Software defined networking for wireless sensor networks: a survey

Article


Hassan, M., Vien, Q. and Aiash, M. 2017. Software defined networking for wireless sensor networks: a survey. Advances in Wireless Communications and Networks. 3 (2), pp. 10-22. https://doi.org/10.11648/j.awcn.20170302.11
TypeArticle
TitleSoftware defined networking for wireless sensor networks: a survey
AuthorsHassan, M., Vien, Q. and Aiash, M.
Abstract

One main feature of Software Defined Networking (SDN) is the basic principle of decoupling a device’s control plane from its data plane. This simplifies network management and gives network administrators a remarkable control over the network elements. As the control plane for each device within the network is now implemented on a separate controller, this reliefs individual devices from the overhead caused by complex routing. Specifically, this feature has been shown to be extremely beneficial in the case of resource-constrained Wireless Sensor Networks (WSNs). By keeping the control logic away from the low-powered nodes, the WSNs can resolve their major issues of resource underutilisation and counter-productivity. This paper highlights the importance of adopting the SDN in the WSNs as a relatively new networking paradigm. This is introduced through a comprehensive survey on relevant networking paradigms and protocols supported by a critical evaluation of the advantages and disadvantages of these mechanisms. Furthermore, open research issues and challenges are pointed out shedding a light on future innovations in this field.

PublisherScience Publishing Group
JournalAdvances in Wireless Communications and Networks
Publication dates
Print28 May 2017
Publication process dates
Deposited01 Jun 2017
Accepted11 May 2017
Output statusPublished
Publisher's version
License
Web address (URL)http://www.sciencepublishinggroup.com/journal/paperinfo?journalid=317&doi=10.11648/j.awcn.20170302.11
Digital Object Identifier (DOI)https://doi.org/10.11648/j.awcn.20170302.11
LanguageEnglish
Permalink -

https://repository.mdx.ac.uk/item/86z66

Download files


Publisher's version
  • 122
    total views
  • 28
    total downloads
  • 5
    views this month
  • 3
    downloads this month

Export as

Related outputs

Digital twin for O-RAN towards 6G
Nguyen, H., Vien, Q. and Le, T. 2024. Digital twin for O-RAN towards 6G. IEEE Communications Magazine. https://doi.org/10.1109/MCOM.003.2400016
A secure cooperative image super-resolution transmission with decode-and-forward relaying over Rayleigh fading channels
Duong, H.-T., Phan, C.V. and Vien, Q.-T. 2024. A secure cooperative image super-resolution transmission with decode-and-forward relaying over Rayleigh fading channels. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 11 (4), pp. 1-15. https://doi.org/10.4108/eetinis.v11i4.6193
Unveiling the potential of diffusion model‑based framework with transformer for hyperspectral image classification
Sigger, N., Vien, Q., Nguyen, S., Tozzi, G. and Nguyen, T. 2024. Unveiling the potential of diffusion model‑based framework with transformer for hyperspectral image classification. Scientific Reports. 14. https://doi.org/10.1038/s41598-024-58125-4
SWIPT-based cooperative NOMA for two-way relay communications: PSR versus TSR
Tran, H. and Vien, Q. 2023. SWIPT-based cooperative NOMA for two-way relay communications: PSR versus TSR. Wireless Communications and Mobile Computing. 2023, pp. 1-14. https://doi.org/10.1155/2023/3069999
Performance analysis of Multiple-RIS-Based NOMA systems
Tran, H. Q. and Vien, Q. 2023. Performance analysis of Multiple-RIS-Based NOMA systems. Wireless Communications and Mobile Computing. 2023, pp. 1-9. https://doi.org/10.1155/2023/6785737
A secure network coding based image communications in two-hop wireless relay networks
Vien, Q. and Nguyen, T.T. 2023. A secure network coding based image communications in two-hop wireless relay networks. IEEE International Conference on Visual Communications and Image Processing (VCIP). Jeju, Republic of Korea 04 - 07 Dec 2023 IEEE. https://doi.org/10.1109/VCIP59821.2023.10402751
A secure cooperative transmission of image super-resolution in wireless relay networks
Duong, H., Phan, C., Vien, Q. and Nguyen, T. 2023. A secure cooperative transmission of image super-resolution in wireless relay networks. Electronics. 12 (18). https://doi.org/10.3390/electronics12183764
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications
Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M. and Khoda, M.E. 2023. Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications. Exeter, United Kingdom 01 - 03 Nov 2023 IEEE. pp. 2216-2221
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain
Edris, E., Aiash, M., Khoshkholghi, A., Naha, R., Chowdhury, A. and Loo, J. 2023. Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Internet of Things. 24. https://doi.org/10.1016/j.iot.2023.100913
IoT-based emergency vehicle services in intelligent transportation system
Chowdhury, A., Kaisar, S., Khoda, M., Naha, R., Khoshkholghi, A. and Aiash, M. 2023. IoT-based emergency vehicle services in intelligent transportation system. Sensors. 23 (11). https://doi.org/10.3390/s23115324
Internet traffic prediction using recurrent neural networks
Dodan, M., Vien, Q. and Nguyen, T. 2022. Internet traffic prediction using recurrent neural networks. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 9 (4). https://doi.org/10.4108/eetinis.v9i4.1415
On the power-splitting relaying protocol for SWIPT with multiple UAVs in downlink NOMA-IoT networks
Tran, H., Phan, C. and Vien, Q. 2022. On the power-splitting relaying protocol for SWIPT with multiple UAVs in downlink NOMA-IoT networks. Wireless Communications and Mobile Computing. 2022. https://doi.org/10.1155/2022/3018225
Formalization and evaluation of EAP-AKA’ protocol for 5G network access security
Edris, E., Aiash, M. and Loo, J. 2022. Formalization and evaluation of EAP-AKA’ protocol for 5G network access security. Array. 16. https://doi.org/10.1016/j.array.2022.100254
An introduction of a modular framework for securing 5G networks and beyond
Edris, E., Aiash, M. and Loo, J. 2022. An introduction of a modular framework for securing 5G networks and beyond. Network. 2 (3), pp. 419-439. https://doi.org/10.3390/network2030026
Classification techniques for arrhythmia patterns using convolutional neural networks and Internet of Things (IoT) devices
Agyeman, M., Guerrero, A. and Vien, Q. 2022. Classification techniques for arrhythmia patterns using convolutional neural networks and Internet of Things (IoT) devices. IEEE Access. 10, pp. 87387-87403. https://doi.org/10.1109/ACCESS.2022.3192390
Eye-tracking assistive technologies for individuals with amyotrophic lateral sclerosis
Edughele, H., Zhang, Y., Muhammad-Sukki, F., Vien, Q., Morris-Cafiero, H. and Agyeman, M. 2022. Eye-tracking assistive technologies for individuals with amyotrophic lateral sclerosis. IEEE Access. 10, pp. 41952-41972. https://doi.org/10.1109/ACCESS.2022.3164075
Time-based resource allocation for downlink in heterogeneous wireless cellular networks
Denedo, D., Vien, Q. and Phan, C. 2021. Time-based resource allocation for downlink in heterogeneous wireless cellular networks. Telecommunication Systems. 78 (3), pp. 463-475. https://doi.org/10.1007/s11235-021-00829-3
Performance analysis of power-splitting relaying protocol in SWIPT based cooperative NOMA systems
Tran, H., Phan, C. and Vien, Q. 2021. Performance analysis of power-splitting relaying protocol in SWIPT based cooperative NOMA systems. EURASIP Journal on Wireless Communications and Networking. 2021 (110), pp. 1-26. https://doi.org/10.1186/s13638-021-01981-9
Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2022. Modeling and verifying a resource allocation algorithm for secure service migration for commercial cloud systems. Computational Intelligence. 38 (3), pp. 811-828. https://doi.org/10.1111/coin.12421
An efficient pest classification in smart agriculture using transfer learning
Nguyen, T., Vien, Q. and Sellahewa, H. 2021. An efficient pest classification in smart agriculture using transfer learning. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 8 (26), pp. 1-8. https://doi.org/10.4108/eai.26-1-2021.168227
On the cooperative relaying strategies for multi-core wireless Network-on-Chip
Vien, Q., Agyeman, M., Tatipamula, M. and Nguyen, H. 2021. On the cooperative relaying strategies for multi-core wireless Network-on-Chip. IEEE Access. 9, pp. 9572-9583. https://doi.org/10.1109/ACCESS.2021.3049770
Optimizing energy efficiency for supporting near-cloud access region of UAV based NOMA networks in IoT systems
Tran, H., Phan, C. and Vien, Q. 2021. Optimizing energy efficiency for supporting near-cloud access region of UAV based NOMA networks in IoT systems. Wireless Communications and Mobile Computing. 2021, pp. 1-12. https://doi.org/10.1155/2021/4345622
Deep-NC: a secure image transmission using deep learning and network coding
Vien, Q., Nguyen, T. and Nguyen, H. 2021. Deep-NC: a secure image transmission using deep learning and network coding. Signal Processing: Image Communication. 99. https://doi.org/10.1016/j.image.2021.116490
Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif
Edris, E., Aiash, M. and Loo, J. 2021. Formal verification of authentication and service authorization protocols in 5G-enabled device-to-device communications using ProVerif. Electronics. 10 (13). https://doi.org/10.3390/electronics10131608
