About
47
Publications
35,353
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
656
Citations
Current institution
Publications
Publications (47)
The Industrial Internet of Things collects data from the environment to improve industrial processes. Data integrity, privacy, authorisation, and authentication attacks are among the security vulnerabilities in traditional IIoT networks. Blockchain is a potential solution to some of these security issues. However, the throughput of traditional bloc...
Device-to-device (D2D) communication is a promising technology in fifth-generation (5G) wireless networks, offering enhanced system capacity, spectrum performance, and energy efficiency. However, D2D links can introduce interference with cellular links, posing challenges in spectrum allocation and network quality assurance. This paper presents a no...
Cellular systems uses radio and microwave energy which is non-ionising in nature. The extensive use of cell phones has led to cell phone towers (base stations) being positioned in lots of communities flouting safety distance rules. There are instances where concerned citizens question field engineers of telecommunication networks for the siting of...
The increase of the Internet of Things (IoT) calls for secure solutions for industrial applications. The security of IoT can be potentially improved by blockchain. However, blockchain technology suffers scalability issues which hinders integration with IoT. Solutions to blockchain’s scalability issues, such as minimizing the computational complexit...
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to s...
The integration of Internet of Things devices onto the Blockchain implies an increase in
the transactions that occur on the Blockchain, thus increasing the storage requirements.
A solution approach is to leverage cloud resources for storing blocks within the chain.
The paper, therefore, proposes two solutions to this problem. The first being an imp...
The fast emergence of IoT devices and its accompanying big and complex data has necessitated a shift from the traditional networking architecture to software-defined networks (SDNs) in recent times. Routing optimization and DDoS protection in the network has become a necessity for mobile network operators in maintaining a good QoS and QoE for custo...
With the exponential increase in connected devices and its accompanying complexities in network management, dynamic Traffic Engineering (TE) solutions in Software-Defined Networking (SDN) using Reinforcement Learning (RL) techniques has emerged in recent times. The SDN architecture empowers network operators to monitor network traffic with agility,...
Due to the unprecedented growth in mobile data traffic, emerging mobile access networks such as fifth-generation (5G) would require huge bandwidth and a mobile fronthaul architecture as an essential solution in providing a high capacity for support in the future. To increase capacity, utilizing millimeter waves (mm-waves) in an analog radio over fi...
Digitization and automation have engulfed every scope and sphere of life. Internet of Things (IoT) has been the main enabler of the revolution. There still exist challenges in IoT that need to be addressed such as the limited address space for the increasing number of devices when using IPv4 and IPv6 as well as key security issues such as vulnerabl...
Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brilliant architecture is exposed to several security threats, e.g., the distributed denial of service (DDo...
The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the abi...
The efficient utilization of bandwidth on campus networks is a major traffic engineering issue. It requires a complete knowledge of the underlying physical network architecture as well as a means to automate or reactively and proactively program the network. The static nature of traditional network creates a hurdle that must be overcome to achieve...
The high possibility of benign nodes being maligned for reporting malicious behaviours can cause these benign nodes not to cooperate or may attempt to share inaccurate information with trustors in order to prevent being maligned. The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the se...
To maximize the benefits of LTE cellular networks, careful and proper planning is needed. This requires the use of accurate propagation models to quantify the path loss required for base station deployment. Deployed LTE networks in Ghana can barely meet the desired 100Mbps throughput leading to customer dissatisfaction. Network operators rely on tr...
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 per hour. Development of easily-accessible, simple DoS tools has increased the frequency and redu...
Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. M...
The use of trust and reputation models (TRMs) are on the rise due to the increasing complexities of cryptography. The use of cryptography though potent on traditional networks, cannot be supported by the resource constraint wireless sensor network (WSN). Trust evaluations have made use of a number of approaches, such as analytical, bio-and socio-in...
In Ghana and many countries within Sub-Sahara Africa, Long Term Evolution (LTE) is being considered for use within the sectors of Governance, Energy distribution and transmission, Transport, Education and Health. Subscribers and Governments within the region have high expectations for these new networks and want to leverage the promised enhanced co...
