Ido Nevat

ORCID: 0000-0003-1567-3446
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Distributed Sensor Networks and Detection Algorithms
  • Target Tracking and Data Fusion in Sensor Networks
  • Indoor and Outdoor Localization Technologies
  • Gaussian Processes and Bayesian Inference
  • Advanced MIMO Systems Optimization
  • Building Energy and Comfort Optimization
  • Urban Heat Island Mitigation
  • Advanced Wireless Communication Techniques
  • Energy Efficient Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Wireless Communication Security Techniques
  • Cognitive Radio Networks and Spectrum Sensing
  • Power Line Communications and Noise
  • Privacy-Preserving Technologies in Data
  • Air Quality Monitoring and Forecasting
  • Wireless Communication Networks Research
  • Noise Effects and Management
  • Bayesian Methods and Mixture Models
  • Wind and Air Flow Studies
  • Error Correcting Code Techniques
  • Statistical Methods and Inference
  • Soil Geostatistics and Mapping
  • Internet Traffic Analysis and Secure E-voting
  • Energy Harvesting in Wireless Networks
  • Wireless Body Area Networks

Heriot-Watt University Malaysia
2000-2021

CREATe Centre
2021

Institute for Infocomm Research
2014-2018

University College London
2017

Agency for Science, Technology and Research
2014-2016

Commonwealth Scientific and Industrial Research Organisation
2009-2013

Nagoya University
2013

Health Sciences and Nutrition
2012

UNSW Sydney
2007-2010

Anomaly detection in communication networks is the first step challenging task of securing a network, as anomalies may indicate suspicious behaviors, attacks, network malfunctions, or failures. In this paper, we address problem not only detecting anomalous events but also attributing anomaly to flows causing it. To end, develop new statistical decision theoretic framework for temporally correlated traffic via Markov chain modeling. We formulate optimal generalized likelihood ratio test...

10.1109/tnet.2017.2765719 article EN IEEE/ACM Transactions on Networking 2017-12-08

We develop new and optimal algorithms for distributed detection in sensor networks over fading channels with multiple receive antennas at the Fusion Centre (FC). Sensors observe a hidden physical phenomenon transmit their observations using amplify-and-forward scheme to FC which is equipped antennas. derive decision rules associated probabilities of false alarm three scenarios Channel State Information (CSI) availability. For most difficult case unknown CSI, we two rule. The first based on...

10.1109/tsp.2013.2293970 article EN IEEE Transactions on Signal Processing 2014-01-24

The rise of geo-spatial location-based applications for the Internet Things introduces new location spoofing security risks. To overcome threat malicious attacks, we develop Secure Location (SLOT) framework which extends current state-of-the-art methods and is able to cope with such threats. SLOT incorporates another piece information has not been utilized so far, audibility information. This indicates whether a node able/unable communicate target. By leveraging on this available...

10.1109/jiot.2017.2753579 article EN IEEE Internet of Things Journal 2017-09-18

Climate change could have both positive and negative effects on the energy consumption of buildings. Today, it is not clear what extent these be at multiple spatial scales including building sectors, cities, climate zones. More importantly, uncertainty mathematical models used to estimate well understood. This knowledge gap makes difficult evaluate decisions about buildings, even technologies should prioritized in race mitigate change. Moreover, this lack for researchers build limitations...

10.1016/j.apenergy.2020.115556 article EN cc-by Applied Energy 2020-08-14

We develop new and novel algorithms for spatial field reconstruction exceedance level estimation. consider physical phenomena which are partially observed by a wireless sensor network. focus on the practical scenario in which, due to bandwidth power constraints, observations at sensors quantized transmitted over imperfect channels. first Spatial-Best Linear Unbiased Estimator (S-BLUE) algorithm then an that is based multivariate series expansion approach resulting Saddle-point type...

10.1109/tsp.2013.2280442 article EN IEEE Transactions on Signal Processing 2013-11-04

We develop new algorithms for geo-spatial location estimation Internet of Things (IoT) networks by utilizing a one way time arrival (OW-TOA) approach. first demonstrate the limitations current OW-TOA IoT when some anchor nodes (ANs) are outside communication range with source, which results in ambiguous level-sets likelihood function, causing inaccurate source localization. then show that networks, addition to using conventional noisy ranging measurements from range, we can make use...