Security in network services delivery for 5G enabled D2D communications: challenges and solutions
Edris, E., Aiash, M. and Loo, J. 2021. Security in network services delivery for 5G enabled D2D communications: challenges and solutions. in: Montasari, R., Jahankhani, H. and Al-Khateeb, H. (ed.) Challenges in the IoT and Smart Environments: A Practitioners' Guide to Security, Ethics and Criminal Threats Cham Springer. pp. 1-27
DCSS protocol for data caching and sharing security in a 5G network
Edris, E., Aiash, M. and Loo, J. 2021. DCSS protocol for data caching and sharing security in a 5G network. Network. 1 (2), pp. 75-94. https://doi.org/10.3390/network1020006
A lightweight secure image super resolution using network coding
Vien, Q., Nguyen, T. and Nguyen, H. 2021. A lightweight secure image super resolution using network coding. Farinella, G., Radeva, P., Braz, J. and Bouatouch, K. (ed.) 16th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications (VISIGRAPP 2021). Vienna, Austria 08 - 10 Feb 2021 SCITEPRESS - Science and Technology Publications. pp. 653-660 https://doi.org/10.5220/0010212406530660
Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies
Ali, K., Nguyen, H., Vien, Q., Shah, P., Raza, M., Paranthaman, V., Er-Rahmadi, B., Awais, M., Islam, S. and Rodrigues, J. 2021. Review and implementation of resilient public safety networks: 5G, IoT and emerging technologies. IEEE network. 35 (2), pp. 18-25. https://doi.org/10.1109/MNET.011.2000418
Formal verification of secondary authentication protocol for 5G secondary authentication
Edris, E., Aiash, M., Loo, J. and Alhakeem, M. 2021. Formal verification of secondary authentication protocol for 5G secondary authentication. International Journal of Security and Networks. 16 (4), pp. 223-234. https://doi.org/10.1504/IJSN.2021.119379
Optimising coverage efficiency in heterogeneous wireless cellular networks
Phan, C. and Vien, Q. 2020. Optimising coverage efficiency in heterogeneous wireless cellular networks. IET Communications. 14 (17), pp. 3022-3029. https://doi.org/10.1049/iet-com.2020.0313
ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing
Edris, E. and Aiash, M. 2018. ZKPVM: a zero-knowledge authentication protocol for VMs' live migration in mobile cloud computing. ICSOFT 2018: 13th International Conference on Software Technologies. Porto, Portugal 26 - 28 Jul 2018 pp. 858-864
Investigating network services abstraction in 5G enabled device-to-device (D2D) communications
Edris, E., Aiash, M. and Loo, J. 2019. Investigating network services abstraction in 5G enabled device-to-device (D2D) communications. 2019 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI). Leicester, United Kingdom 19 - 23 Aug 2019 Institute of Electrical and Electronics Engineers (IEEE). pp. 1660-1665 https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00296
The case for federated identity management in 5G communications
Edris, E., Aiash, M. and Loo, J. 2020. The case for federated identity management in 5G communications. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 120-127 https://doi.org/10.1109/FMEC49853.2020.9144855
Formal verification and analysis of primary authentication based on 5G-AKA protocol
Edris, E., Aiash, M. and Loo, J. 2020. Formal verification and analysis of primary authentication based on 5G-AKA protocol. Third International Symposium on 5G Emerging Technologies (5GET 2020) in conjunction with the Fourth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 256-261 https://doi.org/10.1109/SDS49854.2020.9143899
Network service federated identity (NS-FId) protocol for service authorization in 5G network
Edris, E., Aiash, M. and Loo, J. 2020. Network service federated identity (NS-FId) protocol for service authorization in 5G network. The Fifth International Conference on Fog and Mobile Edge Computing (FMEC 2020). Paris, France 30 Jun - 03 Jul 2020 Institute of Electrical and Electronics Engineers (IEEE). pp. 128-135
Power splitting versus time switching based cooperative relaying protocols for SWIPT in NOMA systems
Tran, H., Phan, C. and Vien, Q. 2020. Power splitting versus time switching based cooperative relaying protocols for SWIPT in NOMA systems. Physical Communication. 41. https://doi.org/10.1016/j.phycom.2020.101098
Editorial: Emerging techniques and applications for 5G networks and beyond
Nguyen, V., Duong, T. and Vien, Q. 2020. Editorial: Emerging techniques and applications for 5G networks and beyond. Mobile Networks and Applications. 25 (5), pp. 1984-1986. https://doi.org/10.1007/s11036-020-01547-x
Deployment of drone-based small cells for public safety communication system
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Raza, M. 2020. Deployment of drone-based small cells for public safety communication system. IEEE Systems Journal. 14 (2), pp. 2882-2891. https://doi.org/10.1109/JSYST.2019.2959668
Optimisation of server selection for maximising utility in Erlang-loss systems
Pietowski, M., Vien, Q. and Phan, T. 2019. Optimisation of server selection for maximising utility in Erlang-loss systems. EAI Endorsed Transactions on Industrial Networks and Intelligent Systems. 7 (22), pp. 1-12. https://doi.org/10.4108/eai.24-10-2019.161367
On the performance of regenerative relaying for SWIPT in NOMA Systems
Tran, H., Phan, C. and Vien, Q. 2019. On the performance of regenerative relaying for SWIPT in NOMA Systems. 26th International Conference on Telecommunications (ICT 2019). Hanoi, Vietnam 08 - 10 Apr 2019 IEEE. pp. 1-5 https://doi.org/10.1109/ICT.2019.8798786
A power-splitting relaying protocol for wireless energy harvesting and information processing in NOMA systems
Tran, H., Nguyen, T., Phan, C. and Vien, Q. 2019. A power-splitting relaying protocol for wireless energy harvesting and information processing in NOMA systems. IET Communications. 13 (14), pp. 2132-2140. https://doi.org/10.1049/iet-com.2018.5897
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. ICC’17. Cambridge University, Cambridge 22 Mar 2019 ICC’17, Cambridge, United Kingdom © 2017 ACM.. pp. 1-6 https://doi.org/10.1145/3018896.3056795
An optimal power allocation for D2D communications over multi-user cellular uplink channels
Omorinoye, A., Vien, Q., Le, T. and Shah, P. 2019. An optimal power allocation for D2D communications over multi-user cellular uplink channels. Duong, T., Vo, N., Nguyen, L., Vien, Q. and Nguyen, V. (ed.) 5th EAI International Conference on Industrial Networks and Intelligent Systems (INISCOM 2019). Ho Chi Minh, Vietnam, Vietnam 19 Aug 2019 Springer, Cham. pp. 53-64 https://doi.org/10.1007/978-3-030-30149-1_5
On the performance of NOMA in SWIPT systems with power-splitting relaying
Tran, H., Nguyen, T., Phan, C. and Vien, Q. 2019. On the performance of NOMA in SWIPT systems with power-splitting relaying. 2019 19th International Symposium on Communications and Information Technologies (ISCIT). Ho Chi Minh City, Vietnam, Vietnam 25 - 27 Sep 2019 IEEE. pp. 255-259 https://doi.org/10.1109/ISCIT.2019.8905234
Enhancing security of MME handover via fractional programming and Firefly algorithm
Vien, Q., Le, T., Yang, X. and Duong, T. 2019. Enhancing security of MME handover via fractional programming and Firefly algorithm. IEEE Transactions on Communications. 67 (9), pp. 6206-6220. https://doi.org/10.1109/TCOMM.2019.2920353
On the resource allocation for D2D underlaying uplink cellular networks
Omorinoye, A., Vien, Q., Le, T. and Shah, P. 2019. On the resource allocation for D2D underlaying uplink cellular networks. 26th International Conference on Telecommunications (ICT 2019). Hanoi, Vietnam 08 - 10 Apr 2019 IEEE. pp. 108-112 https://doi.org/10.1109/ict.2019.8798800
AROMA: An adapt-or-reroute strategy for multimedia applications over SDN-based wireless environments
Abdulkadir, I., Al-Jawad, A., Shah, P., Vien, Q., Tuysuz, M. and Trestian, R. 2019. AROMA: An adapt-or-reroute strategy for multimedia applications over SDN-based wireless environments. 2019 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB). Jeju, South Korea 05 - 07 Jun 2019 IEEE. https://doi.org/10.1109/BMSB47279.2019.8971842
An auto-scaling framework for analyzing big data in the cloud environment
Jannapureddy, R., Vien, Q., Shah, P. and Trestian, R. 2019. An auto-scaling framework for analyzing big data in the cloud environment. Applied Sciences. 9 (7), pp. 1-16. https://doi.org/10.3390/app9071417
A QoS-based flow assignment for traffic engineering in software-defined networks
Thiruvasakan, L., Vien, Q., Loo, J. and Mapp, G. 2019. A QoS-based flow assignment for traffic engineering in software-defined networks. Barolli, L., Takizawa, M., Xhafa, F. and Enokido, T. (ed.) 33rd International Conference on Advanced Information Networking and Applications (AINA-2019). Matsue, Japan 27 - 29 Mar 2019 Springer. pp. 762-774 https://doi.org/10.1007/978-3-030-15032-7_64
Multi-path routing for mission critical applications in software-defined networks
Ramirez, R., Vien, Q., Trestian, R., Mostarda, L. and Shah, P. 2019. Multi-path routing for mission critical applications in software-defined networks. Duong, T. and Vo, N. (ed.) 14th EAI International Conferenceon Industrial Networks and Intelligent Systems, INISCOM 2018. Da Nang, Vietnam 27 - 28 Aug 2018 Springer, Cham. pp. 38-48 https://doi.org/10.1007/978-3-030-05873-9_4
Network design, modelling and performance evaluation
Vien, Q. 2018. Network design, modelling and performance evaluation. The Institution of Engineering and Technology (IET).
