- Mobile Ad Hoc Networks
- Energy Efficient Wireless Sensor Networks
- Wireless Networks and Protocols
- IoT Networks and Protocols
- Wireless Body Area Networks
- Energy Harvesting in Wireless Networks
- Bluetooth and Wireless Communication Technologies
- IoT and Edge/Fog Computing
- Opportunistic and Delay-Tolerant Networks
- Software-Defined Networks and 5G
- Cooperative Communication and Network Coding
- Smart Grid Security and Resilience
- Security in Wireless Sensor Networks
- IPv6, Mobility, Handover, Networks, Security
- Network Traffic and Congestion Control
- Interconnection Networks and Systems
- Reservoir Engineering and Simulation Methods
- Network Security and Intrusion Detection
- IoT-based Smart Home Systems
- Wireless Power Transfer Systems
- Drilling and Well Engineering
- Relativity and Gravitational Theory
- Cryptographic Implementations and Security
- Network Time Synchronization Technologies
- Age of Information Optimization
University of Limerick
2024
Munster Technological University
2017-2023
Huawei Technologies (Sweden)
2023
Schlumberger (British Virgin Islands)
2021-2022
Shaikh Zayed Medical College and Hospital
2022
Carleton University
2011-2021
Nimbus (Italy)
2019
Northwestern Polytechnical University
2018
University College Cork
2015-2017
University of Lübeck
2012-2015
In this paper, we present a Multi-hop Routing with Low Energy Adaptive Clustering Hierarchy (MR-LEACH) protocol. order to prolong the lifetime of Wireless Sensor Network (WSN), MR-LEACH partitions network into different layers clusters. Cluster heads in each layer collaborates adjacent transmit sensor's data base station. Ordinary sensor nodes join cluster based on Received Signal Strength Indicator (RSSI). The transmission is controlled by Base Station (BS) that defines Time Division...
This paper presents a survey on the current state-of-the-art in Wireless Sensor Network (WSN) Operating Systems (OSs). In recent years, WSNs have received tremendous attention research community, with applications battlefields, industrial process monitoring, home automation, and environmental to name but few. A WSN is highly dynamic network because nodes die due severe conditions battery power depletion. Furthermore, composed of miniaturized motes equipped scarce resources e.g., limited...
Sophisticated mechanisms for attacking computer networks are emerging, making it crucial to have equally advanced in place defend against these malicious attacks. Autonomous cyber operations (ACO) considered a potential solution providing timely defense. In ACO, an agent that attacks the network is called red agent, while defends blue agent. real-world scenarios, different types of agents can attack network, requiring variety agents, each with unique strategies and goals. Training agnostic...
LoRa is the most popular low-power wide-area networking (LPWAN) technology, and typically it uses LoRaWAN as MAC layer. Usually, forms a single-hop network. supports customization of transmission parameters, such as, bandwidth, spreading factor, coding rate. Hence, network's coverage can be increased at expense higher energy consumption lower data However, there are few issues: (i) an upper bound on coverage, (ii) high throughput large not achieved simultaneously, (iii) importantly generally...
Low-power wide-area networking (LPWAN) technologies are capable of supporting a large number Internet Things (IoT) use cases. While several LPWAN exist, Long Range (LoRa) and its network architecture LoRaWAN, is currently the most adopted technology. LoRa provides range physical layer communication settings, such as bandwidth, spreading factor, coding rate, transmission frequency. These settings impact throughput, reliability, range. As IoT cases result in varying patterns, it essential to...
Compared to visible spectrum image the infrared is much clearer in poor lighting conditions. Infrared imaging devices are capable operate even without availability of light, acquires clear images objects which helpful efficient classification and detection. For object detection, CNN belongs class feed-forward ANN, has been successfully used. Fast RCNN combines advantages modern detectors i.e. SPPnet classify proposals more efficiently, resulting better faster To further improve detection...
There is a growing momentum and expectation that smart home applications will become major market success. Therefore, many consumer electronics industry organizations are manufacturing devices for networked applications. However, the current opportunity leading to from different manufacturers lacking interoperability due multitude of communication standards proprietary protocols in use. This situation has resulted significant issues automation systems, operational silos each individual...
Recent studies demonstrate that the performance of a wireless sensor network (WSN) can be improved by deploying multiple sinks in network. Therefore, this paper we present different routing protocols for multi-sink WSNs based on protocol low-power and lossy networks (RPL). Our use metrics objective functions (OFs). We available bandwidth, delay, MAC layer queue occupancy, expected transmission count (ETX) as tie-breaking conjunction with shortest hop-count metric. OFs greedy or end-to-end...
Real-time multimedia applications require quality of service (QoS) provisioning in terms bounds on delay and packet loss along with soft bandwidth guarantees. The shared nature the wireless communication medium results interference. Interference combined overheads, associated a access control (MAC) protocol, implementation networking protocol stack limit available IEEE 802.15.4-based networks can result congestion, even if transmission rates nodes are well below maximum supported by an...
