Mehran Abolhasan

Mehran Abolhasan
University of Technology Sydney | UTS · School of Electrical and Data Engineering

PhD

About

181
Publications
79,448
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
5,581
Citations
Additional affiliations
January 2014 - present
University of Technology Sydney
Position
  • Associate Professor/Director of Research Programs
March 2010 - present
University of Technology Sydney 
January 2006 - February 2010
University of Wollongong
Position
  • Lab Director

Publications

Publications (181)
Article
The majority of existing DDoS defense mechanisms in SDN impose a significant computational burden on the controller and employ limited flow statistics and packet features. Tackling these issues, this paper presents a multi-layer defense mechanism that detects and mitigates three distinct types of flooding DDoS attacks. In the proposed framework, th...
Article
Full-text available
Data encryption aims to protect the confidentiality of data at storage, during transmission, or while in processing. However, it is not always the optimum choice as attackers know the existence of the ciphertext. Hence, they can exploit various weaknesses in the implementation of encryption algorithms and can thus decrypt or guess the related crypt...
Preprint
Full-text available
The weather phenomenon of frost poses great threats to agriculture. Since it damages the crops and plants from upstream of the supply chain, the potential impact of frosts is significant for agriculture-related industries. As recent frost prediction methods are based on on-site historical data and sensors, extra development and deployment time are...
Article
Future 6G wireless communication systems are expected to feature intelligence and automation. Knowledge-defined networking (KDN) is an evolutionary step toward autonomous and self-driving networks. The building blocks of the KDN paradigm in achieving self-driving networks are software-defined networking (SDN), packet-level network telemetry, and ma...
Article
Full-text available
Frost events incur substantial economic losses to farmers. These events could induce damage to plants and crops by damaging the cells. In this article, a recurrent neural network-based method, automating the frost prediction process, is proposed. The recurrent neural network-based models leveraged in this article include the standard recurrent neur...
Article
Full-text available
Radio frequency energy harvesting (RFEH) and wireless power transmission (WPT) are two emerging alternative energy technologies that have the potential to offer wireless energy delivery in the future. One of the key components of RFEH or WPT system is the receiving antenna. The receiving antenna’s performance has a considerable impact on the power...
Article
Full-text available
Most of the existing science and technology parks resort to various conventional ways to attract different stakeholders to the park. Some of these traditional measures include business support, workspaces, laboratories, networking events, accommodation, and essential commodities. Besides, with rampantly changing multidisciplinary technologies and i...
Article
Wireless cellular networks have rapidly evolved to be software-defined in nature. This has created opportunities to improve their performance. One such opportunity is through enabling programming and integration of multi-hop device-to-device (MD2D) at the edge. However, efficient integration of MD2D at the edge requires a highly adaptable and scala...
Article
While multi-hop multi-frequency mesh has been extensively studied in the past decades, only several deployable and relatively bulky systems have been developed to support small numbers of hops under stationary settings. This paper presents a new Software-Defined Networking (SDN)-based design of multi-hop multi-frequency mesh. A new lightweight hard...
Article
Network slicing is expected to emerge as a promising solution for end-to-end resource management and orchestration together with Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies. In this paper, acomprehensive network slicing framework is presented to achieve end-to-end (E2E) QoS provisioning among customized...
Article
Full-text available
Applications and technologies of the Internet of Things are in high demand with the increase of network devices. With the development of technologies such as 5G, machine learning, edge computing, and Industry 4.0, the Internet of Things has evolved. This survey article discusses the evolution of the Internet of Things and presents the vision for In...
Article
Full-text available
Continuous and accurate sensing of water content in soil is an essential and useful measure in the agriculture industry. Traditional sensors developed to perform this task suffer from limited lifetime and also need to be calibrated regularly. Further, maintenance, support, and deployment of these sensors in remote environments provide additional ch...
Article
Full-text available
Many engineered and natural systems are modeled as networks of coupled systems. Synchronization is one of their crucial and well-studied behaviors. Uniform coupling strength has been the benchmark practice in the majority of the literature. This paper considers nonuniform coupling strength, and a modified approach to the problem of synchronizabilit...
Preprint
Full-text available