Project-based cooperative learning to enhance competence while teaching engineering modules
Gandhi, V., Yang, Z. and Aiash, M. 2017. Project-based cooperative learning to enhance competence while teaching engineering modules. International Journal of Continuing Engineering Education and Life-Long Learning. 27 (3), pp. 198-208. https://doi.org/10.1504/IJCEELL.2017.10003462
Investigating the impact of live migration on the network infrastructure in enterprise environments
Sinti, J., Jiffry, F. and Aiash, M. 2014. Investigating the impact of live migration on the network infrastructure in enterprise environments. Advanced Information Networking and Applications Workshops (WAINA), 2014 28th International Conference on. Victoria, Canada 13 - 16 May 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2014.34
A progressive approach to design authentication protocols for mobile heterogeneous networks
Kenaza, T., Aiash, M., Loo, J., Lasebae, A. and Whitney, G. 2016. A progressive approach to design authentication protocols for mobile heterogeneous networks. IEEE Trustcom/BigDataSE/I​SPA, 2016. Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1776-1781 https://doi.org/10.1109/trustcom.2016.0273
A security framework for node-to-node communications based on the LISP architecture
Kallash, M., Loo, J., Lasebae, A. and Aiash, M. 2018. A security framework for node-to-node communications based on the LISP architecture. International Journal of Electronic Security and Digital Forensics. 10 (3), pp. 276-291. https://doi.org/10.1504/IJESDF.2018.093024
Formalization and analysis of a resource allocation security protocol for secure service migration
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2018. Formalization and analysis of a resource allocation security protocol for secure service migration. IEEE/ACM International Conference on Utility and Cloud Computing (UCC2018). Zurich, Switzerland 17 - 20 Dec 2018 IEEE. pp. 207-212 https://doi.org/10.1109/UCC-Companion.2018.00058
A physical layer network coding based modify-and-forward with opportunistic secure cooperative transmission protocol
Vien, Q., Le, T., Nguyen, H. and Le-Ngoc, T. 2018. A physical layer network coding based modify-and-forward with opportunistic secure cooperative transmission protocol. Mobile Networks and Applications. 24 (2), pp. 464-479. https://doi.org/10.1007/s11036-018-1157-1
Disaster management using D2D communication with power transfer and clustering techniques
Ali, K., Nguyen, H., Vien, Q., Shah, P. and Chu, Z. 2018. Disaster management using D2D communication with power transfer and clustering techniques. IEEE Access. 6, pp. 14643-14654. https://doi.org/10.1109/ACCESS.2018.2793532
An efficient constructive e-alignment for onsite-online learning
Vien, Q. and Shah, P. 2018. An efficient constructive e-alignment for onsite-online learning. International Journal of Continuing Engineering Education and Life-Long Learning. 28 (3-4), pp. 276-292. https://doi.org/10.1504/IJCEELL.2018.098073
An overview of 5G technologies
Tran, H., Phan, C. and Vien, Q. 2018. An overview of 5G technologies. in: Arya, K., Bhadoria, R. and Chaudhari, N. (ed.) Emerging Wireless Communication and Network Technologies: Principle, Paradigm and Performance Springer. pp. 59-80
Optimisation of relay placement in wireless butterfly networks
Vien, Q. 2017. Optimisation of relay placement in wireless butterfly networks. in: Yang, X. (ed.) Nature-Inspired Algorithms and Applied Optimization Springer International Publishing.
Exploring a security protocol for secure service migration in commercial cloud environments
Karthick, G., Mapp, G., Kammueller, F. and Aiash, M. 2017. Exploring a security protocol for secure service migration in commercial cloud environments. 2nd International Conference on Internet of Things, Data and Cloud Computing (ICC 2017). Churchill College, University of Cambridge, United Kingdom 22 - 23 Mar 2017 Association for Computing Machinery (ACM). https://doi.org/10.1145/3018896.3056795
Exploring a new security framework for cloud storage using capabilities
Mapp, G., Aiash, M., Ondiege, B. and Clarke, M. 2014. Exploring a new security framework for cloud storage using capabilities. 1st International Workshop on Cyber Security and Cloud Computing, a workshop of SOSE. Oxford, United Kingdom 07 - 11 Apr 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 484-489 https://doi.org/10.1109/SOSE.2014.69
Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility
Sardis, F., Mapp, G., Loo, J. and Aiash, M. 2014. Dynamic traffic management for interactive cloud services: localising traffic based on network throughput and user mobility. 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing (UCC),. London, UK 08 - 11 Dec 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 298-306 https://doi.org/10.1109/UCC.2014.39
Machine learning based botnet identification traffic
Azab, A., Alazab, M. and Aiash, M. 2016. Machine learning based botnet identification traffic. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-2016). Tianjin, China 23 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1788-1794 https://doi.org/10.1109/TrustCom.2016.0275
Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids
Kenaza, T., Bennaceur, K., Labed, A. and Aiash, M. 2016. Enhancing the SVDD accuracy in Intrusion Detection Systems by removing external voids. 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-16). Tianjin, China 23 - 25 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 1765-1770 https://doi.org/10.1109/TrustCom.2016.0271
Toward an efficient ontology-based event correlation in SIEM
Kenazag, T. and Aiash, M. 2016. Toward an efficient ontology-based event correlation in SIEM. 7th International Conference on Ambient Systems, Networks and Technologies (ANT2016). Madrid, Spain 23 - 26 May 2016 Elsevier. pp. 139-146 https://doi.org/10.1016/j.procs.2016.04.109
Non-orthogonal multiple access schemes for next-generation 5G networks: a survey
Bhuvanasundaram, N., Nguyen, H., Trestian, R. and Vien, Q. 2017. Non-orthogonal multiple access schemes for next-generation 5G networks: a survey. in: 5G Radio Access Networks: Centralized RAN, Cloud-RAN and Virtualization of Small Cells CRC Press. pp. 51-66
Snort-based intrusion detection system for practical computer networks: implementation and comparative study
Karim, I. and Vien, Q. 2017. Snort-based intrusion detection system for practical computer networks: implementation and comparative study. LAP Lambert Academic Publishing.
Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement
Raheem, R., Lasebae, A., Aiash, M., Loo, J. and Colson, R. 2017. Mobile femtocell utilisation in LTE vehicular environment: vehicular penetration loss elimination and performance enhancement. Vehicular Communications. 9 (12), pp. 31-42. https://doi.org/10.1016/j.vehcom.2017.02.003
Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks
Raheem, R., Lasebae, A., Aiash, M., Loo, J., Colson, R. and Raheem, A. 2017. Interference Management and System Optimisation for Femtocells Technology in LTE and Future 4G/5G Networks. in: Yurish, S. (ed.) Advances in Networks, Security and Communications: Reviews - Volume 1 International Frequency Sensor Association Publishing.
Mobility management for vehicular user equipment in LTE/mobile femtocell networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2017. Mobility management for vehicular user equipment in LTE/mobile femtocell networks. International Journal of Information Systems in the Service Sector. 9 (4), pp. 60-87. https://doi.org/10.4018/IJISSS.2017100105
On the optimisation of practical wireless indoor and outdoor microcells subject to QOS constraints
Omorinoye, A. and Vien, Q. 2017. On the optimisation of practical wireless indoor and outdoor microcells subject to QOS constraints. Applied Sciences. 7 (9). https://doi.org/10.3390/app7090948
UEFA-M: Utility-based energy efficient adaptive multimedia mechanism over LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2017. UEFA-M: Utility-based energy efficient adaptive multimedia mechanism over LTE HetNet small cells. 14th International Symposium on Wireless Communication Systems. Bologna, Italy​ 28 - 31 Aug 2017 Institute of Electrical and Electronics Engineers (IEEE). pp. 408-413 https://doi.org/10.1109/ISWCS.2017.8108149
Robust chance-constrained optimization for power-efficient and secure SWIPT systems
Le, T., Vien, Q., Nguyen, H., Ng, D. and Schober, R. 2017. Robust chance-constrained optimization for power-efficient and secure SWIPT systems. IEEE Transactions on Green Communications and Networking. 1 (3), pp. 333-346. https://doi.org/10.1109/TGCN.2017.2706063
On the nanocommunications at THz band in graphene-enabled wireless network-on-chip
Vien, Q., Agyeman, M., Le, T. and Mak, T. 2017. On the nanocommunications at THz band in graphene-enabled wireless network-on-chip. Mathematical Problems in Engineering. 2017. https://doi.org/10.1155/2017/9768604
On the handover security key update and residence management in LTE networks
Vien, Q., Le, T., Yang, X. and Duong, T. 2017. On the handover security key update and residence management in LTE networks. IEEE Wireless Communications and Networking Conference (WCNC 2017). San Francisco, CA, USA 19 - 22 Mar 2017 IEEE. pp. 1-6 https://doi.org/10.1109/WCNC.2017.7925678
Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol
Vien, Q., Le, T. and Duong, T. 2017. Opportunistic secure transmission for wireless relay networks with modify-and-forward protocol. 2017 IEEE International Conference on Communications (ICC). Paris, France 21 - 25 May 2017 IEEE. https://doi.org/10.1109/ICC.2017.7996655
Performance evaluation of NOMA under Wireless Downlink Cloud Radio Access networks environments
Vien, Q., Ogbonna, N., Nguyen, H., Trestian, R. and Shah, P. 2017. Performance evaluation of NOMA under Wireless Downlink Cloud Radio Access networks environments. in: Venkataraman, H. and Trestian, R. (ed.) 5G Radio Access Networks: Centralized RAN, Cloud-RAN and Virtualization of Small Cells CRC Press. pp. 67-84
An energy-efficient NOMA for small cells in heterogeneous CRAN under QoS constraints
Vien, Q., Le, T., Phan, C. and Agyeman, M. 2017. An energy-efficient NOMA for small cells in heterogeneous CRAN under QoS constraints. 23rd European Wireless Conference (EW2017). Dresden, Germany 17 - 19 May 2017 VDE. pp. 80-85
On the energy efficiency of NOMA for wireless backhaul in multi-tier heterogeneous CRAN
Tran, H., Truong, P., Phan, C. and Vien, Q. 2017. On the energy efficiency of NOMA for wireless backhaul in multi-tier heterogeneous CRAN. 2017 International Conference on Recent Advances on Signal Processing, Telecommunications & Computing (SigTelCom). Da Nang, Vietnam 09 - 11 Jan 2017 IEEE. pp. 229-234 https://doi.org/10.1109/SIGTELCOM.2017.7849827
A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks
Karim, I., Vien, Q., Le, T. and Mapp, G. 2017. A comparative experimental design and performance analysis of Snort-based Intrusion Detection System in practical computer networks. Computers. 6 (1), pp. 1-15. https://doi.org/10.3390/computers6010006
A resilient 2-D waveguide communication fabric for hybrid wired-wireless NoC design
Agyeman, M., Vien, Q., Ahmadinia, A., Yakovlev, A., Tong, K. and Mak, T. 2017. A resilient 2-D waveguide communication fabric for hybrid wired-wireless NoC design. IEEE Transactions on Parallel and Distributed Systems. 28 (2), pp. 359-373. https://doi.org/10.1109/TPDS.2016.2575836
Non-orthogonal multiple access schemes with partial relay selection
Lee, S., Da Costa, D., Vien, Q., Duong, T. and De Sousa Jr., R. 2017. Non-orthogonal multiple access schemes with partial relay selection. IET Communications. 11 (6), pp. 846-854. https://doi.org/10.1049/iet-com.2016.0836
An analytical channel model for emerging wireless networks-on-chip
Agyeman, M., Vien, Q. and Mak, T. 2016. An analytical channel model for emerging wireless networks-on-chip. The 14th IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC 2016). Paris, France 24 - 26 Aug 2016 Institute of Electrical and Electronics Engineers (IEEE). pp. 9-15 https://doi.org/10.1109/CSE-EUC-DCABES.2016.155
Optimising energy efficiency of non-orthogonal multiple access for wireless backhaul in heterogeneous cloud radio access network
Vien, Q., Le, T., Barn, B. and Phan, C. 2016. Optimising energy efficiency of non-orthogonal multiple access for wireless backhaul in heterogeneous cloud radio access network. IET Communications. 10 (18), pp. 2516-2524. https://doi.org/10.1049/iet-com.2016.0247
Towards connecting people, locations and real-world events in a cellular network
Trestian, R., Shah, P., Nguyen, H., Vien, Q., Gemikonakli, O. and Barn, B. 2017. Towards connecting people, locations and real-world events in a cellular network. Telematics and Informatics. 34 (1), pp. 244-271. https://doi.org/10.1016/j.tele.2016.05.006
Secure information transmission in the presence of energy-harvesting eavesdroppers in multi-cell networks
Le, T., Nguyen, H., Vien, Q. and Karamanoglu, M. 2015. Secure information transmission in the presence of energy-harvesting eavesdroppers in multi-cell networks. GLOBECOM 2015 - 2015 IEEE Global Communications Conference. San Diego, CA, USA 06 - 10 Dec 2015 IEEE. pp. 1-6 https://doi.org/10.1109/GLOCOM.2015.7417336
Cooperative spectrum sensing with secondary user selection for cognitive radio networks over Nakagami-m fading channels
Vien, Q., Nguyen, H. and Nallanathan, A. 2016. Cooperative spectrum sensing with secondary user selection for cognitive radio networks over Nakagami-m fading channels. IET Communications. 10 (1), pp. 91-97. https://doi.org/10.1049/iet-com.2015.0461
Architecture for public safety network using D2D communication
Ali, K., Nguyen, H., Shah, P., Vien, Q. and Bhuvanasundaram, N. 2016. Architecture for public safety network using D2D communication. IEEE Conference on Wireless Communications and Networking. Doha, Qatar 03 - 06 Apr 2016 IEEE. https://doi.org/10.1109/wcnc.2016.7564671
A specification-based IDS for detecting attacks on RPL-based network topology
Le, A., Loo, J., Chai, K. and Aiash, M. 2016. A specification-based IDS for detecting attacks on RPL-based network topology. Information. 7 (2). https://doi.org/10.3390/info7020025
Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Performance evaluation of mobile users served by fixed and mobile femtocells in LTE networks. Journal of Networking Technology. 7 (1), pp. 16-33.