The performance of densely-deployed low-power wide-area networks (LPWANs) can significantly deteriorate due to packets collisions, and one the main reasons for that is rule-based PHY layer transmission parameters assignment algorithms. LoRaWAN a leading LPWAN technology where LoRa serves as physical layer. Here, we propose evaluate deep reinforcement learning (DRL)-based parameter algorithm LoRaWAN. Our ensures fewer collisions better network compared existing state-of-the-art algorithms...
The expansion rate of the Universe changes with time, initially slowing (decelerating) when universe was matter dominated, because mutual gravitational attraction all in it, and more recently speeding up (accelerating). A number cosmological observations now strongly support idea that is spatially flat (provided dark energy density at least approximately time independent) currently undergoing an accelerated expansion. majority cosmologists consider "dark energy" to be cause this observed...
In recent years, Wireless Sensor Networks (WSNs) attracted researchers' attention. This has led to advancements made in both hardware design and software components. The research at the level resulted a variant of WSN called Multimedia (WMSNs). WSNs have application battlefields, industrial process monitoring, environmental name but few. Furthermore, WMSNs potential for real-time object detection recognition. It can be used locate misplaced items, assisted living, helping people with...
Estimating the available bandwidth in IEEE 802.15.4-based networks is a difficult and challenging task due to shared nature of wireless communication medium. The MAC layer decides sharing medium, therefore dictates amount node. Some recent solutions consider impact back-off collision transmitter receiver non-synchronization on bandwidth, Available Bandwidth Estimation (ABE) one such example. None existing pro-actively additional overhead an unslotted Carrier Sense Multiple Access Collision...
Low-power wide-area networking (LPWAN) has gained much attention recently and offers significant potential to support a large number of Internet Things (IoT) applications. For device simplicity, LPWANs tend use simple channel access control protocol such as Aloha, which impacts performance. While several LPWAN technologies are available, we specifically focus on the Long Range (LoRa) in this paper. Our goal study is search for conjunction with LoRa physical layer that can improve network...
We highlight different important factors that must be considered for an effective available-bandwidth-based flow admission control algorithm in ad hoc wireless networks. Moreover, we present BandEst; it is a combination of measurement-based available bandwidth estimation technique and IEEE 802.15.4-based networks considers the identified factors. Extensive simulations are performed to compare BandEst with state-of-the-art algorithms Our simulation results demonstrate significantly outperforms
The long range and low-power operation of Low- Power Wide-Area Network (LPWAN) communication technologies make them an attractive choice for many Internet Things (IoTs) use cases. Among existing LPWAN technologies, Long Range (LoRa) is most popular. LoRa PHY layer supports a number settings. settings impact coverage, reliability, energy consumption. LoRaWAN the standard MAC LoRa, documentation recommends using setting that provides higher resilience against interference. However, setting's...
In this paper, we first survey cross layer architectures for Wireless Sensor Networks and Multimedia (WMSNs). Afterwards, introduce a novel framework supporting multiple applications in WMSNs. The proposed supports heterogeneous flows it classifies WMSN traffic into six classes. partitions the network hexagonal cells uses seven cell frequency reuse pattern to enhance throughput minimize interference. shared database enable interactions. For on single node, an area memory is reserved where...
In this paper we present enhanced routing protocol for low-lower and lossy networks (ERPL), a reduced overhead short-range low-power wireless networks, based on RPL. ERPL enhances peer-to-peer (P2P) route construction data packet forwarding in RPL’s storing non-storing modes of operation (MoPs). order to minimize source overhead, it encodes paths Bloom Filters (BF). The salient features include the following: (i) optimized P2P forwarding; (ii) no additional control messages; (iii) minimized...
In this paper, we analyse the impact of Contiki Operating System (OS), and its Carrier Sense Multiple Access Collision Avoidance (CSMA-CA) implementation on an IEEE 802.15.4 node's throughput wireless channel utilization. The analysis is based Contiki's Rime networking protocol stack, target to determine upper bound for stated metrics. We explain that in with CSMA-CA as a MAC layer protocol, limited 8.1 kbps, at maximum, even without power saving features. order maximize transmission...
The Routing Protocol for low-power and Lossy networks (RPL) is the most popular routing protocol lossy (LLNs). Recent studies demonstrate that RPL performs poorly in peer-to-peer (P2P) communication. However, P2P communication of immense importance many LLNs require actuation control operations, such as cyber-physical systems. In order to alleviate performance problem RPL, we present a mechanism enhance route construction data packet forwarding RPL's storing non-storing mode operations...
In this paper, a differentiated services based congestion control algorithm for Wireless Multimedia Sensor Networks (WMSNs) is proposed. Keeping in mind the characteristics of (WSNs) and their possible extensions, proposed categorizes WMSNs traffic into six different classes. The takes novel approach towards WMSNs. Upon detection congestion, congested node makes an estimate data rate that should be used by itself its one hop away upstream neighbours. While estimating rate, considers...