About
1,187
Publications
622,961
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
67,889
Citations
Current institution
Publications
Publications (1,187)
In recent years, unmanned aerial vehicles (UAVs) have shown great potential in various Internet of Things (IoT) applications, such as monitoring, inspection, and data collection. Especially, by integrating deep neural network (DNN) technology, UAV networks can provide real-time data insights, enhancing decision-making processes and ultimately boost...
With the rapid development of next-generation mobile network services, there is a growing need for customized services to meet the demands of various network functions. Leveraging the Software-Defined Networking (SDN) architecture, Network Function Virtualization (NFV) enhances service delivery flexibility by virtualizing network appliances. This a...
The rapid advancement of the UAV swarm network has made its widespread application across a multitude of domains. However, the inherently dynamic nature of the network often gives rise to intermittent connectivity issues, leading to a significant reduction in data transmission capacity. To address this challenge, this study explores the integration...
With the rapid development of next-generation mobile network services, there is a growing need for customized services to meet the demands of various network functions. Leveraging the Software-Defined Networking (SDN) architecture, Network Function Virtualization (NFV) enhances service delivery flexibility by virtualizing network appliances. This a...
To overcome the challenges of complex time-varying satellite channels and severe inter-user interference in non-orthogonal multiple access (NOMA), rational power allocation and accurate multiuser joint detection methods are essential. In this paper, a sparrow search algorithm-based resource allocation and deep learning-based joint detection scheme...
In recent years, unmanned aerial vehicles (UAVs) have shown great potential in various Internet of Things (IoT) applications , such as monitoring, inspection, surveillance, and data collection. Especially, by integrating deep neural network (DNN) technology, UAVs can provide real-time data insights, enhancing decision-making processes and ultimatel...
Recently, 6G has attracted widespread attention from both academia and industry. 6G networks are expected to exhibit even more heterogeneity than 5G networks, and support various emerging scenarios and applications such as virtual and augmented reality (VR/AR), air/space/ground networks, and Internet of Things. Such massive heterogeneous devices po...
Recently, 6G has attracted widespread attention from both academia and industry. 6G networks are expected to exhibit even more heterogeneity than 5G networks, and support various emerging scenarios and applications such as virtual and augmented reality (VR/AR), air/space/ground networks, and Internet of Things. Such massive heterogeneous devices po...
As Wireless Edge Networks (WENs) continue to evolve, Large Artificial Intelligence Models (BAIMs) are emerging as a key catalyst for reshaping the Artificial Intelligence Generated Content (AIGC) service model. This manuscript provides insights into the development and characterization of BAIMs, highlighting their potential for convergence in the w...
5G-and-beyond networks are designed to fulfill the communication and computation requirements of various industries, which requires not only transporting the data, but also processing them to meet/address diverse key performance indicators (KPIs). Network Function Virtualization (NFV) has emerged to enable this vision by: (i) collecting the require...
Industrial Internet applications require the networks to provide deterministic end-to-end latency and zero packet loss both in the data link layer and the network layer. However, the consumer network, relying on a best-effort mechanism , is unable to meet these requirements. To address the above challenges, IEEE 802.1 standards provide time-sensiti...
The ubiquitous usage of Internet of Medical Things (IoMT) enables real-time health monitoring in daily life. However, a huge amount of generated medical data causes great trouble to IoMT devices, owing to their power-constrained and computation-limited features. On the other hand, unmanned aerial vehicles (UAVs) can achieve a seamless wireless conn...
In the past decade, the unmanned aerial vehicles (UAVs) swarm has become the disruptive force reshaping our lives and work. In particular, advances in artificial intelligence have allowed multiple UAVs to coordinate their operations and work together to accomplish various complex tasks, one of which is Federated Learning (FL). As a promising distri...
Due to the outstanding merits such as mobility, high maneuverability, and flexibility, Unmanned Aerial Vehicles (UAVs) are viable mobile power transmitters that can be rapidly deployed in geographically constrained regions. They are good candidates for supplying power to energy-limited Sensor Nodes (SNs) with Wireless Power Transfer (WPT) technolog...
For multi-task mobile edge computing(MEC) systems in satellite Internet of Things(IoT), there are dependencies between different tasks, which need to be collected and jointly offloaded. It is crucial to allocate the computing and communication resources reasonably due to the scarcity of satellite communication and computing resources. To address th...
