Dzisi Gadze

Dzisi Gadze
  • Kwame Nkrumah University of Science and Technology

About

47
Publications
35,353
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
656
Citations
Current institution
Kwame Nkrumah University of Science and Technology

Publications

Publications (47)
Article
Full-text available
The Industrial Internet of Things collects data from the environment to improve industrial processes. Data integrity, privacy, authorisation, and authentication attacks are among the security vulnerabilities in traditional IIoT networks. Blockchain is a potential solution to some of these security issues. However, the throughput of traditional bloc...
Article
Full-text available
Device-to-device (D2D) communication is a promising technology in fifth-generation (5G) wireless networks, offering enhanced system capacity, spectrum performance, and energy efficiency. However, D2D links can introduce interference with cellular links, posing challenges in spectrum allocation and network quality assurance. This paper presents a no...
Article
Cellular systems uses radio and microwave energy which is non-ionising in nature. The extensive use of cell phones has led to cell phone towers (base stations) being positioned in lots of communities flouting safety distance rules. There are instances where concerned citizens question field engineers of telecommunication networks for the siting of...
Article
Full-text available
The increase of the Internet of Things (IoT) calls for secure solutions for industrial applications. The security of IoT can be potentially improved by blockchain. However, blockchain technology suffers scalability issues which hinders integration with IoT. Solutions to blockchain’s scalability issues, such as minimizing the computational complexit...
Article
Full-text available
The move towards intelligent systems has led to the evolution of IoT. This technological leap has over the past few years introduced significant improvements to various aspects of the human environment, such as health, commerce, transport, etc. IoT is data-centric; hence, it is required that the underlying protocols are scalable and sufficient to s...
Article
Full-text available
The integration of Internet of Things devices onto the Blockchain implies an increase in the transactions that occur on the Blockchain, thus increasing the storage requirements. A solution approach is to leverage cloud resources for storing blocks within the chain. The paper, therefore, proposes two solutions to this problem. The first being an imp...
Article
Full-text available
The fast emergence of IoT devices and its accompanying big and complex data has necessitated a shift from the traditional networking architecture to software-defined networks (SDNs) in recent times. Routing optimization and DDoS protection in the network has become a necessity for mobile network operators in maintaining a good QoS and QoE for custo...
Article
Full-text available
With the exponential increase in connected devices and its accompanying complexities in network management, dynamic Traffic Engineering (TE) solutions in Software-Defined Networking (SDN) using Reinforcement Learning (RL) techniques has emerged in recent times. The SDN architecture empowers network operators to monitor network traffic with agility,...
Article
Full-text available
Due to the unprecedented growth in mobile data traffic, emerging mobile access networks such as fifth-generation (5G) would require huge bandwidth and a mobile fronthaul architecture as an essential solution in providing a high capacity for support in the future. To increase capacity, utilizing millimeter waves (mm-waves) in an analog radio over fi...
Article
Full-text available
Digitization and automation have engulfed every scope and sphere of life. Internet of Things (IoT) has been the main enabler of the revolution. There still exist challenges in IoT that need to be addressed such as the limited address space for the increasing number of devices when using IPv4 and IPv6 as well as key security issues such as vulnerabl...
Article
Full-text available
Software-Defined Networking (SDN) is a new paradigm that revolutionizes the idea of a software-driven network through the separation of control and data planes. It addresses the problems of traditional network architecture. Nevertheless, this brilliant architecture is exposed to several security threats, e.g., the distributed denial of service (DDo...
Article
Full-text available
The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the sensor nodes operate; this makes eavesdropping of messages possible on the network. This paper proposes a privacy-aware sociopsychological trust and reputation management (PSTRM) model. The paper presents a model that models the abi...
Article
Full-text available
The efficient utilization of bandwidth on campus networks is a major traffic engineering issue. It requires a complete knowledge of the underlying physical network architecture as well as a means to automate or reactively and proactively program the network. The static nature of traditional network creates a hurdle that must be overcome to achieve...
Preprint
Full-text available
The high possibility of benign nodes being maligned for reporting malicious behaviours can cause these benign nodes not to cooperate or may attempt to share inaccurate information with trustors in order to prevent being maligned. The high possibility of attack is greatly attributed to the broadcast nature of the communication medium in which the se...
Preprint
Full-text available
To maximize the benefits of LTE cellular networks, careful and proper planning is needed. This requires the use of accurate propagation models to quantify the path loss required for base station deployment. Deployed LTE networks in Ghana can barely meet the desired 100Mbps throughput leading to customer dissatisfaction. Network operators rely on tr...
Article
Full-text available
A denial of service (DoS) attack in a computer network is an attack on the availability of computer resources to prevent users from having access to those resources over the network. Denial of service attacks can be costly, capable of reaching $100,000 per hour. Development of easily-accessible, simple DoS tools has increased the frequency and redu...
Article
Full-text available
Distributed denial of service (DDoS) attacks are a major threat to any network-based service provider. The ability of an attacker to harness the power of a lot of compromised devices to launch an attack makes it even more complex to handle. This complexity can increase even more when several attackers coordinate to launch an attack on one victim. M...
Article
Full-text available
The use of trust and reputation models (TRMs) are on the rise due to the increasing complexities of cryptography. The use of cryptography though potent on traditional networks, cannot be supported by the resource constraint wireless sensor network (WSN). Trust evaluations have made use of a number of approaches, such as analytical, bio-and socio-in...
Article
Full-text available
