- Satellite Communication Systems
- IPv6, Mobility, Handover, Networks, Security
- Advanced Wireless Network Optimization
- Mobile Agent-Based Network Management
- Smart Grid Energy Management
- IoT and Edge/Fog Computing
- Wireless Communication Networks Research
- Power Line Communications and Noise
- Advanced MIMO Systems Optimization
- Cooperative Communication and Network Coding
- Microgrid Control and Optimization
- Energy Efficient Wireless Sensor Networks
- Smart Grid Security and Resilience
- Blockchain Technology Applications and Security
- IoT Networks and Protocols
- Electric Vehicles and Infrastructure
- Green IT and Sustainability
- Network Security and Intrusion Detection
- Advanced Battery Technologies Research
- Advanced Wireless Communication Technologies
- Mobile Ad Hoc Networks
- Telecommunications and Broadcasting Technologies
- Cloud Data Security Solutions
- Wireless Networks and Protocols
- Security in Wireless Sensor Networks
University of Wolverhampton
2018-2024
Torrens University Australia
2020
University of Bradford
2009-2018
Oxford Brookes University
2017-2018
University of Delhi
2014
University of Surrey
2009
Università Cattolica del Sacro Cuore
1979
Future 5G mobile communication systems are expected to integrate different radio access technologies, including the satellite component. Within framework, terrestrial services can be augmented with development of HTS and new mega-constellations meeting requirements, such as high bandwidth, low latency, increased coverage rural areas, air, seas. This article provides an overview current initiatives projects followed by a proposed architecture for networks where SDN/NFV approach facilitates...
The birth of beyond 5G (B5G) and emerge 6G have made personal industrial operations more reliable, efficient, profitable, accelerating the development next-generation Internet Things (IoT). We know, one most important key performance indicators in is smart network architecture, massive IoT applications, energy-efficient ubiquity networks rely mainly on intelligence automation for applications. This article addresses energy consumption problem with a system model dynamic architecture or...
Software-defined networks (SDNs) offer robust network architectures for current and future Internet of Things (IoT) applications. At the same time, SDNs constitute an attractive target cyber attackers due to their global view programmability. One major vulnerabilities typical SDN is susceptibility Distributed Denial Service (DDoS) flooding attacks. DDoS attacks can render controllers unavailable underlying infrastructure, causing service disruption or a complete outage in many cases. In this...
In recent years, Mobile Edge Computing (MEC) has revolutionized the landscape of telecommunication industry by offering low-latency, high-bandwidth, and real-time processing. With this advancement comes a broad range security challenges, most prominent which is Distributed Denial Service (DDoS) attacks, threaten availability performance MEC’s services. cases, Intrusion Detection Systems (IDSs), tool that monitors networks systems for suspicious activity notify administrators in real time...
ABSTRACT This paper is not a survey related to generic wireless sensor networks (WSNs), which have been largely treated in number of papers addressing more focused issues; rather, it specifically addresses architectural aspects WSNs some way connected with satellite link, topic that presents challenging interworking aspects. The main objective provide an overview the potential role segment future WSNs. In this perspective, requirements most meaningful WSN applications drawn and matched...
Traditional centralized data storage and processing solutions manifest limitations with regards to overall operational cost the security auditability of data. One biggest issues existing is difficulty keeping track who has had access how may have changed over its lifetime; while providing a secure easy-to-use mechanism share between different users. The ability electronically regulate sharing within across organizational entities in supply chain (SC) an open issue that only addressed...
This study focuses on enhancing network security by implementing dynamic ARP (Address Resolution Protocol) inspection to detect and mitigate spoofing attacks. The solution is built using Flask, a lightweight web framework, Scapy, powerful library for packet manipulation. system monitors traffic in real time analyzing packets, identifying inconsistencies, flagging potential attempts. It incorporates database integration through SQLite manage allowed blocked IP addresses, ensuring efficient...
Next-generation cellular networks such as fifth-generation (5G) will experience tremendous growth in traffic. To accommodate traffic demand, there is a necessity to increase the network capacity that eventually requires deployment of more base stations (BSs). Nevertheless, BSs are very expensive and consume significant amount energy. Meanwhile, cloud radio access (C-RAN) has been proposed an energy-efficient architecture leverages computing technology where baseband processing performed...
IoT is a groundbreaking technology that enables wireless interoperability between devices without human intervention. It has become an integral part of life and made significant advancements in the automotive industry. The combination vehicular networks opened up new possibilities but also led to challenges such as degraded QoS (Quality Service), network congestion, packet loss, transmission delay, intrusions, etc. These problems are apparent health monitoring systems. To overcome...
The systematic integration of the Internet Things (IoT) and Cyber-Physical Systems (CPS) into supply chain to increase operational efficiency quality has also introduced new complexities threat landscape. myriad sensors could data collection capabilities for businesses facilitate process automation aided by Artificial Intelligence (AI) but without adopting an appropriate Security-by-Design framework, detection response are destined fail. emerging concept Smart Workplace incorporates many CPS...
The widespread use of technology has made communication an indispensable part daily life. However, the present cloud infrastructure is insufficient to meet industry’s growing demands, and multi-access edge computing (MEC) emerged as a solution by providing real-time computation closer data source. Effective management MEC essential for high-quality services, proactive self-healing promising approach that anticipates executes remedial operations before faults occur. This paper aims identify,...
The development of science and technology has led to the era Industry 4.0. core concept is combination "material informationization". In supply chain manufacturing process, "material" physical entity world realized by data, identity, intelligence, information. 4.0 a disruptive transformation upgrade intelligent industrialization based on Internet-of-Things Big Data in traditional industrialization. goal "maximizing production efficiency, minimizing costs, maximizing individual needs human...
This article presents the in-flight demonstration of a new integrated aircraft communications system combining legacy and future radio technologies.This system, developed validated under real environmental conditions during flight trials, integrates all aeronautical service domains within common IPv6-based network.The trials were held framework European SANDRA project at Oberpfaffenhofen, Germany, in June 2013.The presented outcomes emphasize flexibility scalability network demonstrate...
Modern aeronautical telecommunication networks (ATN) make use of different simultaneous datalinks to deliver robust, secure, and efficient ATN services. This paper proposes a multiple attribute decision making based optimal datalink selection algorithm, which considers attributes including safety, QoS, costs, user/operator preferences. An intelligent TRigger-based aUtomatic Subjective weighTing ( <italic xmlns:mml="http://www.w3.org/1998/Math/MathML"...
Fifth generation (5G) cellular networks will be comprised of millions connected devices like wearable devices, Androids, iPhones, tablets, and the Internet Things (IoT) with a plethora applications generating requests to network. The 5G need cope such sky-rocketing traffic from these avoid network congestion. As such, cloud radio access (C-RAN) has been considered as paradigm shift for in which mobile are processed shared baseband processing. Despite call admission control (CAC) being one...
By law, schools are required to protect the well-being of students against problems such as on-campus bullying and physical abuse. In UK, a report by Office for Education (OfE) showed 17% young people had been bullied during 2017–2018. This problem continues prevail with consequences including depression, anxiety, suicidal thoughts, eating disorders. Additionally, recent evidence suggests this type victimisation could intensify existing health complications. study investigates opportunities...
The MPEG-2 standard supports a range of transmission methods for services. This document provides threat analysis and derives the security requirements when using Transport Stream, TS, to support an Internet network-layer unidirectional lightweight encapsulation (ULE). also motivation link-level ULE Stream. A Stream may be used send IPv4 packets, IPv6 other Protocol Data Units arbitrarily large number receivers supporting unicast and/or multicast transmissions.