Congestion control is a critical problem faced by network operators. Traditionally, congestion control schemes primarily rely on end-to-end principles, such as additive in-crease/multiplicative decrease (AIMD). However, this mechanism exhibits tardiness and clumsy response to network dynamics, especially for the millisecond-level flow fluctuation....
For multi-task Mobile edge computing(MEC) systems in satellite Internet of Things(IoT), there are dependencies between different tasks, which need to be collected and jointly offloaded. It is crucial to allocate the computing and communication resources reasonably due to the scarcity of satellite communication and computing resources. To address th...
In the past decade, the unmanned aerial vehicles (UAVs) swarm has become the disruptive force reshaping our lives and works. In particular, advances in artificial intelligence have allowed multiple UAVs to coordinate their operations and work together to accomplish various complex tasks. However, considering the limited resources and dynamic networ...
The software-defined vehicular networking (SDVN) paradigm alleviates the deficiencies brought on by distributed vehicular. The separation of the control plane and the data plane allows the controller to manage the network based on global information. Most existing routing schemes in SDVN obtain the link-state through which vehicles periodically sen...
The past few years have witnessed the compelling applications of internet of things (IoT) in our daily lives ranging from manufacturing to healthcare. With the emergence of various new IoT applications, satisfying different QoS requirements of IoT applications in a shared substrate network becomes a challenging problem. Recently, Network Virtualiza...
Adaptive optics (AO) can efficiently compensate for turbulence-induced distortion in orbital angular momentum (OAM)-based optical wireless communication (OWC) systems. In this paper, we design a modified phase diversity algorithm (MPDA)-based wavefront sensor to enhance the reconstruction accuracy of distorted OAM wavefront information. Aiming to f...
Cloud forensics has become increasingly critical in cloud computing security in recent years. A fundamental problem in cloud forensics is how to safely and effectively obtain, preserve, and analyze evidence. With massive cloud forensic systems and tools having been proposed over the years, we identify one challenge that is not adequately addressed...
Device-to-device (D2D) communication and non-orthogonal multiple access (NOMA) have drawn rising attention owing to their significant improvement in spectrum utilization. However, energy consumption grows fast due to massive user equipment (UE) connections, leading that the energy efficiency poses a key issue. In this paper, the energy efficiency-b...
The advancement in technology has brought to life the concept of Autonomous vehicles (AV). The primary goal of AV is to reduce driving stress and provide comfort to the occupants. Since AVs can drive themselves, it poses a question of passenger security. Furthermore, AVs are connected to an open network like a public Internet to communicate to the...
Drug Discovery is a process by which new potential drugs are discovered and clinically trialed for commercial medicinal purposes. It has several stages of development, where each stage requires a prescribed time for its completion. The stages of drug development are discovery and development, pre-clinical research, clinical development, Food and Dr...
5G and beyond (B5G) networks are moving towards the higher end of the millimeter-wave (mmWave) spectrum (i.e., from 25 GHz to 100 GHz) to support integrated communications and ranging (ICAR) services in next-generation factory deployments. The ICAR services in factory deployments require extreme bandwidth/capacity and large ranging coverage, which...
Nowadays, the compelling applications of the Inter-net of Things (IoT) bring unexpected economical benefits to our daily life. However, with the explosion of IoT devices and various applications, it poses a huge challenge for service providers with rigid networks. Recently, network functions virtualization (NFV) enabled network is considered as a p...
Adaptive optics (AO) can efficiently compensate for the turbulence-induced distortion in the orbital angular momentum (OAM)-based optical wireless communication (OWC) syatems. In this paper, we design a modified phase diversity algorithm (MPDA)-based wavefront sensor to enhance the reconstruction accuracy of distorted OAM wavefront information. Aim...
Optimal resource provisioning and management of the next generation communication networks are crucial for attaining a seamless Quality of Service with reduced environmental impact. Considering the ecological assessment, urban and rural telecommunication infrastructure is moving towards deploying green cellular base stations to cater to the needs o...
The emerging Sixth Generation (6G) communication networks promising 100 to 1000 Gbps rates and ultra-low latency (1 millisecond) are anticipated to have native, embedded Artificial Intelligence (AI) capability to support myriad services, such as Holographic Type Communication (HTC), tactile Internet, remote surgery, etc. However, these services dema...