Interference management for co-channel mobile femtocells technology in LTE networks
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2016. Interference management for co-channel mobile femtocells technology in LTE networks. 2016 12th International Conference on Intelligent Environments (IE). London, United Kingdom 14 - 16 Sep 2016 IEEE. pp. 80-87 https://doi.org/10.1109/IE.2016.21
Beamforming in coexisting wireless systems with uncertain channel state information
Le, T., Navaie, K., Vien, Q. and Nguyen, H. 2016. Beamforming in coexisting wireless systems with uncertain channel state information. 2016 IEEE 84th Vehicular Technology Conference (VTC-Fall). Montreal, QC, Canada 18 - 21 Sep 2016 IEEE. pp. 1-5 https://doi.org/10.1109/VTCFall.2016.7880920
Robust optimization with probabilistic constraints for power-efficient and secure SWIPT
Le, T., Vien, Q., Nguyen, H., Ng, D. and Schober, R. 2016. Robust optimization with probabilistic constraints for power-efficient and secure SWIPT. 2016 IEEE Global Communications Conference (GLOBECOM). Washington, DC, USA 04 - 08 Dec 2016 IEEE. pp. 1-7 https://doi.org/10.1109/GLOCOM.2016.7842232
Architecture for public safety network using D2D communication
Ali, K., Nguyen, H., Shah, P., Vien, Q. and Bhuvanasundaram, N. 2016. Architecture for public safety network using D2D communication. 2016 IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Doha, Qatar 03 - 06 Apr 2016 IEEE. pp. 206-211 https://doi.org/10.1109/WCNCW.2016.7552700
An efficient channel model for evaluating wireless NoC architectures
Agyeman, M., Vien, Q., Hill, G., Turner, S. and Mak, T. 2016. An efficient channel model for evaluating wireless NoC architectures. 7th Workshop on Applications for Multi-Core Architectures (WAMCA) . Los Angeles, California, USA 26 - 28 Oct 2016 IEEE. pp. 85-90 https://doi.org/10.1109/SBAC-PADW.2016.23
A secure network coding based modify-and-forward scheme for cooperative wireless relay networks
Vien, Q., Le, T., Nguyen, H. and Phan, H. 2016. A secure network coding based modify-and-forward scheme for cooperative wireless relay networks. 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). Nanjing, China 15 - 18 May 2016 IEEE. pp. 1-5 https://doi.org/10.1109/VTCSpring.2016.7504104
A hybrid double-threshold based cooperative spectrum sensing over fading channels
Vien, Q., Nguyen, H., Trestian, R., Shah, P. and Gemikonakli, O. 2016. A hybrid double-threshold based cooperative spectrum sensing over fading channels. IEEE Transactions on Wireless Communications. 15 (3), pp. 1821-1834. https://doi.org/10.1109/TWC.2015.2496598
A formally verified access control mechanism for information centric networks
Aiash, M. and Loo, J. 2015. A formally verified access control mechanism for information centric networks. The 12th International Conference on Security and Cryptography (SECRYPT 2015). Colmar, Alsace, France 20 - 22 Jul 2015 SCITEPRESS - Science and Technology Publications. pp. 377-383 https://doi.org/10.5220/0005566303770383
Non-orthogonal multiple access for wireless downlink in cloud radio access networks
Vien, Q., Ogbonna, N., Nguyen, H., Trestian, R. and Shah, P. 2015. Non-orthogonal multiple access for wireless downlink in cloud radio access networks. in: 21th European Wireless Conference; Proceedings of European Wireless 2015 VDE. pp. 434-439
Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels
Vien, Q., Nguyen, H., Trestian, R., Shah, P. and Gemikonakli, O. 2014. Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels. in: 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communication (PIMRC) IEEE. pp. 738-742
Supporting communications in the IOTs using the location/ID split protocol: a security analysis
Lasebae, A., Loo, J., Aiash, M. and Raheem, A. 2013. Supporting communications in the IOTs using the location/ID split protocol: a security analysis. Future Generation Communication Technology (FGCT) 4- date of conference in full: 12-14 Nov. 2013. London, UK 12 - 14 Nov 2013 pp. 1-5
Towards connecting people, locations and real-world events in a cellular network [conference item]
Trestian, R., Shah, P., Nguyen, H., Vien, Q., Gemikonakli, O. and Barn, B. 2015. Towards connecting people, locations and real-world events in a cellular network [conference item]. The main conference on the scientific analysis of mobile phone datasets (NetMob), Orange D4D Challenge. MIT Media Lab, USA 07 - 10 Apr 2015
Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing
Carnielli, A. and Aiash, M. 2015. Will ToR achieve its goals in the "future internet"? : an empirical study of using ToR with cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 135-140
Supporting communication in information centric networks using the location/ID split protocol and time released caching
Aiash, M., Mapp, G. and Kallash, M. 2015. Supporting communication in information centric networks using the location/ID split protocol and time released caching. 2015 International Conference on Cloud Computing (ICCC). Riyadh, Saudi Arabia 26 - 29 Apr 2015 Institute of Electrical and Electronics Engineers. pp. 233-238 https://doi.org/10.1109/CLOUDCOMP.2015.7149657
Non-orthogonal multiple access for wireless downlink in cloud radio access networks
Vien, Q., Ogbonna, N., Nguyen, H., Trestian, R. and Shah, P. 2015. Non-orthogonal multiple access for wireless downlink in cloud radio access networks. 21th European Wireless Conference. Budapest, Hungary 20 - 22 May 2015 VDE.
Virtualization and cyber security: arming future security practitioners
Tharayanil, M., Whitney, G., Aiash, M. and Benzaid, C. 2015. Virtualization and cyber security: arming future security practitioners. IEEE Trustcom/BigDataSE/ISPA: EFINS 2015 The 2nd IEEE International Workshop on the Emerging Future Internet and Network Security. Helsinki, Finland 20 - 22 Aug 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 1398-1402 https://doi.org/10.1109/trustcom.2015.537
An energy-efficient resource allocation for optimal downlink coverage in heterogeneous wireless cellular networks
Vien, Q., Le, T., Nguyen, H. and Karamanoglu, M. 2015. An energy-efficient resource allocation for optimal downlink coverage in heterogeneous wireless cellular networks. 2015 International Symposium on Wireless Communication Systems (ISWCS). Brussels, Belgium 25 - 28 Aug 2015 IEEE. pp. 156-160 https://doi.org/10.1109/ISWCS.2015.7454318
On the design of reliable hybrid wired-wireless network-on-chip architectures
Agyeman, M., Wan, J., Vien, Q., Zong, W., Yakovlev, A., Tong, K. and Mak, T. 2015. On the design of reliable hybrid wired-wireless network-on-chip architectures. 2015 IEEE 9th International Symposium on Embedded Multicore/Many-core Systems-on-Chip. Turin, Italy 23 - 25 Sep 2015 IEEE. pp. 251-258 https://doi.org/10.1109/MCSoC.2015.11
Cross-layer topology design for network coding based wireless multicasting
Vien, Q., Tu, W., Nguyen, H. and Trestian, R. 2015. Cross-layer topology design for network coding based wireless multicasting. Computer Networks. 88, pp. 27-39. https://doi.org/10.1016/j.comnet.2015.06.005
Sum-rate analysis of cell edge users under cooperative NOMA
Bhuvanasundaram, N., Nguyen, H., Trestian, R. and Vien, Q. 2015. Sum-rate analysis of cell edge users under cooperative NOMA. 8th IFIP Wireless and Mobile Networking Conference (WMNC). Munich, Germany 05 - 07 Oct 2015 IEEE. pp. 239-244 https://doi.org/10.1109/WMNC.2015.19
Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells
Trestian, R., Vien, Q., Shah, P. and Mapp, G. 2015. Exploring energy consumption issues for multimedia streaming in LTE HetNet small cells. 2015 IEEE 40th Conference on Local Computer Networks (LCN 2015). Clearwater Beach, Florida, USA 26 - 29 Oct 2015 IEEE. pp. 498-501 https://doi.org/10.1109/LCN.2015.7366362
On the coverage and power allocation for downlink in heterogeneous wireless cellular networks
Vien, Q., Akinbote, T., Nguyen, H., Trestian, R. and Gemikonakli, O. 2015. On the coverage and power allocation for downlink in heterogeneous wireless cellular networks. IEEE International Conference on Communications (ICC 2015). London, UK 08 - 12 Jun 2015 IEEE. pp. 4641-4646 https://doi.org/10.1109/ICC.2015.7249055
Power allocation for HARQ-IR systems under QoS constraints and limited feedback
To, D., Nguyen, H., Vien, Q. and Huang, L. 2015. Power allocation for HARQ-IR systems under QoS constraints and limited feedback. IEEE Transactions on Wireless Communications. 14 (3), pp. 1581-1594. https://doi.org/10.1109/TWC.2014.2370049
U-sphere: strengthening scalable flat-name routing for decentralized networks
Kos, J., Aiash, M., Loo, J. and Trček, D. 2015. U-sphere: strengthening scalable flat-name routing for decentralized networks. Computer Networks. 89, pp. 14-31. https://doi.org/10.1016/j.comnet.2015.07.006
Disaster management communication networks: challenges and architecture design
Ali, K., Nguyen, H., Vien, Q. and Shah, P. 2015. Disaster management communication networks: challenges and architecture design. 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops 2015). St. Louis, Missouri, USA 23 - 27 Mar 2015 IEEE. pp. 537-542 https://doi.org/10.1109/PERCOMW.2015.7134094
Secure information transmission and power transfer in cellular networks