Continuous and accurate sensing of water content in soil is an essential and useful measure in the agriculture industry. Traditional sensors developed to perform this task suffer from limited lifetime and also need to be calibrated regularly. Further, maintenance, support, and deployment of these sensors in remote environments provide additional ch...
Article
Full-text available
Future IoT devices are expected to be fully ubiquitous. To achieve this vision, a new generation of IoT devices need to be developed, which can operate autonomously. To achieve autonomy, IoT devices must be completely wireless, both in terms of transmission and power. Further, accurate sensing is another crucial parameter of autonomy. Several wirel...
Article
In this paper, we propose a novel mobility model providing train traffic traces essential for train-to-train communication models. As the proposed mobility model works only based on trip timetables and train timetables are currently available in real-time, the produced mobility traces will be also in real-time. Additionally, as no GPS module is use...
Article
Full-text available
Being incident and polarization angle insensitive are crucial characteristics of metamaterial perfect absorbers due to the variety of incident signals. In the case of incident angles insensitivity, facing transverse electric (TE) and transverse magnetic (TM) waves affect the absorption ratio significantly. In this scientific report, a crescent shap...
Article
Full-text available
Frost damage in broadacre cropping and horticulture (including viticulture) results in substantial economic losses to producers and may also disrupt associated product value chains. Frost risk windows are changing in timing, frequency, and duration. Faced with the increasing cost of mitigation infrastructure and competition for resources (e.g. wate...
Article
In this paper, we propose three algorithms for placement of access points (APs) for the purpose of data transportation via train-to-wayside (T2W) communications along a rail network. The first algorithm is proposed to find the minimum number of APs so that the path-loss (PL) does not exceed a desired threshold. Through the second algorithm, the mos...
Conference Paper
Full-text available
Exhibition of malicious behavior during blockchain consensus, threats against reputation systems, and high TX latency are significant issues for blockchain-based IoT systems. Hence, to mitigate such challenges we propose “Pledge”, a unique Proof-of-Honesty based consensus protocol. Initial experimen- tation shows that Pledge is economical with low c...
Article
Full-text available
Of collective behaviors in networks of coupled systems, synchronization is of central importance and an extensively studied area. This is due to the fact that it is essential for the proper functioning of a wide variety of natural and engineered systems. Traditionally, uniform coupling strength has been the default choice and the synchronizability...
Article
Full-text available
High-resolution arrays of discrete monocrystalline scintillators used for gamma photon coincidence detection in PET are costly and complex to fabricate, and exhibit intrinsically non-uniform sensitivity with respect to emission angle. Nanocomposites and transparent ceramics are two alternative classes of scintillator materials which can be formed i...
Article
Non-invasive crowd estimation has remained a challenging issue among researchers. Methods such as image analysis and WiFi/Bluetooth probing can always be used to identify and track people. Lately, authors have introduced a non-invasive method for crowd estimation based on ambient RF energy measurements. In this paper, a polarization-insensitive mul...
Article
Current crowd density estimation technologies that leverage IR depth perception, video and image processing or WiFi/BLE-based sniffing and probing have privacy and deployment issues. This paper presents a novel method for non-intrusive crowd density estimation that monitors variation in EM radiation within an environment. The human body's electrica...
Conference Paper
Full-text available
As a tool for human technological advancement, the peer-review system acts as a gateway for ensuring academic paper qualities. However, the system has proven to be slow and expensive. Also, biasedness remains an unsolved problem. Such issues could become a major bottleneck, which can adversely impact research progress and dissemination of knowledge...
Article
Full-text available
The ubiquitous use of Internet of Things (IoT) ranges from industrial control systems to e-Health, e-commerce, smart cities, agriculture, supply chain management, smart cars, cyber-physical systems and a lot more. However, the data collected and processed by IoT systems especially the ones with central- ized control are vulnerable to availabili...
Article
The extensive use of metamaterials and metamaterial absorbers increases the demand for compact structures in various frequencies. Designing electrically small absorbers for lower frequencies, especially sub-gigahertz applications, is one of the open issues in this field. In this paper, a space filling curve is used to design an absorber operating o...
Conference Paper
This work presents a technique for localising the endpoints of the lines of response in a PET scanner based on a continuous cylindrical shell scintillator. The technique is demonstrated by applying it to a simulation of a sensitivity-optimised continuous cylindrical shell PET system using two novel scintillator materials - a transparent ceramic gar...
Article
Full-text available