The increasing need for economic, safe, and sustainable smart manufacturing combined with novel technological enablers has paved the way for Artificial Intelligence (AI) and big data in industries. This implies a substantial integration of AI, Industrial Internet of Things (IIoT), Robotics, big data, Blockchain, and 5G communications in support of...
With the development of intelligent technologies, Internet of Things (IoT) opens up a new era in the field of automotive networks, namely Internet of Vehicles (IoV). The main goal of IoV is to provide a secure and reliable network to vehicles so that users can enjoy various services. However, vulnerabilities and incomplete protection mechanisms hav...
Recent developments in the Internet of Vehicles (IoV) enable inter-connected vehicles to support ubiquitous services. Various emerging service applications are promising to increase the quality of experience (QoE) of users. On-board computation tasks generated by these applications have been heavily overloading resource-constrained vehicles, making...
Digital twin (DT) provides accurate guidance for multi-dimensional resource scheduling in 5G edge computing-empowered distribution grids by establishing a digital representation of the physical entities. In this paper, we addressed the critical challenges of DT construction and DT-assisted resource scheduling such as low accuracy, large iteration d...
Power systems impose stringent security and delay requirements on computation offloading, which cannot be satisfied by existing power Internet of Things (PIoT) networks. In this paper, we tackle this challenge by combining blockchain, space-air-ground integrated PIoT (SAG-PIoT) and machine learning. Low earth orbit (LEO) satellites assist in broadc...
Fast optical switching (FOS) is the most promising technology for data center networks (DCNs) to meet the data rate requirements beyond 800 Gb/s, considering its transparent modulation format, low power consumption and dense port integration. However, FOS is hardly compatible with electrical switches that are widely used in the current hybrid optic...
In today’s modern era, with the rapid growth of edge-assisted solutions especially Internet of Things (IoT) networks, connected healthcare progressively relies on such solutions. Connected healthcare systems refer to health systems in which all the stakeholders are connected to each other. These systems employ novel technologies such as IoT, edge c...
The Internet of Underwater Things (IoUT) gradually becomes the future direction of ocean. Many devices, which are called the sources, are deployed in the sea to fulfill scientific, civilian, and military needs. If the locations of these sources are leaked, it will cause a serious economic and military crisis. Thus, in this context, the source locat...
By amalgamating recent communication and control technologies, computing and data analytics techniques, and modular manufacturing, Industry 4.0 promotes integrating cyber-physical worlds through cyber-physical systems (CPS) and digital twin (DT) for monitoring, optimization, and prognostics of industrial processes. A DT enables interaction with the...
The rapid growth of Autonomous Vehicle (AV) technology and the integration of edge computing grasp new challenges along with the ever-increasing mobile internet traffic and services. Tackling such challenges through customized edge computing services is the critical research in 6G Vehicle-to-Everything (6G-V2X) communication. V2X contributes detail...
Training a neural network requires retraining the same model many times to search for the configuration of hyper-parameters with the best training result. It is common to launch multiple training jobs and evaluate them in stages. At the completion of each stage, jobs with unpromising configurations will be terminated and jobs with new configuration...
AbstractM2M communication in the LTE network is gaining attention with a growing number of connected devices and adaptation of new emerging technologies. As the traffic generated from M2M devices is heterogeneous in terms of packet size, intensity, strict delay, and throughput requirements and the M2M traffic generally flows in the uplink direction...
Several schemes have been proposed to enable cloud servers to search encrypted medical data to preserve patients’ privacy. However, the existing schemes use inefficient attribute-based encryption (ABE) approaches for access control. Also, servers cannot learn whether a doctor can achieve the access policy of a document and this check is done by doc...
Training centralized machine learning (ML) models becomes infeasible in wireless networks due to the increasing number of internet of things (IoT) and mobile devices and the prevalence of the learning algorithms to adapt tasks in dynamic situations with heterogeneous networks (HetNets) and battery limited devices. Hierarchical federated learning (H...
Edge intelligence capability is expected to enable the development of a new paradigm integrated with edge computing and artificial intelligence. However, due to the multisource nature, heterogeneity, and a large scale of the sensory data, it is necessary to improve the data processing and decision-making capacity for the edges. Hence, this paper as...