Le, T., Nguyen, H., Vien, Q. and Karamanoglu, M. 2015. Secure information transmission and power transfer in cellular networks. IEEE Communications Letters. 19 (9), pp. 1532-1535. https://doi.org/10.1109/LCOMM.2015.2454514
Double-threshold based cooperative spectrum sensing over imperfect channels
Vien, Q., Nguyen, H., Tran, L. and Hong, E. 2015. Double-threshold based cooperative spectrum sensing over imperfect channels. 2015 IEEE Wireless Communications and Networking Conference (WCNC 2015). Orleans, LA, USA 09 - 12 Mar 2015 IEEE. pp. 293-298 https://doi.org/10.1109/WCNC.2015.7127485
On the energy-delay tradeoff and relay positioning of wireless butterfly networks
Vien, Q., Nguyen, H., Stewart, B., Choi, J. and Tu, W. 2015. On the energy-delay tradeoff and relay positioning of wireless butterfly networks. IEEE Transactions on Vehicular Technology. 64 (1), pp. 159-172. https://doi.org/10.1109/TVT.2014.2321229
On the impact of video content type on the mobile device energy consumption
Trestian, R., Vien, Q., Nguyen, H. and Gemikonakli, O. 2015. On the impact of video content type on the mobile device energy consumption. 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting (BMSB 2015). Ghent, Belgium 17 - 19 Jun 2015 https://doi.org/10.1109/BMSB.2015.7177206
ECO-M: energy-efficient cluster-oriented multimedia delivery in a LTE D2D environment
Trestian, R., Vien, Q., Nguyen, H. and Gemikonakli, O. 2015. ECO-M: energy-efficient cluster-oriented multimedia delivery in a LTE D2D environment. IEEE International Conference on Communications (ICC 2015). London, UK 08 - 12 Jun 2015 IEEE. pp. 55-61 https://doi.org/10.1109/ICC.2015.7248298
Introducing a hybrid infrastructure and information-centric approach for secure cloud computing
Aiash, M., Colson, R. and Kallash, M. 2015. Introducing a hybrid infrastructure and information-centric approach for secure cloud computing. IEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA-2015). Gwangju, Korea 24 - 27 Mar 2015 Institute of Electrical and Electronics Engineers (IEEE). pp. 154-159 https://doi.org/10.1109/WAINA.2015.80
On the perspective transformation for efficient relay placement in wireless multicast networks
Vien, Q., Nguyen, H., Barn, B. and Tran, X. 2015. On the perspective transformation for efficient relay placement in wireless multicast networks. IEEE Communications Letters. 19 (2), pp. 275-278. https://doi.org/10.1109/LCOMM.2014.2387163
A formal analysis of authentication protocols for mobile devices in next generation networks
Aiash, M. 2015. A formal analysis of authentication protocols for mobile devices in next generation networks. Concurrency and Computation: Practice and Experience. 27 (12), pp. 2938-2953. https://doi.org/10.1002/cpe.3260
An integrated authentication and authorization approach for the network of information architecture
Aiash, M. and Loo, J. 2015. An integrated authentication and authorization approach for the network of information architecture. Journal of Network and Computer Applications. 50, pp. 73-79. https://doi.org/10.1016/j.jnca.2014.06.004
Challenges and solutions for secure information centric networks: a case study of the NetInf architecture
Loo, J. and Aiash, M. 2015. Challenges and solutions for secure information centric networks: a case study of the NetInf architecture. Journal of Network and Computer Applications. 50, pp. 64-72. https://doi.org/10.1016/j.jnca.2014.06.003
A secure framework for communications in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A. and Loo, J. 2014. A secure framework for communications in heterogeneous networks. WAINA 2014 28th International Conference on Advanced Information Networking and Applications Workshops. Victoria, BC 13 - 16 May 2014 pp. 841-846
Secure live virtual machines migration: issues and solutions
Aiash, M., Mapp, G. and Gemikonakli, O. 2014. Secure live virtual machines migration: issues and solutions. IEEE AINA 2014. Victoria, BC, Canada 13 - 16 May 2014
Design of distributed space-time block code for two-hop cooperative wireless relay networks over frequency selective fading channels
Vien, Q., Tran, L., Kim, J., Hong, E. and Park, Y. 2008. Design of distributed space-time block code for two-hop cooperative wireless relay networks over frequency selective fading channels. Korea Information and Communications Society. 2008 (11), pp. 282-285.
Distributed space-time-frequency block code for cognitive wireless relay networks
Vien, Q., Stewart, B., Nguyen, H. and Gemikonakli, O. 2014. Distributed space-time-frequency block code for cognitive wireless relay networks. IET Communications. 8 (5), pp. 754-766. https://doi.org/10.1049/iet-com.2013.0374
Cross-layer optimisation for topology design of wireless multicast networks via network coding
Vien, Q., Tu, W., Nguyen, H. and Trestian, R. 2014. Cross-layer optimisation for topology design of wireless multicast networks via network coding. 39th Annual IEEE Conference on Local Computer Networks. https://doi.org/10.1109/LCN.2014.6925818
Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels
Vien, Q., Nguyen, H., Trestian, R., Shah, P. and Gemikonakli, O. 2014. Performance analysis of cooperative spectrum sensing for cognitive wireless radio networks over Nakagami-m fading channels. 2014 IEEE 25th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC). Washington DC, DC, USA 02 - 05 Sep 2014 Institute of Electrical and Electronics Engineers (IEEE). pp. 738-742 https://doi.org/10.1109/PIMRC.2014.7136262
Cross-layer optimisation for topology design of wireless multicast networks via network coding
Vien, Q., Tu, W., Nguyen, H. and Trestian, R. 2014. Cross-layer optimisation for topology design of wireless multicast networks via network coding. 39th IEEE Conference on Local Computer Networks (LCN). Edmonton, Canada 08 - 11 Sep 2014 IEEE. pp. 466-469 https://doi.org/10.1109/LCN.2014.6925818
Resource allocation for HARQ-IR systems with QoS constraints and limited feedback
To, D., Nguyen, H., Vien, Q. and Huang, L. 2014. Resource allocation for HARQ-IR systems with QoS constraints and limited feedback. 2014 IEEE Global Communications Conference. Austin, TX, USA 08 - 12 Dec 2014 IEEE. pp. 4226-4231 https://doi.org/10.1109/GLOCOM.2014.7037471
An efficient hybrid double-threshold based energy detection for cooperative spectrum sensing
Vien, Q., Nguyen, H. and Le-Ngoc, T. 2014. An efficient hybrid double-threshold based energy detection for cooperative spectrum sensing. 27th Biennial Symposium on Communications (QBSC). Kingston, ON, Canada 01 - 04 Jun 2014 IEEE. pp. 42-46 https://doi.org/10.1109/QBSC.2014.6841181
Relay selection for efficient HARQ-IR protocols in relay-assisted multisource multicast networks
Vien, Q., Nguyen, H., Shah, P., Ever, E. and To, D. 2014. Relay selection for efficient HARQ-IR protocols in relay-assisted multisource multicast networks. IEEE 79th Vehicular Technology Conference: VTC2014-Spring. Seoul, Korea (South) 18 - 21 May 2014 IEEE. pp. 1-5 https://doi.org/10.1109/VTCSpring.2014.7023073
An efficient cooperative spectrum sensing under bandwidth constraint with user selection
Vien, Q., Nguyen, H., Gemikonakli, O. and Barn, B. 2014. An efficient cooperative spectrum sensing under bandwidth constraint with user selection. 2014 IEEE 80th Vehicular Technology Conference (VTC2014-Fall). Vancouver, BC, Canada 14 - 17 Sep 2014 IEEE. pp. 1-5 https://doi.org/10.1109/VTCFall.2014.6965868
Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR
Aiash, M. and Loo, J. 2014. Introducing a novel authentication protocol for secure services in heterogeneous environments using Casper/FDR. International Journal of Communication Systems. 27 (12), pp. 3600-3618. https://doi.org/10.1002/dac.2561
Network coding-based channel quality indicator reporting for two-way multi-relay networks
Vien, Q. and Nguyen, H. 2014. Network coding-based channel quality indicator reporting for two-way multi-relay networks. Wireless Communications and Mobile Computing. 14 (15), pp. 1471-1483. https://doi.org/10.1002/wcm.2296
Performance analysis of cooperative transmission for cognitive wireless relay networks
Vien, Q., Nguyen, H., Gemikonakli, O. and Barn, B. 2013. Performance analysis of cooperative transmission for cognitive wireless relay networks. 2013 IEEE Global Communications Conference (GLOBECOM). Atlanta, GA, USA 09 - 13 Dec 2013 IEEE. pp. 4186-4191 https://doi.org/10.1109/GLOCOM.2013.6831730
Cooperative diversity techniques for high-throughput wireless relay networks
Vien, Q. 2013. Cooperative diversity techniques for high-throughput wireless relay networks. PhD thesis Glasgow Caledonian University School of Engineering and Built Environment
Design of distributed space-time block codes for relay networks
Vien, Q. 2009. Design of distributed space-time block codes for relay networks. Masters thesis Kyung Hee University School of Electronics and Radio Engineering
Design of DSTBC and HARQ schemes for turbo-coded cooperative wireless relay networks over frequency selective fading channels
Vien, Q., Nguyen, D., Tran, L. and Hong, E. 2009. Design of DSTBC and HARQ schemes for turbo-coded cooperative wireless relay networks over frequency selective fading channels. Proceedings International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC'09).
