ORCID Profile
0000-0002-0517-2392
Current Organisation
Real-Time and Embedded Computing Systems Research Centre (CISTER)
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 11-2016
Publisher: European Alliance for Innovation n.o.
Date: 2016
Publisher: MDPI AG
Date: 05-03-2019
DOI: 10.3390/S19051126
Abstract: Traditional wireless security focuses on preventing unmanned aerial vehicle (UAV) communications from suspicious eavesdropping and/or jamming attacks. However, there is a growing need for governments to keep malicious UAV communications under legitimate surveillance. This paper first investigates a new surveillance paradigm for monitoring suspicious UAV communications via jamming suspicious UAVs. Due to the power consumption limitation, the choice of eavesdropping and jamming will reflect the performance of the UAVs communication. Therefore, the paper analyses the UAV’s eavesdropping and jamming models in different cases, and then proposes the model to optimize the data package in the constraints of lower power consumption, which can be solved by the proposed selection policy. The simulation results validate our proposed selection policy in terms of power consumption and eavesdropped packets. In different fading models, power consumption increases with time, regardless of distances, and our proposed policy performs better in Weibull fading channels in terms of eavesdropped packets.
Publisher: IEEE
Date: 05-2018
Publisher: ACM
Date: 06-12-2016
Publisher: IEEE
Date: 04-2014
Publisher: Hindawi Limited
Date: 11-07-2018
DOI: 10.1155/2018/5296406
Abstract: This paper presents a suboptimal approach for resource allocation of massive MIMO-OFDMA systems for high-speed train (HST) applications. An optimization problem is formulated to alleviate the severe Doppler effect and maximize the energy efficiency (EE) of the system. We propose to decouple the problem between the allocations of antennas, subcarriers, and transmit powers and solve the problem by carrying out the allocations separately and iteratively in an alternating manner. Fast convergence can be achieved for the proposed approach within only several iterations. Simulation results show that the proposed algorithm is superior to existing techniques in terms of system EE and throughput in different system configurations of HST applications.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-03-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2019
Publisher: IEEE
Date: 06-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2019
Publisher: IEEE
Date: 06-2020
Publisher: IEEE
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2022
Publisher: Springer International Publishing
Date: 2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2018
Publisher: IEEE
Date: 06-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2021
Publisher: IEEE
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 15-06-2020
Publisher: Elsevier BV
Date: 08-2016
Publisher: IEEE
Date: 06-2017
Publisher: Association for Computing Machinery (ACM)
Date: 16-11-2019
DOI: 10.1145/3365996
Abstract: In a platoon-based vehicular cyber-physical system (PVCPS), a lead vehicle that is responsible for managing the platoon’s moving directions and velocity periodically disseminates control messages to the vehicles that follow. Securing wireless transmissions of the messages between the vehicles is critical for privacy and confidentiality of the platoon’s driving pattern. However, due to the broadcast nature of radio channels, the transmissions are vulnerable to eavesdropping. In this article, we propose a cooperative secret key agreement (CoopKey) scheme for encrypting/decrypting the control messages, where the vehicles in PVCPS generate a unified secret key based on the quantized fading channel randomness. Channel quantization intervals are optimized by dynamic programming to minimize the mismatch of keys. A platooning testbed is built with autonomous robotic vehicles, where a TelosB wireless node is used for onboard data processing and multi-hop dissemination. Extensive real-world experiments demonstrate that CoopKey achieves significantly low secret bit mismatch rate in a variety of settings. Moreover, the standard NIST test suite is employed to verify randomness of the generated keys, where the p-values of our CoopKey pass all the randomness tests. We also evaluate CoopKey with an extended platoon size via simulations to investigate the effect of system scalability on performance.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: IEEE
Date: 05-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2020
Publisher: Association for Computing Machinery (ACM)
Date: 19-10-2023
DOI: 10.1145/3605780
Abstract: Solar cells have been widely used for offering energy for Internet of Things(IoT) devices. Recently, solar cells have also been used as sensors for context awareness sensing due to their sensitivity to varying lighting conditions. In this paper, we are the first to use solar cells for symmetric key generation. To generate symmetric keys, we take advantage of photovoltage measurements generated from solar cells equipped with a pair of IoT devices. Symmetric keys are essential for pairing IoT devices and further securing wireless communication. Despite the sensitivity to varying lighting conditions, challenges still remain for the use of solar cells for key generation, such as time unsynchronisation and noisy measurements. To solve these challenges, we design a novel key generation framework, SolarKey, which includes the starting point detection and a compressed sensing based two-tier key reconciliation method. Extensive experiments have been conducted to evaluate the performance of our proposed key generation method in various environments, which shows the proposed method can improve the key matching rate by up to 25%. We also conduct security analysis and the randomness test, which shows that SolarKey is resilient to common attacks such as the eavesdropping attack and the imitating attack and sufficiently random.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: IEEE
Date: 10-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2022
Publisher: OMICS Publishing Group
Date: 2016
Publisher: IEEE
Date: 04-2020
Publisher: Association for Computing Machinery (ACM)
Date: 15-04-2021
DOI: 10.1145/3448254
Abstract: Thanks to flexible deployment and excellent maneuverability, autonomous drones have been recently considered as an effective means to act as aerial data relays for wireless ground devices with limited or no cellular infrastructure, e.g., smart farming in a remote area. Due to the broadcast nature of wireless channels, data communications between the drones and the ground devices are vulnerable to eavesdropping attacks. This article develops BloothAir, which is a secure multi-hop aerial relay system based on Bluetooth Low Energy ( BLE ) connected autonomous drones. For encrypting the BLE communications in BloothAir, a channel-based secret key generation is proposed, where received signal strength at the drones and the ground devices is quantized to generate the secret keys. Moreover, a dynamic programming-based channel quantization scheme is studied to minimize the secret key bit mismatch rate of the drones and the ground devices by recursively adjusting the quantization intervals. To validate the design of BloothAir, we build a multi-hop aerial relay testbed by using the MX400 drone platform and the Gust radio transceiver, which is a new lightweight onboard BLE communicator specially developed for the drone. Extensive real-world experiments demonstrate that the BloothAir system achieves a significantly lower secret key bit mismatch rate than the key generation benchmarks, which use the static quantization intervals. In addition, the high randomness of the generated secret keys is verified by the standard NIST test, thereby effectively protecting the BLE communications in BloothAir from the eavesdropping attacks.
Publisher: IEEE
Date: 02-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2023
Publisher: IEEE
Date: 06-2020
Publisher: IEEE
Date: 06-2015
Publisher: ACM
Date: 16-04-2019
Publisher: IEEE
Date: 04-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2019
Publisher: IEEE
Date: 05-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2019
Location: Portugal
Start Date: 2020
End Date: 2021
Funder: Carnegie Mellon University
View Funded ActivityStart Date: 2017
End Date: 2019
Funder: Horizon 2020
View Funded ActivityStart Date: 2017
End Date: 2019
Funder: FCT, Horizon 2020 Framework Programme
View Funded ActivityStart Date: 2015
End Date: 2016
Funder: Singapore - China Joint Research Programme
View Funded ActivityStart Date: 2011
End Date: 2014
Funder: Australian Research Council
View Funded ActivityStart Date: 2014
End Date: 2015
Funder: Ministry of National Development - Singapore
View Funded ActivityStart Date: 2010
End Date: 2011
Funder: Innovation and Technology Fund
View Funded ActivityStart Date: 2009
End Date: 2010
Funder: Innovation and Technology Fund
View Funded Activity