Delay-tolerant networks (DTNs) are an important topic that has recently attracted more attention from many researchers. Due to the high dynamic topology, long delay and network partition, the design of the DTN routing protocol is challenging. Traditional DTN routing algorithms largely rely on the greedy scheme, which presents a poor transmission ef...
Timely and accurate cellular traffic prediction is difficult to achieve due to the complex spatial-temporal characteristics of cellular traffic. The latest approaches mainly aim to model local spatial-temporal dependencies of cellular traffic based on deep learning techniques but lack the consideration of diverse global spatial-temporal correlation...
The Long-Range Wide Area Network (LoRaWAN) technique has attracted considerable attention from both academia and industry, due to its low power and long-range communication characteristics. However, with the rapid increase in the number of IoT devices, supporting QoS for massive IoT devices has become a critical challenge faced by LoRaWAN. Recently...
The great progress of wireless communications breeds the prevalence of connected Internet of Vehicles (CIoV). Naturally, the internal connections among active vehicles also act as an indispensable factor in traffic forecasting. Although much related research work has been conducted during the past few years, they mainly designed and/or developed a...
In order to maintain a satisfactory performance in the midst of rapid growth of mobile traffic, the mobile network infrastructure needs to be scaled. Thus there has been significant interest in scalability of mobile core networks and a variety of scaling solutions have been proposed that rely on horizontal scaling or vertical scaling. These solutio...
The 5G network provides higher bandwidth and lower latency for edge IoT devices to access the core business network. But at the same time, it also expands the attack surface of the core network, which makes the enterprise network face greater security threats. To protect the security of core business, the network infrastructure must be able to reco...
Benefiting from dense connections in data center networks (DCNs), load balancing algorithms are capable of steering traffic into multiple paths for the sake of preventing traffic congestion. However, given each path's time-varying and asymmetrical traffic state, this may also lead to worse congestion when some paths are overutilised. Especially in...
Technological interventions are becoming commonplace in everyday vehicles. But utilization of biosignals that can enhance the overall driving experience is still limited. Microsleep is one such issue that needs intervention, owing to the difficulty in its detection and social acceptance of using wearable BCI devices during transit. Microsleep is a...
Cooperative driving of AVs, a ground-breaking initiative of vehicle platooning, epitomizes the next wave in the vehicular technology. The development of Autonomous Vehicles (AVs) envisions the promising technology of future Intelligent Transportation Systems (ITS). However, complex road structures and increased vehicles cause traffic congestion and...
The emergence of Digital Twin Edge Networks (DTENs) achieves the mapping of real physical entities to digital models of cyberspace. By offloading real-time mobile data to Mobile Edge Computing (MEC) servers for processing and modeling, communication-efficient Digital Twin (DT) services could be achieved. However, the spatio-temporal dynamic DT serv...
Service provisioning systems assign users to service providers according to allocation criteria that strike an optimal trade-off between users Quality of Experience (QoE) and the operation cost endured by providers. These systems have been leveraging Smart Contracts (SCs) to add trust and transparency to their criteria. However, deploying fixed all...
The past few years have witnessed the compelling applications of the internet of things (IoT) in our daily lives ranging from manufacturing to healthcare. With the emergence of various new IoT applications, satisfying different QoS requirements of IoT applications in a shared physical network becomes a challenging problem. Recently, Network Virtual...
Replacing base stations with unmanned aerial vehicles (UAVs) to serve the communication of ground users has attracted a lot of attention recently. In this paper, we study the joint resource allocation and UAV trajectory optimization for maximizing the total energy efficiency in UAV-based non-orthogonal multiple access (NOMA) downlink wireless netwo...
Federated learning (FL) is a distributed learning methodology that allows multiple nodes to cooperatively train a deep learning model, without the need to share their local data. It is a promising solution for telemonitoring systems that demand intensive data collection, for detection, classification, and prediction of future events, from different...
The employment of multi-access edge computing (MEC) promotes the emergence of novel computation-intensive and time-sensitive applications at the network edge. Resource-limited devices can offload their computing tasks to edge servers, thereby avoiding heavy computing loads and reducing energy consumption. However, the computing servers are usually...
Object detection is the most critical and foundational sensing module for the autonomous movement platform. However, most of the existing deep learning solutions are based on GPU servers, which limits their actual deployment. We present an efficient multi-sensor fusion based object detection model that can be deployed on the off-the-shelf edge comp...