10.1109/jiot.2016.2641902 article EN IEEE Internet of Things Journal 2016-12-19

IoT market is rapidly changing the cyber threat landscape. The challenges to security and privacy arise not only because devices are large in number, but also heterogeneous type functionality. Machine learning algorithms attractive methods solve various problems such as device identification, anomaly detection, attack detection. Often, all available features extracted from network traffic fed input train models, which practice regarded best approach. Associated with different kinds of cost,...

10.1109/comsnets.2019.8711210 article EN 2019-01-01

We develop a new Location Verification System (LVS) focussed on network-based Intelligent Transport Systems and vehicular ad hoc networks. The algorithm we is based an information-theoretic framework which uses the received signal strength (RSS) from network of base-stations claimed position. Based this information derive optimal decision regarding verification user's location. Our in sense maximizing mutual between its input output data. approach practical scenario non-colluding malicious...

10.1109/tvt.2014.2302022 article EN IEEE Transactions on Vehicular Technology 2014-01-31

We develop a new location spoofing detection algorithm for geo-spatial tagging and location-based services in the Internet of Things (IoT), called enhanced using audibility (ELSA), which can be implemented at backend server without modifying existing legacy IoT systems. ELSA is based on statistical decision theory framework uses two-way time-of-arrival (TW-TOA) information between user's device anchors. In addition to TW-TOA information, exploits implicit (or outage information) improve...

10.1109/jiot.2016.2535165 article EN IEEE Internet of Things Journal 2016-02-26

Building energy demand impacts a myriad of interconnected economic, societal, and environmental aspects. As result, Buildings Energy Models (BEM) play an important role in the process urban design planning. While previous studies have investigated effects building interventions on efficiency, their applicability may be limited due to BEM’s high computational complexity. This limits ability systematically study aspects large scale. The development Machine Learning (MLM) allows required...

10.20944/preprints202401.2062.v1 preprint EN 2024-01-30

We develop new algorithms for spatial field reconstruction, exceedance level estimation and classification in heterogeneous (mixed analog & digital sensors) Wireless Sensor Networks (WSNs). consider physical phenomena which are observed by a WSN, meaning that it consists partially of sparsely deployed high-quality sensors low-quality sensors. The transmit their (continuous) noisy observations to the Fusion Centre (FC), while first perform simple thresholding operation then binary values over...

10.1109/tsp.2015.2412917 article EN cc-by IEEE Transactions on Signal Processing 2015-03-13

The dynamic and unpredictable nature of energy harvesting sources available for wireless sensor networks, the time variation in network statistics like packet transmission rates link qualities, necessitate use adaptive duty cycling techniques. Such control allows nodes to achieve long-run neutrality, where supply demand are balanced a environment such that function continuously. In this paper, we develop new framework enabling an scheme networks takes into account node battery level, ambient...

10.1109/jsac.2015.2478717 article EN IEEE Journal on Selected Areas in Communications 2015-09-14

In this paper, we address the challenging problem of multiple source localization in wireless sensor networks (WSN). We develop an efficient statistical algorithm, based on novel application sequential Monte Carlo (SMC) sampler methodology, that is able to deal with unknown number sources given quantized data obtained at fusion center from different sensors imperfect channels. also derive posterior Cramér-Rao bound (PCRB) location estimate. The PCRB used analyze accuracy proposed SMC...

10.1109/tsp.2015.2505689 article EN IEEE Transactions on Signal Processing 2015-12-04

Any machine exposed to the Internet today is at risk of being attacked and compromised. Detecting attack attempts, be they successful or not, important for securing networks (servers, end-hosts other assets) as well forensic analysis. In this context, we focus on problem evidence gathering by detecting fundamental patterns in network traffic related suspicious activities. anomalous necessary a solution able detect many types attacks malicious activities possible. Our framework correlates...

10.1016/j.diin.2017.02.001 article EN cc-by-nc-nd Digital Investigation 2017-03-01

Privacy-preserving routing protocols in wireless networks frequently utilize additional artificial traffic to hide the identities of communicating source-destination pairs. Usually, addition is done heuristically with no guarantees that transmission cost, latency, and so on, are optimized every network topology. In this paper, we explicitly examine privacy-utility tradeoff problem for develop a novel privacy-preserving algorithm called optimal privacy enhancing (OPERA). OPERA uses...