Design of quasi-orthogonal space-time block codes for cooperative wireless relay networks over frequency selective fading channels
Vien, Q. and Hong, E. 2009. Design of quasi-orthogonal space-time block codes for cooperative wireless relay networks over frequency selective fading channels. in: International Conference on Advanced Technologies for Communications, 2009. IEEE. pp. 275-278
Distributed space-time block codes for relay networks: design for frequency-selective fading channels
Vien, Q. 2011. Distributed space-time block codes for relay networks: design for frequency-selective fading channels. LAP Lambert Academic Publishing.
Training sequence-based distributed space-time block codes with frequency domain equalization
Tran, L., Vien, Q. and Hong, E. 2009. Training sequence-based distributed space-time block codes with frequency domain equalization. in: Personal, Indoor and Mobile Radio Communications (PIMRC), IEEE International Symposium IEEE. pp. 501-505
Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness
Kodagoda, N., Attfield, S., Choudhury, S., Rooney, C., Mapp, G., Nguyen, P., Slabbert, L., Wong, B., Aiash, M., Zheng, Y., Xu, K. and Lasebae, A. 2014. Concern level assessment: building domain knowledge into a visual system to support network-security situation awareness. Information Visualization. 13 (4), pp. 346-360. https://doi.org/10.1177/1473871613490291
Integrating mobility, quality-of-service and security in future mobile networks
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2013. Integrating mobility, quality-of-service and security in future mobile networks. in: Ao, S. and Gelman, L. (ed.) Electrical Engineering and Intelligent Systems New York Springer.
A novel security protocol for resolving addresses in the location/ID split architecture
Aiash, M. 2013. A novel security protocol for resolving addresses in the location/ID split architecture. The 7th International Conference on Network and System Security (NSS 2013). Spain 03 - 04 Jun 2013
Securing address registration in location/ID split protocol using ID-based cryptography
Aiash, M., Al-Nemrat, A. and Preston, D. 2013. Securing address registration in location/ID split protocol using ID-based cryptography. Tsaoussidis, V., Kassler, A., Koucheryavy, Y. and Mellouk, A. (ed.) In proceeding of: The 11th International Conference on Wired/Wireless Internet Communications WWIC 2013. Russia 05 - 07 Jun 2013 Springer. https://doi.org/10.1007/978-3-642-38401-1_10
An integrated approach to QoS and security in future mobile networks using the Y-Comm framework
Aiash, M. 2012. An integrated approach to QoS and security in future mobile networks using the Y-Comm framework. PhD thesis Middlesex University School of Engineering and Information Sciences
From fixed to mobile femtocells in LTE systems: issues and challenges
Raheem, R., Lasebae, A., Aiash, M. and Loo, J. 2013. From fixed to mobile femtocells in LTE systems: issues and challenges. 2013 Second International Conference on Future Generation Communication Technology (FGCT). London, United Kingdom 12 - 14 Nov 2013 Institute of Electrical and Electronics Engineers (IEEE). pp. 207-212 https://doi.org/10.1109/FGCT.2013.6767218
Optimal relay positioning for green wireless network-coded butterfly networks
Vien, Q., Nguyen, H. and Tu, W. 2013. Optimal relay positioning for green wireless network-coded butterfly networks. IEEE 24th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC). London, UK 08 - 11 Sep 2013 IEEE. pp. 286-290 https://doi.org/10.1109/PIMRC.2013.6666147
Cooperative retransmission for wireless regenerative multirelay networks
Vien, Q., Stewart, B., Tianfield, H. and Nguyen, H. 2013. Cooperative retransmission for wireless regenerative multirelay networks. IEEE Transactions on Vehicular Technology. 62 (2), pp. 735-747. https://doi.org/10.1109/TVT.2012.2224393
On the energy efficiency of HARQ-IR protocols for wireless network-coded butterfly networks
Vien, Q., Stewart, B., Choi, J. and Nguyen, H. 2013. On the energy efficiency of HARQ-IR protocols for wireless network-coded butterfly networks. 2013 IEEE Wireless Communications and Networking Conference (WCNC). Shanghai, China 07 - 10 Apr 2013 IEEE. pp. 2559-2564 https://doi.org/10.1109/WCNC.2013.6554964
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
Sardis, F., Mapp, G., Loo, J., Aiash, M. and Vinel, A. 2013. On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms. IEEE Transactions on Multimedia. 15 (4), pp. 769-777. https://doi.org/10.1109/TMM.2013.2240286
Efficient cooperative spectrum sensing for three-hop cognitive wireless relay networks
Vien, Q., Stewart, B., Tianfield, H. and Nguyen, H. 2013. Efficient cooperative spectrum sensing for three-hop cognitive wireless relay networks. IET Communications. 7 (2), pp. 119-127. https://doi.org/10.1049/iet-com.2012.0249
An efficient network coded ARQ for multisource multidestination relay networks over mixed flat fading channels
Vien, Q., Stewart, B., Tianfield, H., Nguyen, H. and Choi, J. 2013. An efficient network coded ARQ for multisource multidestination relay networks over mixed flat fading channels. AEÜ - International Journal of Electronics and Communications. 67 (4), pp. 282-288. https://doi.org/10.1016/j.aeue.2012.08.013
Outage probability of regenerative protocols for two-source two-destination networks
Vien, Q., Stewart, B. and Nguyen, H. 2013. Outage probability of regenerative protocols for two-source two-destination networks. Wireless Personal Communications. 69 (4), pp. 1969-1981. https://doi.org/10.1007/s11277-012-0673-8
Network coding-based block acknowledgement scheme for wireless regenerative relay networks
Vien, Q., Nguyen, H., Choi, J., Stewart, B. and Tianfield, H. 2012. Network coding-based block acknowledgement scheme for wireless regenerative relay networks. IET Communications. 6 (16), pp. 2593-2601. https://doi.org/10.1049/iet-com.2011.0681
Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments
Mapp, G., Katsriku, F., Aiash, M., Chinnam, N., Lopes, R., Moreira, E., Vanni, R., Augusto, M., Middlesex University and University of Sao Paulo 2012. Exploiting location and contextual information to develop a comprehensive framework for proactive handover in heterogeneous environments. Journal of Computer Networks and Communications. https://doi.org/10.1155/2012/748163
A formally verified device authentication protocol using Casper/FDR
Aiash, M., Mapp, G., Phan, R., Lasebae, A. and Loo, J. 2012. A formally verified device authentication protocol using Casper/FDR. Min, G., Wu, Y., Liu, L., Jin, X., Jarvis, S. and Al-Dubai, A. (ed.) 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012). Liverpool, UK 25 - 27 Jun 2012 IEEE. pp. 1293-1298 https://doi.org/10.1109/TrustCom.2012.27
Unique word-based distributed space-time block codes for two-hop wireless relay networks
Tran, L., Vien, Q. and Hong, E. 2012. Unique word-based distributed space-time block codes for two-hop wireless relay networks. IET Communications. 6 (7), pp. 715-723. https://doi.org/10.1049/iet-com.2010.0957
A survey of potential architectures for communication in heterogeneous networks
Aiash, M., Mapp, G., Lasebae, A., Loo, J., Sardis, F., Phan, R., Augusto, M., Moreira, E. and Vanni, R. 2012. A survey of potential architectures for communication in heterogeneous networks. IEEE Wireless Telecommunications Symposium (WTS 2012). London 18 - 20 Apr 2012 IEEE. pp. 1-6 https://doi.org/10.1109/WTS.2012.6266121
Security and QoS integration for protecting service providers in hterogeneous environments
Aiash, M., Mapp, G. and Lasebae, A. 2011. Security and QoS integration for protecting service providers in hterogeneous environments. International Journal of Computer Science. 38 (4), pp. 384-393.