With rapidly growing adoption of wireless technologies, requirements for the design of a miniature wideband multiresonators are increasing. In this study, a compact fractal-based metamaterial structure with lumped resistors is described. The structure of the authors proposed absorber is a combination of Sierpinski curve and Minkowski fractal. The n...
Article
To support diversified quality of service (QoS) demands and dynamic resource requirements of users in 5G driven VANETs, network resources need flexible and scalable resource allocation strategies. Current heterogeneous vehicular networks are designed and deployed with a connection-centric mindset with fixed resource allocation to a cell regardless...
Article
This paper introduces a new framework into future data-driven railway condition monitoring systems (RCM). For this purpose, we have proposed an edge processing unit that includes two main parts: a data classification model that classifies Internet of Things (IoT) data into maintenance-critical data (MCD) and maintenance-non-critical data (MNCD) and...
Article
Full-text available
Future 5th generation (5G) networks are expected to enable three key services -enhanced mobile broadband (eMBB), massive machine type communications (mMTC) and ultra-reliable and low latency communications (URLLC). As per the 3rd generation partnership project (3GPP) URLLC requirements, it is expected that the reliability of one transmission of a 3...
Article
Full-text available
In a wireless powered sensor network, a base station transfers power to sensors by using Wireless Power Transfer (WPT). Inadequately scheduling WPT and data transmission causes fast battery drainage and data queue overflow of some sensors who could have potentially gained high data reception. In this paper, scheduling WPT and data transmission is f...
Article
Full-text available
Device-to-Device (D2D) Communications are set to form an integral part of future 5G wireless networks. D2D communications have a number of benefits such as improving energy efficiency and spectrum utilization. Until now much of the D2D research in LTE and 5G-type network scenarios have focused on direct (one-hop) communications between two adjacent...
Article
Full-text available
The world is resorting to the Internet of Things (IoT) for ease of control and monitoring of smart devices. The ubiquitous use of IoT ranges from Industrial Control Systems (ICS) to e-Health, e-Commerce, smart cities, supply chain management, smart cars, Cyber Physical Systems (CPS) and a lot more. Such reliance on IoT is resulting in a significant...
Article
Full-text available
Device-to-Device (D2D) communication is a promising technology towards 5G networks. D2D communication can offload traffic using licensed/unlicensed band by establishing a direct communication between two users without traversing the base station (BS) or core network. However, one of the major challenges of D2D communication is resource allocation a...
Conference Paper
Full-text available
Bitcoin has revolutionized the decentralized payment system by excluding the need for a trusted third party, reducing the transaction (TX) fee and time involved in TX confirmation as compared to a conventional banking system. The underlying technology of Bitcoin is Blockchain, which was initially designed for financial TXs only. However, due to its...
Article
Wireless Body Area Networks (WBANs) are seen as the enabling technology for developing new generations of medical applications, such as remote health monitoring. As such it is expected that WBANs will predominantly transport mission-critical and delay sensitive data. A key strategy towards building a reliable WBAN is to ensure such networks are hig...
Article
Full-text available
Next-generation wireless networks will give rise to heterogeneous networks by integrating multiple wireless access technologies to provide seamless mobility to mobile users with high-speed wireless connectivity. Device-to-Device (D2D) communication has proven to be a promising technology that can increase the capacity and coverage of wireless netwo...
Article
Full-text available
The broad application spectrum of Unmanned Aerial Vehicles is making them one of the most promising technologies of IoT era. Proactive prevention for public safety threats is one of the key areas with vast potential of surveillance and monitoring drones. Antennas play a vital role in such applications to establish reliable communication in these sc...
Article
Full-text available
In this article, we aim to address the question of how to exploit the unlicensed spectrum to achieve URLLC. Potential URLLC PHY mechanisms are reviewed and then compared via simulations to demonstrate their potential benefits to URLLC. Although a number of important PHY techniques help with URLLC, the PHY layer exhibits an intrinsic trade-off betwe...
Article
Full-text available
Discovering and maintaining efficient routes for data dissemination in Vehicular Ad hoc Networks (VANETs) has proven to be a very challenging problem. Clustering is one of the control protocols used to provide efficient and stable routes for data dissemination. However, the rapid changes in network topology in VANETs creates frequent cluster reform...
Conference Paper
Large scale coverage holes (CHs) resulting from correlated node failures, can significantly degrade quality of service and also jeopardise the integrity of WSNs. In the absence of centralised control, the distributed relocation of deployed nodes becomes a promising solution especially in harsh and hostile environments. In this paper, a distributed...