Mobile Edge Learning (MEL) is a learning paradigm that enables distributed training of Machine Learning models over heterogeneous edge devices (e.g., IoT devices). Multi-orchestrator MEL refers to the coexistence of multiple learning tasks with different datasets, each of which being governed by an orchestrator to facilitate the distributed trainin...
Internet of Things (IoT) systems are becoming core building blocks for different services and applications supporting every day’s life. The heterogeneous nature of IoT devices and the complex use scenarios make it hard to build secure and private IoT systems. Physical-Layer Security (PLS) can lead to efficient solutions reducing the impact of the i...
Pandemics and natural disasters over the years have changed the behavior of people, which has had a tremendous impact on all life aspects. With the technologies available in each era, governments, organizations, and companies have used these technologies to track, control, and influence the behavior of individuals for a benefit. Nowadays, the use o...
Digital twins (DTs) is a promising technology in the revolution of the industry and essential for Industry 4.0. DTs play a vital role in improving distributed manufacturing, providing up-to-date
operational data representation of physical assets, supporting decision-making, and avoiding the
potential risks in distributed manufacturing systems. Furt...
The satellite-assisted Internet of Things (IoT) communication becomes a key component of the 6G network, and Low Earth Orbit (LEO) satellite is the leading choice of IoT-related satellites due to its minimum delay. Hybrid requests including Immediate Reservation (IR) and Advanced Reservation (AR) services in LEO satellite netoworks cause the ocurre...
Mobile Edge Learning (MEL) is a collaborative learning paradigm that features distributed training of Machine Learning (ML) models over edge devices (e.g., IoT devices). In MEL, possible coexistence of multiple learning tasks with different datasets may arise. The heterogeneity in edge devices' capabilities will require the joint optimization of th...
Currently, drones represent a promising technology for combating Coronavirus disease 2019 (COVID-19) due to the transport of goods, medical supplies to a given target location in the quarantine areas experiencing an epidemic outbreak. Drone missions will increasingly rely on drone collaboration, which requires the drones to reduce communication com...
Internet of Things (IoT) is a key enabler for many modernized applications from marine monitoring to outer space exploration. However, the complicated operations (such as device interconnection, data transmission, and service optimization) will consume substantial energy in contrast with limited energy storage of IoT devices. To improve architectur...
One important design goal of 6G networks is adapting to complex heterogeneous scenarios and providing a stable and reliable transmission channel for specific applications such as vehicular communication. To achieve this, scholars attempt to use heterogeneous wireless networks around a vehicle to improve the reliability of 6G network transmission th...
The Internet of Things (IoT) allows communication between devices, things, and any digital assets that send and receive data over a network without requiring interaction with a human. The main characteristic of IoT is the enormous quantity of data created by end-user's devices that needs to be processed in a short time in the cloud. The current clo...
The arrival of big data and the Internet of Things (IoT) era greatly promotes innovative in-network computing techniques, where the edge-cloud continuum becomes a feasible paradigm in handling multi-dimensional resources such as computing, storage, and communication. In this article, an energy constrained unmanned aerial vehicle (UAV)-aided mobile...
A password is an important method of identity authentication, so there are endless research attempts on passwords, but most of them are based on different languages and technologies. As far as we know, no one has studied the influence of one's social behavior (e.g., religious belief) on passwords. Based on this, we first study the influence of reli...
Nowadays, the compelling applications of the Internet of things (IoT) bring unexpected economical benefits to our daily life. However, with the explosion of IoT devices and various applications, it poses a huge challenge for service providers with rigid networks. Recently, network functions virtualization (NFV) enabled network is considered as a pr...
The past few years have witnessed an exponential growth of diverse Internet of Things (IoT) devices as well as compelling applications ranging from industrial production, intelligent transport, warehouse logistics to medical care. Dramatic advances in IoT technology not only bring enormous economic opportunities but also challenges (e.g., privacy a...
The recent pandemic along with the rapid increase in the number of patients that require continuous remote monitoring imposes several challenges to support the high quality of services (QoS) in remote health applications. Remote-health (r-health) systems typically demand intense data collection from different locations within a strict time constrai...