The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods for wireless sensor networks into socio-inspired, bio-inspired, and analytical methods...
Sensor nodes once deployed onto the field are mostly provided with little or no attention
making them prone to physical attacks by adversaries. Various security frameworks have been proposed to
mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as
such, the need to develop energy efficient framew...
The massive development and investment in the Ghanaian telecommunication sector and the act of deregulation in the industry has necessitated the deployment of Worldwide Inter-operability for Microwave Access (WiMAX) in the 2500-2690 MHz band to help serve the ever increasing needs of broadband internet subscribers in the country. In order to achiev...
The mobile telecommunication market in Ghana has grown significantly within the past few years, recording voice subscription base of 35 million and data subscription base of 18 million. The total number of base transceiver stations and Node Bs stand at 7502 and 4996 respectively. The rapid growth of mobile subscribers and number of base stations ne...
Relay technology promises appreciable network throughput and coverage enhancement which is required for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing the link performance of a relay-based WiMAX network under varying conditions. Comparison is made
between relay and direct link communication in...
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against node tampering and node subversion. Works carried out by wireless sensor network researchers pertaining to increas...
The number of anchor nodes required for accurate localization is an important problem in the wireless sensor network research community. The error associated with localization is high when anchor nodes are not optimally placed in the network. No matter how the network is set up, the error associated with localization is inevitable. There are variou...
Free Space Optical (FSO) communica-tion is the transmission of optical signals through the atmosphere. This technology promises high wireless data rates, highly secured transmission, license-free operation and immunity to electro-magnetic interference. However, FSO reliability is decreased considerably by atmospheric conditions. In this paper, we c...
Accurate traffic volume prediction in Universal Mobile Telecommunication System (UMTS) networks has become increasingly important because of its vital role in determining the Quality of Service (QoS) received by subscribers on these networks. This paper developed a short-term traffic volume prediction model using the Kalman filter algorithm. The mo...
In Wireless Sensor Networks (WSN) when an event is detected there is an increase in data traffic that might lead to packets being transmitted through the network close to the packet handling capacity of the WSN. The WSN experiences a decrease in network performance due to packet loss, long delays, and reduction in throughput. In this paper we devel...
Sensor Network (WSN) localization is an important and fundamental problem that has received a lot of attention from the WSN research community. Determining the absolute and relative coordinate of sensor nodes in the network adds much more meaning to sense data. The research community is very rich in proposals to address this challenge in WSN. This...
The communications needs of monitoring and control of the electric grid is traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communication protocols are Ethernet-based that used conte...
This study evaluates the performance of the energy detection based spectrum sensing technique in noisy and fading environments. Both single user detection and cooperative detection situations were investigated. Closed form solutions for the probabilities of detection and false alarm were derived. Analytical results were verified by numerical comput...
The tragic events of September 11th ushered a new era of unprecedented challenges. Our nation has to be protected from the alarming threats of adversaries. These threats exploit the nation's critical infrastructures affecting all sectors of the economy. There is the need for pervasive monitoring and decentralized control of the nation's critical in...
This paper investigates the problem of providing delay guarantees to time-sensitive users sharing an uplink channel. The channel is a time slotted joint AWGN and impulsive noise channel in a shadow fading environment. Guaranteeing delay in shadow fading and noisy environment requires the MAC layer to be aware of the application delay requirements a...
We develop analytical tools to assess the use of wireless data communication in power system environments. The communication functions considered in the study include real time monitoring, protective relaying and control. Two notions of wireless capacity computation in joint additive white Gaussian noise (AWGN) and impulsive noise channel is presen...
The election of a malicious or compromised node as the cluster head is one of the most significant breaches in cluster-based wireless sensor networks. In light of this, we are introducing a distributed trust-based framework and a mechanism for the election of trustworthy cluster heads. Our proposed mechanism reduces the likelihood of compromised an...
In this paper we propose an intelligent agent approach to control the electric power grid at a smaller granularity in order to give it self-healing capabilities. We develop a method using the influence model to transform transmission substations into information processing, analyzing and decision making (intelligent behavior) units. We also develop...