About
39
Publications
7,252
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
777
Citations
Citations since 2017
Introduction
Additional affiliations
September 2008 - October 2011
Publications
Publications (39)
Internet of Things (IoT) networks can be used for many applications across different industry domains including infrastructure monitoring, civil service, security and surveillance applications etc. However, gathering large amounts of data from such networks including images and videos often cause traffic congestion in the central network area. In o...
The latest 6TiSCH standard enables highly reliable industrial monitoring and control applications through deterministic wireless communications and efficient allocation of radio resources among wireless nodes. However, much of these benefits are tied to the ability of the scheduler in orchestrating communication over individual links in an efficien...
This paper presents a task allocation-oriented framework to enable efficient in-network processing and cost-effective multi-hop resource sharing for dynamic multi-hop multimedia wireless sensor networks with low node mobility, e.g., pedestrian speeds. The proposed system incorporates a fast task reallocation algorithm to quickly recover from possib...
Emerging applications in Multihop Wireless Networks (MHWNs) require considerable processing power which often may be beyond the capability of individual nodes. Parallel processing provides a promising solution, which partitions a program into multiple small tasks and executes each task concurrently on independent nodes. However, multihop wireless c...
Hot spots in a wireless sensor network emerge as locations under heavy traffic load. Nodes in such areas quickly deplete energy resources, leading to disruption in network services. This problem is common for data collection scenarios in which Cluster Heads (CH) have a heavy burden of gathering and relaying information. The relay load on CHs especi...
Synchronous Flooding (SF) protocols can enhance the wireless connectivity between Internet of Things (IoT) devices. However, existing SF solutions fail to introduce sufficient security measures due to strict time synchronisation requirements, making them vulnerable to malicious actions. Our paper presents a design paradigm for encrypted SF communic...
Internet of Things (IoT) networks require regular firmware updates to ensure enhanced security and stability. As we move towards methodologies of codifying security and policy decisions and exchanging them over IoT large-scale deployments (security-as-a-code), these demands should be considered a routine operation. However, rolling out firmware upd...
A dataset of street light images is presented. Our dataset consists of $\sim350\textrm{k}$ images, taken from 140 UMBRELLA nodes installed in the South Gloucestershire region in the UK. Each UMBRELLA node is installed on the pole of a lamppost and is equipped with a Raspberry Pi Camera Module v1 facing upwards towards the sky and lamppost light bul...
Internet of Things (IoT) networks require regular firmware updates to ensure enhanced security and stability. As we move towards methodologies of codifying security and policy decisions and exchanging them over IoT large-scale deployments (security-as-a-code), these demands should be considered a routine operation. However, rolling out firmware upd...
Steerable directional antennas are increasingly utilised to improve the overall performance of the traditional wireless sensor networks. Steerable directional antenna based networking solutions increase the network capacity by providing a longer range of transmission and reduced interference as compared to networking solutions with omni-directional...
Various legacy and emerging industrial control applications create the requirement of periodic and time-sensitive communication (TSC) for 5G/6G networks. State-of-the-art semi-persistent scheduling (SPS) techniques fall short of meeting the requirements of this type of critical traffic due to periodicity misalignment between assignments and arrivin...
Recent applications in large-scale wireless mesh networks (WSN), e.g., Advanced Metering Infrastructure (AMI) scenarios, expect to support an extended number of nodes with higher throughput, which cannot be sufficiently supported by the current WSN protocols. Two prior protocols, Wi-SUN Field Area Network (Wi-SUN FAN) and IETF 6TiSCH standards, are...
Steerable directional antennas are increasingly utilised to improve the overall performance of the traditional wireless sensor networks. Steerable directional antenna based networking solutions increase the network capacity by providing a longer range of transmission and reduced interference as compared to networking solutions with omni-directional...
Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power wireless mesh networks. Yet, despite an overwhelming body of literature covering autonomous , centralized, and distributed scheduling schemes for 6TiSC...
Targeting dependable communications for industrial Internet of Things applications, IETF 6TiSCH provides mechanisms for efficient scheduling, routing, and forwarding of IPv6 traffic across low-power mesh networks. Yet, despite an overwhelming body of literature covering both centralized and distributed scheduling schemes for 6TiSCH, an effective co...
When a person is performing daily activities (e.g. walking) in the context of a WBAN application, the channel quality between the worn sensor devices and the hub can vary due to the switching of Line-Of-Sight (LOS) and None-Line-Of-Sight (NLOS) statuses among the sender and the receiver. Therefore, motion aware wireless MAC protocols are designed i...
We address the considerable and varied challenges of the EWSN 2019 dependability competition through a software-defined approach to synchronous flooding, whereby a flexible synchronous flooding architecture can instantiate, tailor, and schedule multiple different protocols based on information gathered in an initial configuration phase. In this man...