In Ghana and many countries within Sub-Sahara Africa, Long Term Evolution (LTE) is being considered for use within the sectors of Governance, Energy distribution and transmission, Transport, Education and Health. Subscribers and Governments within the region have high expectations for these new networks and want to leverage the promised enhanced co...
Article
Full-text available
The security of a wireless sensor network is greatly increased with increasing levels of trustworthiness of nodes on the network. There are a number of trust models proposed that use various trust evaluation methods. The paper categorises trust evaluation methods for wireless sensor networks into socio-inspired, bio-inspired, and analytical methods...
Article
Full-text available
Sensor nodes once deployed onto the field are mostly provided with little or no attention making them prone to physical attacks by adversaries. Various security frameworks have been proposed to mitigate tampering; others also ensure authentication of sensor nodes. Energy is a limited resource and as such, the need to develop energy efficient framew...
Article
Full-text available
The massive development and investment in the Ghanaian telecommunication sector and the act of deregulation in the industry has necessitated the deployment of Worldwide Inter-operability for Microwave Access (WiMAX) in the 2500-2690 MHz band to help serve the ever increasing needs of broadband internet subscribers in the country. In order to achiev...
Conference Paper
Full-text available
The mobile telecommunication market in Ghana has grown significantly within the past few years, recording voice subscription base of 35 million and data subscription base of 18 million. The total number of base transceiver stations and Node Bs stand at 7502 and 4996 respectively. The rapid growth of mobile subscribers and number of base stations ne...
Article
Full-text available
Relay technology promises appreciable network throughput and coverage enhancement which is required for high speed wireless cellular systems to function to their optimum. This paper is focused on analysing the link performance of a relay-based WiMAX network under varying conditions. Comparison is made between relay and direct link communication in...
Article
Full-text available
Security in wireless sensor network (WSN) has become an increasing necessity due to the diverse application areas being implemented. Application areas such as military surveillance and environmental monitoring need to be guided against node tampering and node subversion. Works carried out by wireless sensor network researchers pertaining to increas...
Article
Full-text available
The number of anchor nodes required for accurate localization is an important problem in the wireless sensor network research community. The error associated with localization is high when anchor nodes are not optimally placed in the network. No matter how the network is set up, the error associated with localization is inevitable. There are variou...
Article
Full-text available
Free Space Optical (FSO) communica-tion is the transmission of optical signals through the atmosphere. This technology promises high wireless data rates, highly secured transmission, license-free operation and immunity to electro-magnetic interference. However, FSO reliability is decreased considerably by atmospheric conditions. In this paper, we c...
Article
Full-text available
Accurate traffic volume prediction in Universal Mobile Telecommunication System (UMTS) networks has become increasingly important because of its vital role in determining the Quality of Service (QoS) received by subscribers on these networks. This paper developed a short-term traffic volume prediction model using the Kalman filter algorithm. The mo...
Conference Paper
Full-text available
In Wireless Sensor Networks (WSN) when an event is detected there is an increase in data traffic that might lead to packets being transmitted through the network close to the packet handling capacity of the WSN. The WSN experiences a decrease in network performance due to packet loss, long delays, and reduction in throughput. In this paper we devel...
Article
Full-text available
Sensor Network (WSN) localization is an important and fundamental problem that has received a lot of attention from the WSN research community. Determining the absolute and relative coordinate of sensor nodes in the network adds much more meaning to sense data. The research community is very rich in proposals to address this challenge in WSN. This...
Article
Full-text available
The communications needs of monitoring and control of the electric grid is traditionally catered for by wired communication systems. These technologies ensured high reliability and bandwidth but are however very expensive, inflexible and do not support mobility and pervasive monitoring. The communication protocols are Ethernet-based that used conte...
Conference Paper
Full-text available
This study evaluates the performance of the energy detection based spectrum sensing technique in noisy and fading environments. Both single user detection and cooperative detection situations were investigated. Closed form solutions for the probabilities of detection and false alarm were derived. Analytical results were verified by numerical comput...
Article
The tragic events of September 11th ushered a new era of unprecedented challenges. Our nation has to be protected from the alarming threats of adversaries. These threats exploit the nation's critical infrastructures affecting all sectors of the economy. There is the need for pervasive monitoring and decentralized control of the nation's critical in...
Conference Paper
Full-text available
This paper investigates the problem of providing delay guarantees to time-sensitive users sharing an uplink channel. The channel is a time slotted joint AWGN and impulsive noise channel in a shadow fading environment. Guaranteeing delay in shadow fading and noisy environment requires the MAC layer to be aware of the application delay requirements a...
Conference Paper
We develop analytical tools to assess the use of wireless data communication in power system environments. The communication functions considered in the study include real time monitoring, protective relaying and control. Two notions of wireless capacity computation in joint additive white Gaussian noise (AWGN) and impulsive noise channel is presen...
Conference Paper
Full-text available
The election of a malicious or compromised node as the cluster head is one of the most significant breaches in cluster-based wireless sensor networks. In light of this, we are introducing a distributed trust-based framework and a mechanism for the election of trustworthy cluster heads. Our proposed mechanism reduces the likelihood of compromised an...
Article
In this paper we propose an intelligent agent approach to control the electric power grid at a smaller granularity in order to give it self-healing capabilities. We develop a method using the influence model to transform transmission substations into information processing, analyzing and decision making (intelligent behavior) units. We also develop...

Network

Cited By