10.1109/tifs.2017.2698424 article EN IEEE Transactions on Information Forensics and Security 2017-04-26

We develop a new class of event detection algorithms in Wireless Sensor Networks where the sensors are randomly deployed spatially. formulate problem as binary hypothesis testing and design optimal decision rules for two scenarios, namely Poisson Point Process Binomial random deployments. To calculate intractable marginal likelihood density, we three types series expansion methods which based on an Askey-orthogonal polynomials. In addition, novel framework to provide guidance is most...

10.1109/tsp.2015.2452218 article EN IEEE Transactions on Signal Processing 2015-07-07

We address the two fundamental problems of spatial field reconstruction and sensor selection in heterogeneous networks. consider case where types sensors are deployed: first consists expensive, high quality sensors; second, cheap low sensors, which activated only if intensity exceeds a pre-defined activation threshold (e.g., wind sensors). In addition, these powered by means energy harvesting their time varying status impacts on accuracy measurement that may be obtained. then following...

10.1109/tsp.2018.2802452 article EN IEEE Transactions on Signal Processing 2018-02-05

The verification of the location information utilized in wireless communication networks is a subject growing importance. In this work we formally analyze, for first time, performance Location Verification System (LVS) under realistic setting spatially correlated shadowing. Our analysis illustrates that anticipated levels shadowing can lead to dramatic improvement Received Signal Strength (RSS)-based LVS. We also analyze an LVS utilizes Differential (DRSS), proving rather counter-intuitive...

10.1109/twc.2016.2535303 article EN IEEE Transactions on Wireless Communications 2016-02-26

We develop a new algorithm for geospatial tagging Internet-of-Things (IoT) type applications, which we denote as location-of-things (LoT). The underlying idea of LoT applications is to use low-cost off-the-shelf two-way time-of-arrival (TW-ToA) ranging devices perform localization tags. first demonstrate how conventional TW-ToA algorithms may experience performance degradation in cases where some the access points (APs) are outside communication range then show that can make audibility...

10.1109/tsipn.2016.2531422 article EN IEEE Transactions on Signal and Information Processing over Networks 2016-02-19

We present a new paradigm to perform spatial spectrum sensing in cooperative cognitive radio networks. In these networks, nodes cooperate infer information on spectral and occupancy. Following the recently proposed interference temperature metric, we formulate problem via semi-parametric Gaussian Process modelling. This allows for development of flexible probabilistic framework inference function space. Our methodology enables reusable zones, by means collaborative scheme estimate...

10.1109/ausctw.2012.6164900 article EN 2012-01-01

In this paper, we propose and examine location verification systems (LVSs) for vehicular ad hoc networks (VANETs) in the realistic setting of Rician fading channels. our LVSs, a single authorized base station (BS) equipped with multiple antennas aims to detect malicious vehicle that is spoofing its claimed location. We first determine optimal attack strategy vehicle, which, turn, allows us analyze LVS performance as function K- factor channel between BS legitimate vehicle. Our analysis also...

10.1109/tvt.2015.2453160 article EN IEEE Transactions on Vehicular Technology 2015-07-06

We present two novel distributed event detection algorithms based on a statistical approach that tolerate Byzantine attacks where malicious (compromised) sensors send false sensing data to the gateway leading increased alarm rate. study problem of attack function optimization and decision threshold consider practical cases in our algorithms. In first case, Channel State Information (CSI) between generating source is unknown while CSI known. second as well are unknown. develop an optimal rule...

10.1109/issnip.2014.6827609 article EN 2014-04-01

Abstract Interference is an important limitation in many communication systems. It has been shown situations that the popular Gaussian approximation not adequate and interference exhibits impulsive behavior. This paper surveys different statistical models proposed for such interference, can generally be unified using class of sub-exponential family distributions, its impact on receiver design. Visualizing optimal decision boundaries allows one to show non linear effect induced by noise...

10.1186/s13638-020-01868-1 article EN cc-by EURASIP Journal on Wireless Communications and Networking 2021-01-22
Coming Soon ...