The Time Synchronised Channel Hopping (TSCH) MAC, adopted in popular WirelessHART, ISA100.11a and IEEE802.15.4-2015, is emerging as the de-facto technique for critical
wireless industrial monitoring and control applications. However, much of its benefits are tied to the ability of the protocols and the scheduling techniques to optimally route traff...
In wireless sensors and actuator networks, different data sources such as sensors are often required to report data to different destinations such as actuators. In this paper, we ask if the destination diversity, presence of multiple destinations, can enable multiple successful receptions when the sensors transmit their distinctly different data pa...
We present a reliable, fast, and ultra-low-power protocol stack to disseminate events in IEEE 802.15.4 based networks. Our stack is built on top of FOCUS, a new flooding primitive that exploits constructive interference and capture effect to provide higher energy efficiency, lower latency and higher reliability than state of the art flooding protoc...
Time-Slotted Channel Hopping (TSCH) is a part of an emerging IEEE 802.15.4e standard to enable deterministic low-power mesh networking. It promises to pave the way to the future Internet of (Important) things by offering high reliability and low latency for wireless industrial applications. Nonetheless, the standard only provides a framework but it...
With the advent of Machine to Machine (M2M) communication, we are witnessing an increased interest towards technologies that will enable efficient and reliable operation of Wireless Sensor Networks (WSN). Such networks are expected to include a large number of sensor devices which will generate large body of M2M traffic. To reduce the impact of thi...
Wireless mesh networks are widely considered for interconnecting large number of smart metering devices in a locality. For efficient link scheduling, Spatial Time Division Multiple Access (STDMA) is considered over the conservative CSMA/CA scheme where the spectral efficiency improvement primarily comes from spatial reuse and concurrent transmissio...
Selfishness and altruism are two distinctive node behaviors in wireless networks. Users of network nodes, e.g. mobile phones, would like their individual devices to be operational for as long as possible. On the other hand, users and operators of wireless networks may wish for an overall long network lifetime via collaborative node operations. In c...
In low-power and lossy wireless networks, message delivery could be jeopardized by factors such as channel conditions, noise, interference etc. This can lead to communication retransmissions, resulting in significant energy depletion and consequently consumes limited on-node energy resources. This paper elaborates on a two-pronged approach to impro...
Inter-Cell Interference (ICI) is a challenging problem for the next generation wireless systems which limits the system performance, especially for users located at the edge of a cell. In this paper, in order to achieve good user fairness, each user is given a guaranteed minimum number of resource blocks while the cell edge users were given a highe...
This paper proposes an adaptive soft frequency reuse (SFR) scheme with the goal of improving the cell-edge performance as well as the overall cell throughput. The proposed scheme is effective, flexible and cell environments adaptive. Specifically, we consider both consecutive and distributed subcarrier allocation for cell-edge users, and use the Qo...
Transporting raw data which is usually correlated over multi-hop wireless links can be costly both in terms of time as well as resources. This is likely to be a pressing problem particularly in the emerging Machine-to-Machine (M2M) communication paradigm wherein the amount of data is expected to proliferate. With in-network processing and data aggr...
Clustering algorithms are widely used in Wireless Sensor Networks (WSNs), which however incurs significant energy consumption at Cluster Headers(CHs). Therefore, a re-clustering operation is typically used to balance the workload, where different CHs are selected and clusters are reorganized. However, a considerable number of control messages is in...
Hot spots in a wireless sensor network emerge as locations under heavy traffic load. Nodes in such areas quickly deplete energy resources, leading to disruption in network services. This problem is common for data collection scenarios in which Cluster Heads (CH) have a heavy burden of gathering and relaying information. The relay load on CHs especi...
Emerging applications in Wireless Sensor Networks (WSNs) demand notable in-network processing capacities rather than simple data gathering and dissemination. Therefore, the performances of the network like latency and energy consumption are greatly affected by how the various application requirements are mapped to the processing nodes in the networ...
In existing energy-efficient clustering algorithms for Wireless Sensor Networks (WSNs), individual nodes usually experience significant differences in lifetime. The issue of some nodes depleting energy earlier than other is usually referred to as hot-spot issue in WSNs, which dramatically shortens the stable operation period of a network when all n...
Projects
Projects (3)
The UMBRELLA project will create a universal IoT platform able to control different experimental testbeds and use-cases in a secure manner. It will consist of 250+ multi-radio multi-sensor IoT nodes, deployed on public infrastructure and UWE's campus, that will provide access to cutting-edge radio and sensor solutions for research and business trials.
Realizing high-performance wireless solutions based on different connectivity technologies (6TiSCH, Bluetooth, Wi-Fi, etc.) for a range of industrial control applications.