The aerial capabilities and flexibility in movement of Unmanned Aerial Vehicles (UAVs) has enabled them to adaptively provide both traditional and more contemporary services. In this article, we introduce a solution that integrates the capabilities of both UAVs and Unmanned Ground Vehicles (UGVs) to provide both intelligent connectivity and service...
As an enhanced system for marine monitoring and autonomous navigation, space-based automatic identification system (AIS) has attracted extensive attentions and becomes a hot topic for researches. However, it encounters the problem on Doppler shift stemmed from the relative motion between satellites and ships, which leads to performance degradation....
By amalgamating recent communication and control technologies, computing and data analytics techniques, and modular manufacturing, Industry~4.0 promotes integrating cyber-physical worlds through cyber-physical systems (CPS) and digital twin (DT) for monitoring, optimization, and prognostics of industrial processes. A DT is an emerging but conceptua...
Due to recent privacy trends, and the increase in data breaches in various industries, it has become imperative to adopt new technologies that support data privacy, maintain accuracy, and ensure sustainability at the same time. The healthcare industry is one of the most vulnerable sectors to cyber-attacks and data breaches as health data is highly...
The rapid increase in the percentage of chronic disease patients along with the recent pandemic pose immediate threats on healthcare expenditure and elevate causes of death. This calls for transforming healthcare systems away from one-on-one patient treatment into intelligent health systems, to improve services, access and scalability, while reduci...
With the recent advances in wireless communications, the automotive industry is leading to evolution. To succeed in this emerging era of technology, the Internet of Connected Vehicles (IoCV) has emerged as one of the potential applications of the Internet of Things (IoT). It refers to the dynamic mobile communication systems that communicate betwee...
Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users and enterprises. In this study, a method is proposed for detecting malicious mining code in the cloud platforms, which constructs...
As an emerging innovative network infrastructure, low earth orbit (LEO) satellite networks would supplement terrestrial cellular networks to provide globalized services for massive Internet of things (IoT), enabling the 6G vision of fully connected, intelligent, and digital mobile society. However, it still faces the problem of complex spectrum com...
Nowadays, mission-critical applications need delay-free responses, which can be achieved by bringing computation at the edge devices known as edge computing. But, edge computing needs cloud computing services to perform massive intelligent tasks like AI-based prediction and analysis, which still possesses high-latency in making intelligent decision...
The new security scenario of distributed computing and mobile communication-Android smart phones and the rapid growth of rich applications (Apps) have prompted many enhanced vendors to use different methods to effectively protect important Android files on the distributed system/server. But this also brings some serious distributed security problem...
In the 6G network era, energy-efficient computing means higher resource utilization and lower energy consumption. The traditional computing model regards the network as a transmission pipeline and has not fully explored the potential of network devices. In-network computing is a new type of computing model that delegates application-layer processin...
Internet of Things (IoT) connects massive physical devices to capture and collect useful data, which are used to make accurate decisions by taking advantage of the machine learning techniques. However, the collected data may contain users’ sensitive information. When guaranteeing the utility of data, we need to consider privacy of users’ data. To b...
Federated learning (FL) is a distributed learning methodology that allows multiple nodes to cooperatively train a deep learning model, without the need to share their local data. It is a promising solution for telemonitoring systems that demand intensive data collection, for detection, classification, and prediction of future events, from different...
Drone security is currently a major topic of discussion among researchers and industrialists. Although there are multiple applications of drones, if the security challenges are not anticipated and required architectural changes are not made, the upcoming drone applications will not be able to serve their actual purpose. Therefore, in this paper, we...
With the fast development of the Internet of Things (IoT) technologies, more IoT devices are currently connected with the Internet, resulting in more exchange of information. However, data privacy and security threats have become emerging challenges of the IoT. In this paper, we are concerned about the security of image transmission in green IoT. I...
In the Industrial Internet of Things, the deep learning-based methods are used to help solve various problems. The current-carrying ring as one of important components on the catenary system which is always small in the catenary image has the potential risk to be a defect to impact the train operation. To improve the detection performance for the f...
Cloud robotics (CR) support extremely high reli- ability and low latency communications to ubiquitous internet of things applications. However, many of those applications currently rely on a wired connection, limiting its uses within the confines of ethernet/optical links. Some wireless solutions such as Wi-Fi have been considered, but failed to me...