cc-by IEEE Access 2021-01-01

In recent years, Mobile Edge Computing (MEC) has revolutionized the landscape of telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range security challenges, most prominent which is Distributed Denial Service (DDoS) attacks, threaten availability performance MEC’s services. cases, Intrusion Detection Systems (IDSs), tool that monitors networks systems for suspicious activity notify administrators in real time...

10.3390/computers13010025 article EN cc-by Computers 2024-01-16

ABSTRACT This paper is not a survey related to generic wireless sensor networks (WSNs), which have been largely treated in number of papers addressing more focused issues; rather, it specifically addresses architectural aspects WSNs some way connected with satellite link, topic that presents challenging interworking aspects. The main objective provide an overview the potential role segment future WSNs. In this perspective, requirements most meaningful WSN applications drawn and matched...

10.1002/sat.1019 article EN International Journal of Satellite Communications and Networking 2012-11-27

Traditional centralized data storage and processing solutions manifest limitations with regards to overall operational cost the security auditability of data. One biggest issues existing is difficulty keeping track who has had access how may have changed over its lifetime; while providing a secure easy-to-use mechanism share between different users. The ability electronically regulate sharing within across organizational entities in supply chain (SC) an open issue that only addressed...

10.1109/tem.2020.2965991 article EN IEEE Transactions on Engineering Management 2020-01-28

This study focuses on enhancing network security by implementing dynamic ARP (Address Resolution Protocol) inspection to detect and mitigate spoofing attacks. The solution is built using Flask, a lightweight web framework, Scapy, powerful library for packet manipulation. system monitors traffic in real time analyzing packets, identifying inconsistencies, flagging potential attempts. It incorporates database integration through SQLite manage allowed blocked IP addresses, ensuring efficient...

10.59256/indjcst.20250401024 article EN Indian Journal of Computer Science and Technology 2025-04-23

Next-generation cellular networks such as fifth-generation (5G) will experience tremendous growth in traffic. To accommodate traffic demand, there is a necessity to increase the network capacity that eventually requires deployment of more base stations (BSs). Nevertheless, BSs are very expensive and consume significant amount energy. Meanwhile, cloud radio access (C-RAN) has been proposed an energy-efficient architecture leverages computing technology where baseband processing performed...

10.1109/dsdis.2015.73 article EN IEEE International Conference on Data Science and Data Intensive Systems 2015-12-01

IoT is a groundbreaking technology that enables wireless interoperability between devices without human intervention. It has become an integral part of life and made significant advancements in the automotive industry. The combination vehicular networks opened up new possibilities but also led to challenges such as degraded QoS (Quality Service), network congestion, packet loss, transmission delay, intrusions, etc. These problems are apparent health monitoring systems. To overcome...

10.1109/access.2024.3424418 article EN cc-by-nc-nd IEEE Access 2024-01-01

The systematic integration of the Internet Things (IoT) and Cyber-Physical Systems (CPS) into supply chain to increase operational efficiency quality has also introduced new complexities threat landscape. myriad sensors could data collection capabilities for businesses facilitate process automation aided by Artificial Intelligence (AI) but without adopting an appropriate Security-by-Design framework, detection response are destined fail. emerging concept Smart Workplace incorporates many CPS...

10.1109/icgs3.2019.8688297 article EN 2019-01-01

The widespread use of technology has made communication an indispensable part daily life. However, the present cloud infrastructure is insufficient to meet industry’s growing demands, and multi-access edge computing (MEC) emerged as a solution by providing real-time computation closer data source. Effective management MEC essential for high-quality services, proactive self-healing promising approach that anticipates executes remedial operations before faults occur. This paper aims identify,...

10.3390/computers12030063 article EN cc-by Computers 2023-03-13

The development of science and technology has led to the era Industry 4.0. core concept is combination "material informationization". In supply chain manufacturing process, "material" physical entity world realized by data, identity, intelligence, information. 4.0 a disruptive transformation upgrade intelligent industrialization based on Internet-of-Things Big Data in traditional industrialization. goal "maximizing production efficiency, minimizing costs, maximizing individual needs human...

10.32604/cmc.2020.012587 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-12-09

This article presents the in-flight demonstration of a new integrated aircraft communications system combining legacy and future radio technologies.This system, developed validated under real environmental conditions during flight trials, integrates all aeronautical service domains within common IPv6-based network.The trials were held framework European SANDRA project at Oberpfaffenhofen, Germany, in June 2013.The presented outcomes emphasize flexibility scalability network demonstrate...

10.1109/mcom.2014.6815902 article EN IEEE Communications Magazine 2014-05-01

Modern aeronautical telecommunication networks (ATN) make use of different simultaneous datalinks to deliver robust, secure, and efficient ATN services. This paper proposes a multiple attribute decision making based optimal datalink selection algorithm, which considers attributes including safety, QoS, costs, user/operator preferences. An intelligent TRigger-based aUtomatic Subjective weighTing ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/taes.2017.2701918 article EN IEEE Transactions on Aerospace and Electronic Systems 2017-05-12

Fifth generation (5G) cellular networks will be comprised of millions connected devices like wearable devices, Androids, iPhones, tablets, and the Internet Things (IoT) with a plethora applications generating requests to network. The 5G need cope such sky-rocketing traffic from these avoid network congestion. As such, cloud radio access (C-RAN) has been considered as paradigm shift for in which mobile are processed shared baseband processing. Despite call admission control (CAC) being one...

10.1186/s13638-017-0944-x article EN cc-by EURASIP Journal on Wireless Communications and Networking 2017-09-21

By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In UK, a report by Office for Education (OfE) showed 17% young people had been bullied during 2017–2018. This problem continues prevail with consequences including depression, anxiety, suicidal thoughts, eating disorders. Additionally, recent evidence suggests this type victimisation could intensify existing health complications. study investigates opportunities...

10.3390/jsan10010001 article EN cc-by Journal of Sensor and Actuator Networks 2020-12-29

The MPEG-2 standard supports a range of transmission methods for services. This document provides threat analysis and derives the security requirements when using Transport Stream, TS, to support an Internet network-layer unidirectional lightweight encapsulation (ULE). also motivation link-level ULE Stream. A Stream may be used send IPv4 packets, IPv6 other Protocol Data Units arbitrarily large number receivers supporting unicast and/or multicast transmissions.

10.1109/istmwc.2007.4299224 article EN 2007-07-01
Coming Soon ...