An efficient retransmission strategy for multi-source multi-destination relay networks over Rayleigh flat fading channels.
Vien, Q., Tianfield, H., Stewart, B., Nguyen, H. and Choi, J. 2011. An efficient retransmission strategy for multi-source multi-destination relay networks over Rayleigh flat fading channels. The 14th International Symposium on Wireless Personal Multimedia Communications (WPMC'11). Brest, France 03 - 06 Oct 2011 IEEE.
An efficient cooperative retransmission for wireless regenerative relay networks
Vien, Q., Stewart, B., Tianfield, H. and Nguyen, H. 2012. An efficient cooperative retransmission for wireless regenerative relay networks. 2012 IEEE Global Communications Conference (GLOBECOM). Anaheim, CA, USA 03 - 07 Dec 2012 IEEE. pp. 4417-4422 https://doi.org/10.1109/GLOCOM.2012.6503813
Efficient cooperative spectrum sensing for cognitive wireless relay networks over Rayleigh flat fading channels
Vien, Q., Tianfield, H. and Stewart, B. 2012. Efficient cooperative spectrum sensing for cognitive wireless relay networks over Rayleigh flat fading channels. IEEE 75th Vehicular Technology Conference (VTC Spring). Yokohama, Japan 06 - 09 May 2012 IEEE. https://doi.org/10.1109/VETECS.2012.6240171
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
Le, A., Loo, J., Lasebae, A., Aiash, M. and Luo, Y. 2012. 6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach. International Journal of Communication Systems. 25 (9), pp. 1189-1212. https://doi.org/10.1002/dac.2356
M-Sieve: a visualisation tool for supporting network security analysts
Choudhury, S., Kodagoda, N., Nguyen, P., Rooney, C., Attfield, S., Xu, K., Zheng, Y., Wong, B., Chen, R., Mapp, G., Slabbert, L., Aiash, M. and Lasebae, A. 2012. M-Sieve: a visualisation tool for supporting network security analysts. VisWeek 2012. Seattle, WA, USA 14 - 19 Oct 2012
A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR
Aiash, M., Mapp, G., Lasebae, A., Phan, R. and Loo, J. 2012. A formally verified AKA protocol for vertical handover inheterogeneous environments using Casper/FDR. EURASIP Journal on Wireless Communications and Networking. 2012 (57). https://doi.org/10.1186/1687-1499-2012-57
CQI reporting strategies for nonregenerative two-way relay networks
Vien, Q. and Nguyen, H. 2012. CQI reporting strategies for nonregenerative two-way relay networks. 2012 IEEE Wireless Communications and Networking Conference. Paris, France 01 - 04 Apr 2012 IEEE. pp. 974-979 https://doi.org/10.1109/WCNC.2012.6214516
Exploring the concept of scope to provide better security for internet services.
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2011. Exploring the concept of scope to provide better security for internet services. First Global Conference on Communication, Science and Engineering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Enhancing naming and location services to support multi-homed devices in heterogeneous environments
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Augusto, M., Vanni, R., Moreira, E., Middlesex University, Loughborough University and University of Sao Paulo 2011. Enhancing naming and location services to support multi-homed devices in heterogeneous environments. First Conference on Communication, Science and Information Enginneering (CCSIE 2011). Middlesex University 25 - 27 Jul 2011
Network coding-based block ACK for wireless relay networks.
Vien, Q., Nguyen, H., Choi, J., Stewart, B. and Tianfield, H. 2011. Network coding-based block ACK for wireless relay networks. IEEE. https://doi.org/10.1109/VETECS.2011.5956413
A QoS framework for heterogeneous networking
Aiash, M., Mapp, G., Lasebae, A., Augusto, M., Vanni, R. and Moreira, E. 2011. A QoS framework for heterogeneous networking. ICWN'11: The 2011 International Conference of Wireless Networks (held as part of WCE 2011). London, UK 06 - 08 Jul 2011
Exploring multi-homing issues in heterogeneous networks
Mapp, G., Aiash, M., Guardia, H., Crowcroft, J., Institute of Electrical and Electronics Engineers, Middlesex University, Federal University of Sao Paulo and University of Cambridge 2011. Exploring multi-homing issues in heterogeneous networks. IEEE. pp. 690-695 https://doi.org/10.1109/WAINA.2011.140
Network coding-based ARQ retransmission strategies for two-way wireless relay networks.
Vien, Q., Tran, L., Nguyen, H. and Institute of Electrical and Electronics Engineers 2010. Network coding-based ARQ retransmission strategies for two-way wireless relay networks. IEEE. pp. 180-184
Efficient ARQ retransmission schemes for two-way relay networks.
Vien, Q., Tran, L. and Nguyen, H. 2011. Efficient ARQ retransmission schemes for two-way relay networks. Journal of Communication Software and Systems. 7 (1).
Network coding-based retransmission for relay aided multisource multicast networks
Vien, Q., Tran, L. and Hong, E. 2011. Network coding-based retransmission for relay aided multisource multicast networks. EURASIP Journal on Wireless Communications and Networking. 2011 (1). https://doi.org/10.1155/2011/643920
Providing security in 4G systems: unveiling the challenges
Aiash, M., Mapp, G., Lasebae, A., Phan, R., Middlesex University and Loughborough University 2010. Providing security in 4G systems: unveiling the challenges. Atmaca, T., Palicot, J., Amor, N., Tsiatsos, T., Marot, M. and Dini, O. (ed.) IEEE. pp. 439-444 https://doi.org/10.1109/AICT.2010.24
Distributed space-time block code over mixed Rayleigh and Rician frequency-selective fading channels
Vien, Q., Tran, L. and Hong, E. 2010. Distributed space-time block code over mixed Rayleigh and Rician frequency-selective fading channels. EURASIP Journal on Wireless Communications and Networking. 2010 (1). https://doi.org/10.1155/2010/385872
Security models for heterogeneous networking
Mapp, G., Aiash, M., Lasebae, A. and Phan, R. 2010. Security models for heterogeneous networking. Katsikas, S. (ed.) 4th International Conference on Security and Cryptography. Athens, Greece 26 - 28 Jul 2010 IEEE. pp. 1-4
Training sequence-based distributed space-time block codes with frequency domain equalization
Tran, L., Vien, Q. and Hong, E. 2009. Training sequence-based distributed space-time block codes with frequency domain equalization. 20th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Tokyo, Japan 13 - 16 Sep 2009 IEEE. pp. 501-505 https://doi.org/10.1109/PIMRC.2009.5449910
Design of distributed space-time block code for two-relay system over frequency selective fading channels
Vien, Q., Tran, L. and Hong, E. 2009. Design of distributed space-time block code for two-relay system over frequency selective fading channels. 2009 IEEE Global Telecommunications Conference. Honolulu, HI, USA 30 Nov - 04 Dec 2009 IEEE. https://doi.org/10.1109/GLOCOM.2009.5426275
Exploring efficient imperative handover mechanisms for heterogeneous wireless networks
Mapp, G., Shaikh, F., Aiash, M., Vanni, R., Augusto, M. and Moreira, E. 2009. Exploring efficient imperative handover mechanisms for heterogeneous wireless networks. Duresi, A., Barolli, L., Enokido, T., Uehara, M., Shakshuki, E. and Takizawa, M. (ed.) 12th International Conference on Network-Based Information Systems. Indianapolis, Indiana 19 - 21 Aug 2009 IEEE. pp. 286-291 https://doi.org/10.1109/NBiS.2009.95